All posts

Pgcli ad hoc access control

The query lands. The database responds. But who gets to see the rows, and who doesn’t? Pgcli ad hoc access control solves this without friction. It is fast. It is precise. And it works in real time. Pgcli is a command-line interface for Postgres with auto-completion, syntax highlighting, and a responsive feel. On its own, it gives power to anyone with credentials. With ad hoc access control layered in, you decide who can run what, when, and from where. That means you can grant temporary read p

Free White Paper

Role-Based Access Control (RBAC): The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

The query lands. The database responds. But who gets to see the rows, and who doesn’t?

Pgcli ad hoc access control solves this without friction. It is fast. It is precise. And it works in real time.

Pgcli is a command-line interface for Postgres with auto-completion, syntax highlighting, and a responsive feel. On its own, it gives power to anyone with credentials. With ad hoc access control layered in, you decide who can run what, when, and from where. That means you can grant temporary read privileges for a specific table, revoke them instantly, and log every request without writing additional scripts.

Continue reading? Get the full guide.

Role-Based Access Control (RBAC): Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.

The control is fine-grained. You can enforce policies down to a single SQL statement. You can bind permissions to reviewed queries, block destructive commands, or allow one-time report generation without exposing the database to open-ended use. This reduces attack surface and ensures compliance with internal or external security requirements.

Pgcli ad hoc access control integrates cleanly. You can define rules in configuration, or wire it into existing authentication flows. Because Pgcli supports Postgres natively, the rules apply without fighting the tool’s workflow. It stays responsive. Your team doesn’t lose momentum.

When database access shifts from static roles to ad hoc permissions, you stop over-provisioning. No more blanket ‘read_all’ accounts left hanging in production. You craft access that expires naturally and remains auditable. This is not theory—it is a practical way to close a common security gap while keeping the speed developers expect.

See how Pgcli ad hoc access control changes the way you handle database permissions. Go to hoop.dev and get it running in minutes.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts