SVV_SCHEMA_PRIVILEGES - Amazon Redshift
Services or capabilities described in Amazon Web Services documentation might vary by Region. To see the differences applicable to the China Regions, see Getting Started with Amazon Web Services in China (PDF).

SVV_SCHEMA_PRIVILEGES

Use SVV_SCHEMA_PRIVILEGES to view the schema permissions that are explicitly granted to users, roles, and groups in the current database.

SVV_SCHEMA_PRIVILEGES is visible to the following users:

  • Superusers

  • Users with the ACCESS SYSTEM TABLE permission

Other users can only see identities they have access to or own.

Table columns

Column name Data type Description
namespace_name text The name of the namespace where a specified schema exists.
privilege_type text The type of the permission. For permissions with a privilege_scope of schema, possible values are CREATE, USAGE, and ALTER. For privilege_scope values other than schema, possible values include any permission type available on the permission's scope.
identity_id integer The ID of the identity. Possible values are user ID, role ID, or group ID.
identity_name text The name of the identity.
identity_type text The type of the identity. Possible values are user, role, group, or public.
admin_option boolean A value that indicates whether the user can grant the permission to other users and roles. It is always false for the role and group identity type.
privilege_scope text The scope of the permission specified in privilege_type. Possible values are as follows:
  • SCHEMA

  • TABLES

  • FUNCTIONS

For information on scoped permissions, go to Scoped permissions.

Sample query

The following example displays the result of the SVV_SCHEMA_PRIVILEGES.

SELECT namespace_name,privilege_type,identity_name,identity_type,admin_option FROM svv_schema_privileges WHERE namespace_name = 'test_schema1'; namespace_name | privilege_type | identity_name | identity_type | admin_option ----------------+----------------+----------------+---------------+-------------- test_schema1 | USAGE | reguser | user | False test_schema1 | USAGE | role1 | role | False