Prepare a list of usernames from the external authentication system and decide which database users they are allowed to connect as-that is, which external users map to which database users.
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month, and much more.