Check out PostgreSQL User Privilege Requirements to learn more all detailed requirements while setting up remote PostgreSQL database server for MetaDefender ICAP Server.
This tool is to help your database system admin quickly determine whether or not your remote PostgreSQL database have sufficient user privileges as described at PostgreSQL User Privilege Requirements to work properly with MetaDefender ICAP Server application.
Download links:
- Windows: https://metascanbucket.s3.amazonaws.com/Metadefender/Core/utilities/PGComplianceCheck/windows/check-db-user-compliance.exe
- CentOS / Red Hat: https://metascanbucket.s3.amazonaws.com/Metadefender/Core/utilities/PGComplianceCheck/centos/check-db-user-compliance
- Debian / Ubuntu: https://metascanbucket.s3.amazonaws.com/Metadefender/Core/utilities/PGComplianceCheck/debian/check-db-user-compliance
The tool must run on the host where PostgreSQL server is running, and Visual C++ Redistribution 2015 or above is installed.
Usage:
Options and arguments:
- -h (--help) instruction
- -h (--hostname) database server host or socket directory
- -p (--port) database server port
- -u (--pguser) database user name
- -m (--mainuser) PostgreSQL main user
- -i (--internaluser) PostgreSQL internal user

If the PostgreSQL own psql executable file has not been assigned to the Windows environmental path yet, and PostgreSQL's registry value does not exist, user has to input their own psql executable path.
Examples:
A. Inspecting PostgreSQL main user

Example 1: PostgreSQL main user with SUPERUSER privilege
Example 2: PostgreSQL main user with CREATEDB and CREATEROLE privilege
Example 3: PostgreSQL main user without privilege
B. Inspecting PostgreSQL internal user

Example 1: PostgreSQL internal user with LOGIN privilege
Example 2: PostgreSQL internal user without LOGIN privilege