doc/user/content/releases/v0.63.md
Improve and extend the base implementation of Role-based access control (RBAC):
Require USAGE privileges on the schemas of all connections, secrets, and types used in a query.
Add system catalog views that present privileges and role memberships using human-readable names instead of identifiers. Each view has two variants: one that presents all privileges or roles, and another that only presents privileges and roles that contain the current role.
Privileges
mz_internal.mz_show_all_privilegesmz_internal.mz_show_[my_]cluster_privilegesmz_internal.mz_show_[my_]database_privilegesmz_internal.mz_show_[my_]default_privilegesmz_internal.mz_show_[my_]object_privilegesmz_internal.mz_show_[my_]schema_privilegesmz_internal.mz_show_[my_]system_privilegesRoles
It's important to note that role-based access control (RBAC) is disabled by default. You must contact us to enable this feature in your Materialize region.
Add the max_query_result_size configuration parameter,
which allows limiting the size in bytes of a single query’s result.
Support most single DDL statements in explicit transactions. This improves the integration experience with external tools like Deepnote and Hex.