All operations other than setting or verifying one's own password, or showing one's own password database entries, require privileges.