How do I narrow my search results?
After you submit your search query:
- On the Refine Search results page, select one or more categories of products or services from the left sidebar.
- Then for a category with search results, click Select to choose your product and release filters, and then click OK.
For search queries that contain multiple words, surround the query with quotes, and then resubmit your query. Example: "database cloud service"
How do I find the documentation for my product or service?
From the home page, click the technology categories for your products or services. If you do not know which category to pick, try the following features:
- Click the Find a product tab and search for your product or service.
- Click Browse All Products & Services at the bottom of the home page to view an alphabetical listing of products and services.
- Apple Safari: Version 6
- Google Chrome: Version 29 and later
- Mozilla Firefox: Version 24 and later
- Microsoft Internet Explorer: Version 9 and later
Disabling the Retention Policy → When you disable the retention policy, RMAN does not consider any backup as obsolete. To disable … the retention policy, run this command: CONFIGURE RETENTION POLICY TO NONE; Configuring the retention … policy to NONE is not the same as clearing it. Clearing it returns it to its default setting of … REDUNDANCY
15.5.2 Purging Policy → A weekly scheduled purging task manages the disk space used by SQL plan management. The task runs as an automated task in the maintenance window. Any plan that has not been used for more than 53 weeks are purged, as identified by the LAST_EXECUTED timestamp stored in the SMB for that plan. The 53-week time frame ensures plan information will be available during any yearly SQL processing activity.
Auditing Policy → Security administrators should define a policy for the auditing procedures of each database. You
Configuring the Backup Retention Policy → As explained in \"Backup Retention Policies\", the backup retention policy specifies which backups … must be retained to meet your data recovery requirements. This policy can be based on a recovery … window or redundancy. Use the CONFIGURE RETENTION POLICY command to specify the retention policy. See
The Importance of Establishing a Security Policy for Your Database → It is important to develop a security policy for every database. The security policy establishes … administrator, who is responsible for implementing and maintaining the database security policy If the
Configuring an Archived Redo Log Deletion Policy → You can use RMAN to create a persistent configuration that governs when archived redo logs are eligible for deletion from disk.
1.4.5 Default Audit Policy and Initialization Parameters → Oracle Database Vault installs a baseline database auditing policy. This policy covers the access … Administrator's Guide for more information on the database audit policy
Enabling an Archived Redo Log Deletion Policy → This section explains how to configure an archived redo log deletion policy. By default the policy … is set to NONE. To enable an archived redo log deletion policy: Start RMAN and connect to a target … database and a recovery catalog (if used). Run the CONFIGURE ARCHIVELOG DELETION POLICY command with … at least
Configuring a Recovery Window-Based Retention Policy → window. Run the CONFIGURE RETENTION POLICY command at the RMAN prompt. This example ensures that you … can recover the database to any point within the last week: CONFIGURE RETENTION POLICY TO RECOVERY
Configuring a Redundancy-Based Retention Policy → The REDUNDANCY parameter of the CONFIGURE RETENTION POLICY command specifies how many full or level … , then RMAN considers the extra backups as obsolete. The default retention policy is REDUNDANCY 1. As you … backups. Run the CONFIGURE RETENTION POLICY command at the RMAN prompt, as in the following example … : CONFIGURE RETENTION
Password Management Policy → database security, the Oracle Database password management policy is controlled by DBAs and security
System Security Policy → security policy: the security administrators. If the database system is small, then the database … security administrator. A security policy must be developed for every database. A security policy
Data Security Policy → level. Your data security policy determines which users have access to a specific schema object, and the … policy should also define the actions, if any, that are audited for each schema object. Your data … security policy is determined primarily by the level of security you want for the data in your database … be based on the
User Security Policy → This section describes aspects of user security policy, and contains the following topics: General … administrators should develop a password security policy to maintain database access security. For example … the use of roles. End-User Security Security administrators must define a policy for end-user … have a policy
Reporting on Files Needing a Backup Under a Retention Policy → retention policy. With no arguments, REPORT NEED BACKUP reports which objects need backup under the … currently configured retention policy. The output for a configured retention policy of REDUNDANCY 1 … is similar to this example: RMAN> REPORT NEED BACKUP; RMAN retention policy will be applied to the … command
Backup Retention Policy and Flash Recovery Area Deletion Rules → to the retention policy. A companion command, DELETE OBSOLETE, deletes all files which are obsolete … according to the retention policy. You can run DELETE OBSOLETE periodically to minimize space … also override the configured retention policy the configured retention policy by specifying the … Reference for REPORT
Using a Password Management Policy → password management policy. Database administrators and security officers control this policy through
retention policy → See backup retention policy
Configuring an Oracle Virtual Private Database Policy → This section contains: About Oracle Virtual Private Database Policies Attaching a Policy to a … Display of Column Data with Policies Working with Oracle Virtual Private Database Policy Groups … Optimizing Performance by Using Oracle Virtual Private Database Policy Types
Table 7-2 DBMS_RLS.ADD_POLICY Policy Types → Policy Types When the Policy Function Executes Usage Example Shared Across Multiple Objects … ? DYNAMIC Policy function re-executes every time a policy-protected database object is accessed … . Applications where policy predicates must be generated for each query, such as time-dependent policies where