Results for privileges


81 to 140 of 2781 results. Prev  Next
Results per page:  20 | 40 |  60 


Label Security Administrator's Guide, 11g Release 1 (11.1)

Understanding Access Controls and Privileges

3.6.1 Multiple Oracle Label Security Policies in a Single Databaseprotecting the table containing your desired rows. If you require privileges, then you may need privileges for all of the policies affecting your work.

Label Security Administrator's Guide, 11g Release 1 (11.1)

Administering User Labels and Privileges

8 Administering User Labels and Privilegesprivileges. You can also use the Web interface provided by Oracle Enterprise Manager Database Control or Grid … , with SA_USER_ADMIN Managing User Privileges with SA_USER_ADMIN.SET_USER_PRIVS Setting Labels … & Privileges with SA_SESSION.SET_ACCESS_PROFILE Returning User Name with SA_SESSION.SA_USER_NAME Using Oracle Label Security Views

Label Security Administrator's Guide, 11g Release 1 (11.1)

Administering User Labels and Privileges

8.2.11 SA_USER_ADMIN.DROP_ALL_GROUPSThe DROP_ALL_GROUPS procedure drops all groups from a user's authorizations. Syntax: PROCEDURE DROP_ALL_GROUPS (policy_name IN VARCHAR2, user_name IN VARCHAR2); Table 8-11 Parameters for SA_USER_ADMIN.DROP_ALL_GROUPS Parameter Meaning policy_name Specifies the policy user_name Specifies the user name

Label Security Administrator's Guide, 11g Release 1 (11.1)

Administering User Labels and Privileges

8.3.4 SA_USER_ADMIN.DROP_USER_ACCESSprivileges from the specified user. This procedure must be issued from the command line. Syntax: PROCEDURE

Label Security Administrator's Guide, 11g Release 1 (11.1)

Administering User Labels and Privileges

8.7.1 View to Display All User Security Attributes: DBA_SA_USERSThe DBA_SA_USERS view displays the values assigned for privileges, levels, compartments, and groups

Label Security Administrator's Guide, 11g Release 1 (11.1)

Understanding Access Controls and Privileges

3.2.3 Session Label ExampleThe session label and the row label can fall anywhere within the range of the user's level, compartment, and group authorizations. In Figure 3-2, \"User Session Label\", the user's maximum level is SENSITIVE and the minimum level is UNCLASSIFIED. However, his default session label is C:FIN,OP:WR. In this example, the administrator has set the user's session label so that the user connects to the database

Label Security Administrator's Guide, 11g Release 1 (11.1)

Administering User Labels and Privileges

8.2.1 SA_USER_ADMIN.SET_LEVELSThe SET_LEVELS procedure assigns a minimum and maximum level to a user and identifies default values for the user's session label and row label. If the min_level is NULL, then it is set to the lowest defined level for the policy. If the def_level is not specified, then it is set to the max_level. If the row_level is not specified, then it is set to the def_level. Syntax: PROCEDURE SET_LEVELS (policy_name

Label Security Administrator's Guide, 11g Release 1 (11.1)

Administering User Labels and Privileges

8.2.2 SA_USER_ADMIN.SET_COMPARTMENTSThe SET_COMPARTMENTS procedure assigns compartments to a user and identifies default values for the user's session label and row label. If write_comps are NULL, then they are set to the read_comps. If the def_comps are NULL, then they are set to the read_comps. If the row_comps are NULL, then they are set to the components in def_comps that are authorized for write access. All users must have their

Label Security Administrator's Guide, 11g Release 1 (11.1)

Administering User Labels and Privileges

8.2.6 SA_USER_ADMIN.DROP_COMPARTMENTSThe DROP_COMPARTMENTS procedure drops the specified compartments from a user's authorizations. Syntax: PROCEDURE DROP_COMPARTMENTS (policy_name IN VARCHAR2, user_name IN VARCHAR2, comps IN VARCHAR2); Table 8-6 Parameters for SA_USER_ADMIN.DROP_COMPARTMENTS Parameter Meaning policy_name Specifies the policy user_name Specifies the user name comps A comma-delimited list of compartments to drop

Label Security Administrator's Guide, 11g Release 1 (11.1)

Administering User Labels and Privileges

8.2.8 SA_USER_ADMIN.ADD_GROUPSThe ADD_GROUPS procedure adds groups to a user, indicating whether the groups are authorized for write as well as read. Syntax: PROCEDURE ADD_GROUPS (policy_name IN VARCHAR2, user_name IN VARCHAR2, groups IN VARCHAR2, access_mode IN VARCHAR2 DEFAULT NULL, in_def IN VARCHAR2 DEFAULT NULL, in_row IN VARCHAR2 DEFAULT NULL); Table 8-8 Parameters for SA_USER_ADMIN.ADD_GROUPS Parameter Meaning policy_name

Label Security Administrator's Guide, 11g Release 1 (11.1)

Administering User Labels and Privileges

8.5 Setting Labels & Privileges with SA_SESSION.SET_ACCESS_PROFILEThe SET_ACCESS_PROFILE procedure sets the Oracle Label Security authorizations and privileges of … . That user assumes only the authorizations and privileges of the specified user. By contrast, the … SA_SESSION.SET_ACCESS_PROFILE Parameter Meaning policy_name The name of an existing policy user_name Name of the user whose authorizations and privileges

Label Security Administrator's Guide, 11g Release 1 (11.1)

Understanding Access Controls and Privileges

3.4.2 The Oracle Label Security Algorithm for Read Accessor less than the current session level. No privileges (other than FULL) allow the user to write … special Oracle Label Security privileges. See Also: \"Privileges Defined by Oracle Label Security

Label Security Administrator's Guide, 11g Release 1 (11.1)

Understanding Access Controls and Privileges

3.5 Using Oracle Label Security PrivilegesThis section introduces the Oracle Label Security database and row label privileges: Privileges … Defined by Oracle Label Security Policies Special Access Privileges Special Row Label Privileges System Privileges, Object Privileges, and Policy Privileges

Label Security Administrator's Guide, 11g Release 1 (11.1)

Administering User Labels and Privileges

8.1 Introduction to User Label and Privilege ManagementTo manage user labels and privileges, you must have the EXECUTE privilege for the SA_USER_ADMIN

Label Security Administrator's Guide, 11g Release 1 (11.1)

Administering User Labels and Privileges

8.2.4 SA_USER_ADMIN.ALTER_COMPARTMENTSThe ALTER_COMPARTMENTS procedure changes the write access, the default label indicator, and the row label indicator for each of the compartments in the list. Syntax: PROCEDURE ALTER_COMPARTMENTS (policy_name IN VARCHAR2, user_name IN VARCHAR2, comps IN VARCHAR2, access_mode IN VARCHAR2 DEFAULT NULL, in_def IN VARCHAR2 DEFAULT NULL, in_row IN VARCHAR2 DEFAULT NULL); Table 8-4 Parameters for SA_USER_ADMIN.ALTER_COMPARTMENTS

Label Security Administrator's Guide, 11g Release 1 (11.1)

Administering User Labels and Privileges

8.3.2 SA_USER_ADMIN.SET_DEFAULT_LABELThe SET_DEFAULT_LABEL procedure sets the user's initial session label to the one specified. Syntax: PROCEDURE SET_DEFAULT_LABELS ( policy_name IN VARCHAR2, user_name IN VARCHAR2, def_label IN VARCHAR2); Table 8-13 Parameters for SA_USER_ADMIN.SET_DEFAULT_LABEL Parameter Meaning policy_name Specifies the policy user_name Specifies the user name def_label Specifies the label string to be used to initialize

Label Security Administrator's Guide, 11g Release 1 (11.1)

Understanding Access Controls and Privileges

3.2.1 The Session LabelEach Oracle Label Security user has a set of authorizations that include: A maximum and minimum level A set of authorized compartments A set of authorized groups For each compartment and group, a specification of read-only access, or read/write access The administrator also specifies the user's initial session label when setting up these authorizations for the user. The session label is the particular

Label Security Administrator's Guide, 11g Release 1 (11.1)

Understanding Access Controls and Privileges

3.3 Understanding User AuthorizationsThere are two types of user authorizations: Authorizations Set by the Administrator Computed Session Labels

Label Security Administrator's Guide, 11g Release 1 (11.1)

Understanding Access Controls and Privileges

3.4.1 Introducing Read/Write AccessAlthough data labels are stored in a column within data records, information about user authorizations is stored in relational tables. When a user logs on, the tables are used to dynamically generate user labels for use during the session. 3.4.1.1 Difference Between Read and Write Operations Two fundamental types of access mediation on Data Manipulation language (DML) operations exist, within protected

Label Security Administrator's Guide, 11g Release 1 (11.1)

Administering User Labels and Privileges

8.2.10 SA_USER_ADMIN.DROP_GROUPSThe DROP_GROUPS procedure drops the specified groups from a user's authorizations. Syntax: PROCEDURE DROP_GROUPS (policy_name IN VARCHAR2, user_name IN VARCHAR2, groups IN VARCHAR2); Table 8-10 Parameters for SA_USER_ADMIN.DROP_GROUPS Parameter Meaning policy_name Specifies the policy user_name Specifies the user name groups A comma-delimited list of groups to drop

Label Security Administrator's Guide, 11g Release 1 (11.1)

Understanding Access Controls and Privileges

3.4 Evaluating Labels for Access MediationWhen a table is protected by an Oracle Label Security policy, the user's label components are compared to the row's label components to determine whether the user can access the data. In this way, Oracle Label Security evaluates whether the user is authorized to perform the requested operation on the data in the row. This section explains the rules and options by which user access is mediated. It

Label Security Administrator's Guide, 11g Release 1 (11.1)

Understanding Access Controls and Privileges

3.5.7 Access Mediation and Policy Enforcement OptionsAn administrator can choose from among a set of policy enforcement options when applying an Oracle Label Security policy to individual tables. These options enable enforcement to be tailored differently for each database table. In addition to the access controls based on the labels, a SQL predicate can also be associated with each table. The predicate can further define which rows in the table are

Label Security Administrator's Guide, 11g Release 1 (11.1)

Administering User Labels and Privileges

8.2.5 SA_USER_ADMIN.ADD_COMPARTMENTS8.2.5 SA_USER_ADMIN. ADD_COMPARTMENTS This procedure adds compartments to a user's authorizations, indicating whether the compartments are authorized for write as well as read. Syntax: PROCEDURE ADD_COMPARTMENTS (policy_name IN VARCHAR2, user_name IN VARCHAR2, comps IN VARCHAR2, access_model IN VARCHAR2 DEFAULT NULL, in_def IN VARCHAR2 DEFAULT NULL, in_row IN VARCHAR2 DEFAULT NULL); Table 8-5 Parameters

Label Security Administrator's Guide, 11g Release 1 (11.1)

Administering User Labels and Privileges

8.2.9 SA_USER_ADMIN.ALTER_GROUPSThe ALTER_GROUPS procedure changes the write access, the default label indicator, and the row label indicator for each of the groups in the list. Syntax: PROCEDURE ALTER_GROUPS (policy_name IN VARCHAR2, user_name IN VARCHAR2, groups IN VARCHAR2, access_mode IN VARCHAR2 DEFAULT NULL, in_def IN VARCHAR2 DEFAULT NULL, in_row IN VARCHAR2 DEFAULT NULL); Table 8-9 Parameters for SA_USER_ADMIN.ALTER_GROUPS

Label Security Administrator's Guide, 11g Release 1 (11.1)

Administering User Labels and Privileges

8.3.1 SA_USER_ADMIN.SET_USER_LABELS… See Also: \"Managing Program Unit Privileges with SET_PROG_PRIVS\"

Label Security Administrator's Guide, 11g Release 1 (11.1)

Administering User Labels and Privileges

8.4 Managing User Privileges with SA_USER_ADMIN.SET_USER_PRIVSThe SET_USER_PRIVS procedure sets policy-specific privileges for users. These privileges do not … . The new set of privileges replaces any existing privileges. A NULL value for the privileges … parameter removes the user's privileges for the policy. To assign policy privileges

Label Security Administrator's Guide, 11g Release 1 (11.1)

Understanding Access Controls and Privileges

3 Understanding Access Controls and Privilegeslabel and the user's label. This chapter examines the access controls and privileges that determine … Evaluating Labels for Access Mediation Using Oracle Label Security Privileges Working with Multiple Oracle Label Security Policies

Label Security Administrator's Guide, 11g Release 1 (11.1)

Understanding Access Controls and Privileges

3.2 Understanding Session Label and Row LabelThis section introduces the basic user labels. The Session Label The Row Label Session Label Example

Label Security Administrator's Guide, 11g Release 1 (11.1)

Understanding Access Controls and Privileges

3.4.3 The Oracle Label Security Algorithm for Write AccessIn the context of Oracle Label Security, WRITE_CONTROL enforcement determines the ability to insert, update, or delete data in a row. WRITE_CONTROL enables you to control data access with ever finer granularity. Granularity increases when compartments are added to levels. It increases again when groups are added to compartments. Access control becomes even more fine grained when you can manage the

Label Security Administrator's Guide, 11g Release 1 (11.1)

Administering User Labels and Privileges

8.2.7 SA_USER_ADMIN.DROP_ALL_COMPARTMENTSThe DROP_ALL_COMPARTMENTS procedure drops all compartments from a user's authorizations. Syntax: PROCEDURE DROP_ALL_COMPARTMENTS (policy_name IN VARCHAR2, user_name IN VARCHAR2); Table 8-7 Parameters for SA_USER_ADMIN.DROP_ALL_COMPARTMENTS Parameter Meaning policy_name Specifies the policy user_name Specifies the user name

Label Security Administrator's Guide, 11g Release 1 (11.1)

Administering User Labels and Privileges

8.3.3 SA_USER_ADMIN.SET_ROW_LABELUse the SET_ROW_LABEL procedure to set the user's initial row label to the one specified. Syntax: PROCEDURE SET_ROW_LABEL ( policy_name IN VARCHAR2, user_name IN VARCHAR2, row_label IN VARCHAR2); Table 8-14 Parameters for SA_USER_ADMIN.SET_ROW_LABEL Parameter Meaning policy_name Specifies the policy user_name Specifies the user name row_label Specifies the label string to be used to initialize the

Label Security Administrator's Guide, 11g Release 1 (11.1)

Administering User Labels and Privileges

8.7 Using Oracle Label Security ViewsThis section describes views you can use to see the user authorization and privilege assignments made by the administrator. View to Display All User Security Attributes: DBA_SA_USERS Views to Display User Authorizations by Component

Label Security Administrator's Guide, 11g Release 1 (11.1)

Understanding Access Controls and Privileges

3.1 Introducing Access MediationTo access data protected by an Oracle Label Security policy, a user must have authorizations based on the labels defined for the policy. Figure 3-1, \"Relationships Between Users, Data, and Labels\" illustrates the relationships between users, data, and labels. Data labels specify the sensitivity of data rows. User labels provide the appropriate authorizations to users. Access mediation between users

Label Security Administrator's Guide, 11g Release 1 (11.1)

Understanding Access Controls and Privileges

3.5.1 Privileges Defined by Oracle Label Security PoliciesOracle Label Security supports special privileges that allow authorized users to bypass certain … parts of the policy. Table 3-3 summarizes the full set of privileges that can be granted to users or … Label Security Privileges Security Privilege Explanation READ Allows read access to all data … groups PROFILE_ACCESS Allows a session

Label Security Administrator's Guide, 11g Release 1 (11.1)

Understanding Access Controls and Privileges

3.5.5 Access Mediation and Viewsprivileges on the view. If the underlying table (on which the view is based) is protected by Oracle Label

Label Security Administrator's Guide, 11g Release 1 (11.1)

Understanding Access Controls and Privileges

3.5.6 Access Mediation and Program Unit ExecutionUser2's system and object privileges. However, any procedure executed by User1 runs with User1's own … Oracle Label Security labels and privileges. This is true even when User1 executes stored program … : Stored program units run with the DAC privileges of the procedure's owner (User2). In addition, stored … on the label attached

Label Security Administrator's Guide, 11g Release 1 (11.1)

Understanding Access Controls and Privileges

3.6 Working with Multiple Oracle Label Security PoliciesThis section describes aspects of using multiple policies.

Label Security Administrator's Guide, 11g Release 1 (11.1)

Understanding Access Controls and Privileges

3.6.2 Multiple Oracle Label Security Policies in a Distributed EnvironmentIf you work in a distributed environment, where multiple databases may be protected by the same or different Oracle Label Security policies, your remote connections will also be controlled by Oracle Label Security. See Also: Chapter 13, \"Using Oracle Label Security with a Distributed Database\"

Label Security Administrator's Guide, 11g Release 1 (11.1)

Administering User Labels and Privileges

8.2.3 SA_USER_ADMIN.SET_GROUPSThe SET_GROUPS procedure assigns groups to a user and identifies default values for the user's session label and row label. If the write_groups are NULL, they are set to the read_groups. If the def_groups are NULL, they are set to the read_groups. If the row_groups are NULL, they are set to the groups in def_groups that are authorized for write access. All users must have their levels set before their

Label Security Administrator's Guide, 11g Release 1 (11.1)

Administering User Labels and Privileges

8.3 Managing User Labels by Label String, with SA_USER_ADMINThe following SA_USER_ADMIN procedures enable you to manage user labels by specifying the complete character label string: SA_USER_ADMIN.SET_USER_LABELS SA_USER_ADMIN.SET_DEFAULT_LABEL SA_USER_ADMIN.SET_ROW_LABEL SA_USER_ADMIN.SET_DEFAULT_LABEL

Label Security Administrator's Guide, 11g Release 1 (11.1)

Administering User Labels and Privileges

8.6 Returning User Name with SA_SESSION.SA_USER_NAMEThe SA_USER_NAME function returns the name of the current Oracle Label Security user, as set by the SET_ACCESS_PROFILE procedure (or as established at login). This is how you can determine the identity of the current user in relation to Oracle Label Security, rather than in relation to your Oracle login name. Syntax: FUNCTION SA_USER_NAME (policy_name IN VARCHAR2) RETURN VARCHAR2; Table 8-18 Parameters

Label Security Administrator's Guide, 11g Release 1 (11.1)

Administering User Labels and Privileges

8.7.2 Views to Display User Authorizations by ComponentThe following views individually display each component of the label: Table 8-19 Oracle Label Security Views View Contents DBA_SA_USER_LEVELS Displays the levels assigned to the user: minimum level, maximum level, default level, and level for the row label DBA_SA_USER_COMPARTMENTS Displays the compartments assigned to the user DBA_SA_USER_GROUPS Displays the groups assigned to the user

Label Security Administrator's Guide, 11g Release 1 (11.1)

Understanding Access Controls and Privileges

3.2.2 The Row LabelWhen a user writes data without specifying its label, a row label is assigned automatically, using the user's session label. However, the user can set the label for the written row, within certain restrictions on the components of the label he specifies. The level of this label can be set to any level within the range specified by the administrator. For example, it can be set to the level of the user's

Label Security Administrator's Guide, 11g Release 1 (11.1)

Administering User Labels and Privileges

8.2 Managing User Labels by Component, with SA_USER_ADMINThe following SA_USER_ADMIN procedures enable you to manage user labels by label component: SA_USER_ADMIN.SET_LEVELS SA_USER_ADMIN.SET_COMPARTMENTS SA_USER_ADMIN.SET_GROUPS SA_USER_ADMIN.ADD_COMPARTMENTS SA_USER_ADMIN.ALTER_COMPARTMENTS SA_USER_ADMIN.DROP_COMPARTMENTS SA_USER_ADMIN.DROP_ALL_COMPARTMENTS SA_USER_ADMIN.ADD_GROUPS SA_USER_ADMIN.ALTER_GROUPS SA_USER_ADMIN.DROP_GROUPS SA_USER_ADMIN.DROP_ALL_GROUPS

Providers for ASP.NET Developer's Guide, 11g Release 1 (11.1)

Oracle Providers for ASP.NET Installation

Database Privileges for SetupOracle Providers for ASP.NET requires the following privileges: Change notification Create job … script execution may indicate that the user needs to be granted the above privileges. If this is … the case, the database administrator must grant these privileges. The Oracle Session State Provider

Streams Advanced Queuing User's Guide, 11g Release 1 (11.1)

Oracle Streams AQ Administrative Interface

8.4.3 Granting Queue PrivilegesVARCHAR2, grant_option IN BOOLEAN:= FALSE); This procedure grants privileges on a queue to users and roles … . The privileges are ENQUEUE, DEQUEUE, or ALL. Initially, only the queue table owner can use this … procedure to grant privileges on the queues. Caution: This procedure requires that EXECUTE privileges

XML DB Developer's Guide, 11g Release 1 (11.1)

Access Control Lists and Security Classes

Operation Description Privileges RequiredOracle XML DB Installation\" for information about treatment of database access privileges when upgrading

Real Application Clusters Administration and Deployment Guide, 11g Release 1 (11.1)

Oracle Real Application Clusters Tools Messages

PRKV-1063 \"Insufficient privileges.\"Cause: Action: Enter valid netmask in place of {0} before reattempting command. PRKV-1063 \"Insufficient privileges.\"

Real Application Clusters Installation Guide for Linux and UNIX, 11g Release 1 (11.1)

Oracle Application Express Postinstallation Tasks

5.6.1 Granting Connect PrivilegesThe following example demonstrates how to grant connect privileges to any host for the FLOWS_03000

Data Mining Application Developer's Guide, 11g Release 1 (11.1)

Building a Model

Mining Model Privilegesschemas if you have the appropriate system privileges. For example, CREATE ANY MINING MODEL enables you

XML DB Developer's Guide, 11g Release 1 (11.1)

Full-Text Search Over XML Data

Roles and PrivilegesTo run the examples you will need the CTXAPP role, as well as CONNECT and RESOURCE. You must also have EXECUTE privilege on the CTXSYS package CTX_DDL.

Streams Advanced Queuing User's Guide, 11g Release 1 (11.1)

Managing Oracle Streams AQ

Operation(s) Privileges Requiredprivileges needed. CREATE / DROP / MONITOR any queues Must be granted EXECUTE rights on DBMS_AQADM and be … rights on DBMS_AQ. No other privileges needed. ENQUEUE / DEQUEUE to another's queues Must be granted … EXECUTE rights on DBMS_AQ and be granted privileges by the owner using DBMS_AQADM … ANY QUEUE or DEQUEUE ANY QUEUE system

Streams Advanced Queuing User's Guide, 11g Release 1 (11.1)

Oracle Streams AQ Administrative Interface

8.4.4 Revoking Queue PrivilegesVARCHAR2); This procedure revokes privileges on a queue from users and roles. The privileges are ENQUEUE … privileges propagated through the GRANT option are revoked if the grantor's privileges are revoked

OLAP User's Guide, 11g Release 1 (11.1)

Security

About the PrivilegesUsing both object security and data security, you can grant and revoke the following privileges … this privilege to refresh a dimension or cube. Users exercise these privileges either using

Streams Advanced Queuing User's Guide, 11g Release 1 (11.1)

Oracle Streams AQ Administrative Interface

8.4 Granting and Revoking PrivilegesThis section contains these topics: Granting Oracle Streams AQ System Privileges Revoking Oracle … Streams AQ System Privileges Granting Queue Privileges Revoking Queue Privileges

XML DB Developer's Guide, 11g Release 1 (11.1)

Access Control Lists and Security Classes

Database Privileges for Repository OperationsDatabase Privileges for Repository Operations Table 27-1 shows the database privileges required for … some common operations on resources in Oracle XML DB Repository. In addition to the privileges … listed in column Privileges Required you must have the resolve privilege for the folder containing the … resource

Streams Advanced Queuing User's Guide, 11g Release 1 (11.1)

Oracle JMS Basic Operations

12.9 Granting and Revoking PrivilegesThis section contains these topics: Granting Oracle Streams AQ System Privileges Revoking Oracle … Streams AQ System Privileges Granting Publish/Subscribe Topic Privileges Revoking Publish/Subscribe … Topic Privileges Granting Point-to-Point Queue Privileges Revoking Point-to-Point Queue Privileges

Data Mining Administrator's Guide, 11g Release 1 (11.1)

Users and Privileges for Data Mining

Privileges Required for Data MiningOracle Corporation recommends a set of basic privileges for data mining. The following GRANT … statements grant these privileges to a user named dmuser. GRANT create mining model TO dmuser; GRANT … models. The other privileges may not be required for some mining activities, however it is prudent to … and object privileges

Data Mining Administrator's Guide, 11g Release 1 (11.1)

Users and Privileges for Data Mining

System Privileges for Mining Modelsan action on a type of schema objects. For example, the privileges to create tablespaces and to … delete the rows of any table in a database are system privileges. To grant a system privilege, you must … ANY PRIVILEGE system privilege. The system privileges listed in Table 4-1 are required for performing … specific operations

Data Mining Administrator's Guide, 11g Release 1 (11.1)

Users and Privileges for Data Mining

Object Privileges on Mining Modelsprivilege. A user automatically has all object privileges for schema objects contained in his or her … role. Table 4-2 Object Privileges for Data Mining Object Privilege Allows you to.... ALTER MINING





Was this page helpful?

Integrated Cloud Applications & Platform Services