How do I narrow my search results?
After you submit your search query:
- On the Refine Search results page, select one or more categories of products or services from the left sidebar.
- Then for a category with search results, click Select to choose your product and release filters, and then click OK.
For search queries that contain multiple words, surround the query with quotes, and then resubmit your query. Example: "database cloud service"
How do I find the documentation for my product or service?
From the home page, click the technology categories for your products or services. If you do not know which category to pick, try the following features:
- Click the Find a product tab and search for your product or service.
- Click Browse All Products & Services at the bottom of the home page to view an alphabetical listing of products and services.
- Apple Safari: Version 6
- Google Chrome: Version 29 and later
- Mozilla Firefox: Version 24 and later
- Microsoft Internet Explorer: Version 9 and later
Managing User Privileges and Roles → Privileges and roles are used to control user access to data and the types of SQL statements that … can be executed. The table that follows describes the three types of privileges and roles: Type … privilege that controls access to a specific object. Role A collection of privileges and other roles … . Some system-defined roles
Roles → You can assign a user to one or more roles. If you assign multiple roles with conflicting … granted to the multiple roles. For example, if you assign to the same user a role that allows … a user to a role that does not display on the Available Roles List, close the editor, create the new … role, and then edit
Roles → There are, at most, three types of database roles created for each provider: BasicAccess - Provides … roles created for each provider. Table 1-4 Roles and Privileges Oracle Provider Oracle Database Role
Dropping Roles → users and roles granted a dropped role are immediately changed to reflect the absence of the dropped … role privileges. All indirectly granted roles of the dropped role are also removed from affected
Viewing Consumer Groups Granted to Users or Roles → The DBA_RSRC_CONSUMER_GROUP_PRIVS view displays the consumer groups granted to users or roles
Guidelines for Securing Roles → Follow these guidelines when managing roles: Grant a role to users only if they need all privileges … of the role. Roles (groups of privileges) are useful for quickly and easily granting permissions to … users. Although you can use Oracle-defined roles, you have more control and continuity if you … create your own roles
About Privileges and Roles → on. The types of privileges are defined by Oracle Database. Roles are created by users (usually … administrators) to group together privileges or other roles. They are a way to facilitate the granting of … multiple privileges or roles to users. This section describes the following general categories … privileges in detail. User
Managing User Roles → This section contains: About User Roles Predefined Roles in an Oracle Database Installation … Creating a Role Specifying the Type of Role Authorization Dropping Roles Restricting SQL*Plus Users from … Using Database Roles Securing Role Privileges by Using Secure Application Roles
About User Roles → Managing and controlling privileges is easier when you use roles, which are named groups of related … privileges that you grant as a group to users or other roles. Within a database, each role name … must be unique, different from all user names and all other role names. Unlike schema objects, roles … the role. This section contains:
Granting and Revoking Roles → This section contains: About Granting and Revoking Roles Who Can Grant or Revoke Roles? See Also … : \"Granting a User Privileges and Roles\" \"Revoking Privileges and Roles from a User\" \"When Do … Grants and Revokes Take Effect?\" \"Finding Information About User Privileges and Roles\" Oracle
2.12.1 Creating Custom Configuration Groups and Users for Job Roles → job roles. Log in as root to create these groups and users. Understanding Restrictions for Oracle
Granting System Privileges and Roles → You can use the GRANT SQL statement to grant system privileges and roles to users and roles. The … exec_dir TO jward; Note: Object privileges cannot be granted along with system privileges and roles … granting system privileges or roles with the ADMIN option. These privileges are usually reserved for a
Listing Roles of the Database → You can use the DBA_ROLES data dictionary view to list all roles of a database and the … authentication used for each role. For example, the following query lists all the roles in the database: SELECT
Revoking System Privileges and Roles → You can revoke system privileges and roles using the SQL statement REVOKE. Any user with the ADMIN
OMBLIST ROLES → Purpose To list existing roles or list existing roles whose names match the given regular expression or list the granted roles of a given user.
database roles → : Database users and database roles. A database user is also sometimes referred to as a database schema … to database users, applications, or other database roles — see \"Database Roles Map Database Privileges to Users\".
Granting a User Privileges and Roles → This section contains: Granting System Privileges and Roles Granting Object Privileges Granting … Privileges on Columns It is also possible to grant roles to a user connected through a middle tier or
Finding Information About User Privileges and Roles → privileges and roles. See Oracle Database Reference for detailed information about these views.
Associating Privileges with User Database Roles → contains: Why Users Should Only Have the Privileges of the Current Database Role Using the SET ROLE Statement to Automatically Enable or Disable Roles
Predefined Roles in an Oracle Database Installation → Figure 4-1 Common Uses for Roles Description of ''Figure 4-1 Common Uses for Roles'' Common Uses of … Application Roles Grant an application role all privileges necessary to run a given database … application. Then, grant the secure application role to other roles or to specific users. An application … can have