How do I narrow my search results?
After you submit your search query:
- On the Refine Search results page, select one or more categories of products or services from the left sidebar.
- Then for a category with search results, click Select to choose your product and release filters, and then click OK.
For search queries that contain multiple words, surround the query with quotes, and then resubmit your query. Example: "database cloud service"
How do I find the documentation for my product or service?
From the home page, click the technology categories for your products or services. If you do not know which category to pick, try the following features:
- Click the Find a product tab and search for your product or service.
- Click Browse All Products & Services at the bottom of the home page to view an alphabetical listing of products and services.
- Apple Safari: Version 6
- Google Chrome: Version 29 and later
- Mozilla Firefox: Version 24 and later
- Microsoft Internet Explorer: Version 9 and later
Managing User Privileges and Roles → Privileges and roles are used to control user access to data and the types of SQL statements that … can be executed. The table that follows describes the three types of privileges and roles: Type … privilege that controls access to a specific object. Role A collection of privileges and other roles … . Some system-defined roles
Roles → There are, at most, three types of database roles created for each provider: BasicAccess - Provides … roles created for each provider. Table 1-4 Roles and Privileges Oracle Provider Oracle Database Role
Roles → You can assign a user to one or more roles. If you assign multiple roles with conflicting … granted to the multiple roles. For example, if you assign to the same user a role that allows … a user to a role that does not display on the Available Roles List, close the editor, create the new … role, and then edit
Dropping Roles → users and roles granted a dropped role are immediately changed to reflect the absence of the dropped … role privileges. All indirectly granted roles of the dropped role are also removed from affected
Viewing Consumer Groups Granted to Users or Roles → The DBA_RSRC_CONSUMER_GROUP_PRIVS view displays the consumer groups granted to users or roles
Managing User Roles → This section contains: About User Roles Predefined Roles in an Oracle Database Installation … Creating a Role Specifying the Type of Role Authorization Dropping Roles Restricting SQL*Plus Users from … Using Database Roles Securing Role Privileges by Using Secure Application Roles
About Privileges and Roles → on. The types of privileges are defined by Oracle Database. Roles are created by users (usually … administrators) to group together privileges or other roles. They are a way to facilitate the granting of … multiple privileges or roles to users. This section describes the following general categories … privileges in detail. User
Guidelines for Securing Roles → Follow these guidelines when managing roles: Grant a role to users only if they need all privileges … of the role. Roles (groups of privileges) are useful for quickly and easily granting permissions to … users. Although you can use Oracle-defined roles, you have more control and continuity if you … create your own roles
Granting and Revoking Roles → This section contains: About Granting and Revoking Roles Who Can Grant or Revoke Roles? See Also … : \"Granting a User Privileges and Roles\" \"Revoking Privileges and Roles from a User\" \"When Do … Grants and Revokes Take Effect?\" \"Finding Information About User Privileges and Roles\" Oracle
About User Roles → Managing and controlling privileges is easier when you use roles, which are named groups of related … privileges that you grant as a group to users or other roles. Within a database, each role name … must be unique, different from all user names and all other role names. Unlike schema objects, roles … the role. This section contains:
2.12.1 Creating Custom Configuration Groups and Users for Job Roles → job roles. Log in as root to create these groups and users. Understanding Restrictions for Oracle
Revoking System Privileges and Roles → You can revoke system privileges and roles using the SQL statement REVOKE. Any user with the ADMIN
Listing Roles of the Database → You can use the DBA_ROLES data dictionary view to list all roles of a database and the … authentication used for each role. For example, the following query lists all the roles in the database: SELECT
Granting System Privileges and Roles → You can use the GRANT SQL statement to grant system privileges and roles to users and roles. The … exec_dir TO jward; Note: Object privileges cannot be granted along with system privileges and roles … granting system privileges or roles with the ADMIN option. These privileges are usually reserved for a
database roles → : Database users and database roles. A database user is also sometimes referred to as a database schema … to database users, applications, or other database roles — see \"Database Roles Map Database Privileges to Users\".
OMBLIST ROLES → Purpose To list existing roles or list existing roles whose names match the given regular expression or list the granted roles of a given user.
Table 4-3 Oracle Database Predefined Roles → the DBA_SYS_PRIVS data dictionary view. Note: Oracle recommends that you design your own roles for … that you design your own roles for database security rather than relying on this role. This role may … tables SYS.INCVID, SYS.INCFIL, and SYS.INCEXP. Also the following roles: EXECUTE_CATALOG_ROLE and … DBA_SYS_PRIVS to view privileges)
Predefined Roles in an Oracle Database Installation → Figure 4-1 Common Uses for Roles Description of ''Figure 4-1 Common Uses for Roles'' Common Uses of … Application Roles Grant an application role all privileges necessary to run a given database … application. Then, grant the secure application role to other roles or to specific users. An application … can have
Associating Privileges with User Database Roles → contains: Why Users Should Only Have the Privileges of the Current Database Role Using the SET ROLE Statement to Automatically Enable or Disable Roles
Finding Information About User Privileges and Roles → privileges and roles. See Oracle Database Reference for detailed information about these views.
Revoking Privileges and Roles from a User → This section contains: Revoking System Privileges and Roles Revoking Object Privileges Cascading Effects of Revoking Privileges
Granting a User Privileges and Roles → This section contains: Granting System Privileges and Roles Granting Object Privileges Granting … Privileges on Columns It is also possible to grant roles to a user connected through a middle tier or
Prerequisites → Warehouse Builder users can be list from any context.
Syntax → parseListRole = OMBLIST ROLES ( [ \"QUOTED_STRING\" | ( OF USER \"QUOTED_STRING\" ) ] )
Parameters → parseListRole This clause lists existing roles or lists existing roles whose names match the given … regular expression or lists the granted roles of a given user.
About Granting Roles Using the Operating System or Network → Instead of a security administrator explicitly granting and revoking database roles to and from … roles to users at connect time. Roles can be administered using the operating system and passed to … Oracle Database when a user creates a session. As part of this mechanism, the default roles of a user … and the
Listing Information About the Privilege Domains of Roles → about the privilege domains of roles. For example, the following query lists all the roles granted to
Table 4-2 Properties of Roles and Their Description → the role. Selective availability of privileges You can selectively enable or disable the roles … awareness The data dictionary records which roles exist, so you can design applications to query … the dictionary and automatically enable (or disable) selective roles when a user attempts to execute … often create roles
Required Roles for Data Pump Export and Import Operations → role and/or the DATAPUMP_IMP_FULL_DATABASE role. These roles are automatically defined for Oracle … the names of these roles contain the word FULL, these roles are actually required for all export and … SQLFILE parameter. These roles allow users performing exports and imports to do the following … ) that unprivileged
Restricting SQL*Plus Users from Using Database Roles → roles and thus, prevent serious security problems. Potential Security Problems of Using Ad Hoc Tools … Limiting Roles Through the PRODUCT_USER_PROFILE Table Using Stored Procedures to Encapsulate Business … control the potential actions of a user, including the enabling and disabling of user roles while … granted to him explicitly
Granting and Revoking Roles When OS_ROLES Is Set to TRUE → and revoking of roles to users. Any previous granting of roles to users using GRANT statements do … at the operating system level apply. Users can still grant privileges to roles and users. Note: If … the operating system grants a role to a user with the ADMIN option, then the user can grant the role only to other roles.
Granting Roles Using the Operating System or Network → This section contains: About Granting Roles Using the Operating System or Network Using Operating … System Role Identification Using Operating System Role Management Granting and Revoking Roles When … OS_ROLES Is Set to TRUE Enabling and Disabling Roles When OS_ROLES Is Set to TRUE Using Network Connections with Operating System Role
Creating Secure Application Roles to Control Access to Applications → As explained in \"Securing Role Privileges by Using Secure Application Roles\", a secure
Enabling and Disabling Roles When OS_ROLES Is Set to TRUE → Oracle Database ignores it.) When OS_ROLES is set to TRUE, then the user can enable up to 148 roles … . Remember that this number includes other roles that may have been granted to the role.
The Maximum Number of Roles That a User Can Enable → A user can enable no more than 148 roles.You can grant a user as many roles as you want, but you … should restrict the number of roles granted to a user to the minimum roles the user needs. See … \"Guidelines for Securing Roles\" for additional guidelines on granting roles to users.
Securing Role Privileges by Using Secure Application Roles → secure application roles to ensure the existence of a database connection. Because a secure application … Roles to Control Access to Applications\" Oracle Database 2 Day + Security Guide
Disabling User Roles → the Userid column, \"ROLES\" in the Attribute column, and the role name in the Char_Value column … . You should only use \"%\" or \"PUBLIC\" for roles which are granted to \"PUBLIC\". If you try to … disable a role that has not been granted to a user, none of the roles for that user are disabled. The … ------- ------ ---------
Understanding User Roles → divided into three primary roles: Developers create and edit applications. Workspace administrators
Creating and Controlling Roles → You can use SQL commands to create and control access to roles to provide security for your … certain users have access to particular database privileges. Roles are created and used with the SQL … CREATE, GRANT, and SET commands: To create a role, you use the CREATE command. You can create roles … with or without passwords. To
Defining Security Roles → You can use roles to represent groups of users with similar responsibilities and privileges. Unlike … users which are also database users, these roles are not database roles. These roles are purely … design constructs for implementing security within the product. Roles enable you to more efficiently
Step 2 Grant Roles → The following SQL statement grants the required roles of RESOURCE, CONNECT, and CTXAPP to MYUSER: GRANT RESOURCE, CONNECT, CTXAPP TO MYUSER;
Roles and Privileges → To run the examples, you need database roles CTXAPP, CONNECT, and RESOURCE. You must also have EXECUTE privilege on the CTXSYS package CTX_DDL.
Changing Database Default Roles → For security reasons, you cannot register database users that have ALL default roles in the … privilege and issue the required commands. Note the following SQL script for changing the default roles of
Administering Roles → Roles are named groups of related system and object privileges. You create roles and then assign … them to users and to other roles. This section contains the following topics: Viewing Roles Example … : Creating a Role Example: Modifying a Role Deleting a Role See Also: \"About User Privileges and Roles
Viewing Roles → You view roles on the Roles page of Oracle Enterprise Manager Database Control (Database Control).
Understanding Application Express User Roles → area called a workspace. Users are divided into four primary roles: Developers are users who create and
Using the SET ROLE Statement to Automatically Enable or Disable Roles → users operating in a well-defined privilege domain. If a user obtains privileges only from roles … Grants and Revokes Take Effect?\" for information about enabling and disabling roles \"How the SET ROLE Statement Affects Grants and Revokes\"
Table 4-7 Data Dictionary Views That Display Information about Privileges and Roles → DBA_ROLES Lists all roles that exist in the database, including secure application roles DBA_ROLE_PRIVS … Lists roles directly granted to users and roles. Note that it does not list the PUBLIC role … . DBA_SYS_PRIVS Lists system privileges granted to users and roles ROLE_ROLE_PRIVS Lists roles
To identify which users and roles in your database are granted the CONNECT role → ', 'WMSYS', 'EXFSYS', 'SYSMAN', 'MDDATA', 'SI_INFORMTN_SCHEMA', 'XDB', 'ODM'); If users or roles require
Setting the Precedence of Multiple Users and Roles in One Access Control List → By default, Oracle Database grants or denies privileges to users and roles based on their physical
Table 4-1 Roles to Allow Access to SYS Schema Objects → roles and the SELECT ANY DICTIONARY system privilege with extreme care, because the integrity of your system can be compromised by their misuse.
12.1 Oracle Text Users and Roles → While any user can create an Oracle Text index and enter a CONTAINS query, Oracle Text provides the CTXSYS user for administration and the CTXAPP role for application developers.
12.1.3 Granting Roles and Privileges to Users → The system uses the standard SQL model for granting roles to users. To grant a Text role to a user
Setting Control Center Agent Security Roles → To configure Control Center Agent security roles: In a Web browser, navigate to the Enterprise … in Roles column. Description of the illustration jrt_security_06.gif On the Roles screen, click … Role screen, enter Name OWB_J2EE_OPERATOR. Under Assign Roles, in the list of Available Roles, select
9.9.1 Roles for Export and Import Operations → To perform export and import operations on the ORDDATA schema, administrators must have these roles … Utilities for more information about the required roles for the Oracle Data Pump Export and Import utilities
J2EE Roles for Control Center Agent Security → Oracle Warehouse Builder provides the following three roles to facilitate Oracle Warehouse Builder
9.1 Assigning Administrator Roles and Privileges → way database roles behave, tasks for which the administrator must write PL/SQL named procedures
6.11 Security Roles and Permitted Actions → To manage Oracle Label Security policies in Oracle Internet Directory, certain entities are given access control rights in the directory. The access control mechanisms are provided by Oracle Internet Directory. Table 6-3 describes, in abstract terms, these entities and the tasks they are enabled to perform. Table 6-4, \"Access Levels Allowed by Users in OID\", lists the specific access level operations
To view roles: → Go to the Database Home page, logging in with a user account that has privileges to manage roles … the page, click Server to view the Server subpage. In the Security section, click Roles. The Roles … the list of roles, click Next to view the next page. Continue clicking Next until you see the … View. The View
ORA-01925: Maximum of 30 enabled roles exceeded → -Dlimit parameter to 334. Save and close the file. Restart Oracle Warehouse Builder. ORA-01925: Maximum of 30 enabled roles exceeded