How do I narrow my search results?
After you submit your search query:
- On the Refine Search results page, select one or more categories of products or services from the left sidebar.
- Then for a category with search results, click Select to choose your product and release filters, and then click OK.
For search queries that contain multiple words, surround the query with quotes, and then resubmit your query. Example: "database cloud service"
How do I find the documentation for my product or service?
From the home page, click the technology categories for your products or services. If you do not know which category to pick, try the following features:
- Click the Find a product tab and search for your product or service.
- Click Browse All Products & Services at the bottom of the home page to view an alphabetical listing of products and services.
- Apple Safari: Version 6
- Google Chrome: Version 29 and later
- Mozilla Firefox: Version 24 and later
- Microsoft Internet Explorer: Version 9 and later
Managing User Privileges and Roles → Privileges and roles are used to control user access to data and the types of SQL statements that … can be executed. The table that follows describes the three types of privileges and roles: Type … privilege that controls access to a specific object. Role A collection of privileges and other roles … . Some system-defined roles
Roles → There are, at most, three types of database roles created for each provider: BasicAccess - Provides … roles created for each provider. Table 1-4 Roles and Privileges Oracle Provider Oracle Database Role
Roles → You can assign a user to one or more roles. If you assign multiple roles with conflicting … granted to the multiple roles. For example, if you assign to the same user a role that allows … a user to a role that does not display on the Available Roles List, close the editor, create the new … role, and then edit
Viewing Roles → You view roles on the Roles page of Oracle Enterprise Manager Database Control (Database Control).
Dropping Roles → users and roles granted a dropped role are immediately changed to reflect the absence of the dropped … role privileges. All indirectly granted roles of the dropped role are also removed from affected
Administering Roles → Roles are named groups of related system and object privileges. You create roles and then assign … them to users and to other roles. This section contains the following topics: Viewing Roles Example … : Creating a Role Example: Modifying a Role Deleting a Role See Also: \"About User Privileges and Roles
Viewing Consumer Groups Granted to Users or Roles → The DBA_RSRC_CONSUMER_GROUP_PRIVS view displays the consumer groups granted to users or roles
Granting and Revoking Roles → This section contains: About Granting and Revoking Roles Who Can Grant or Revoke Roles? See Also … : \"Granting a User Privileges and Roles\" \"Revoking Privileges and Roles from a User\" \"When Do … Grants and Revokes Take Effect?\" \"Finding Information About User Privileges and Roles\" Oracle
To view roles: → Go to the Database Home page, logging in with a user account that has privileges to manage roles … the page, click Server to view the Server subpage. In the Security section, click Roles. The Roles … the list of roles, click Next to view the next page. Continue clicking Next until you see the … View. The View
Managing User Roles → This section contains: About User Roles Predefined Roles in an Oracle Database Installation … Creating a Role Specifying the Type of Role Authorization Dropping Roles Restricting SQL*Plus Users from … Using Database Roles Securing Role Privileges by Using Secure Application Roles
About User Roles → Managing and controlling privileges is easier when you use roles, which are named groups of related … privileges that you grant as a group to users or other roles. Within a database, each role name … must be unique, different from all user names and all other role names. Unlike schema objects, roles … the role. This section contains:
Guidelines for Securing Roles → Follow these guidelines when managing roles: Grant a role to users only if they need all privileges … of the role. Roles (groups of privileges) are useful for quickly and easily granting permissions to … users. Although you can use Oracle-defined roles, you have more control and continuity if you … create your own roles
About Privileges and Roles → on. The types of privileges are defined by Oracle Database. Roles are created by users (usually … administrators) to group together privileges or other roles. They are a way to facilitate the granting of … multiple privileges or roles to users. This section describes the following general categories … privileges in detail. User
2.12.1 Creating Custom Configuration Groups and Users for Job Roles → job roles. Log in as root to create these groups and users. Understanding Restrictions for Oracle
About User Privileges and Roles → privileges is made easier by using roles, which are named groups of related privileges. You create … roles, grant system and object privileges to the roles, and then grant roles to users. You can also … grant roles to other roles. Unlike schema objects, roles are not
Listing Roles of the Database → You can use the DBA_ROLES data dictionary view to list all roles of a database and the … authentication used for each role. For example, the following query lists all the roles in the database: SELECT
Granting System Privileges and Roles → You can use the GRANT SQL statement to grant system privileges and roles to users and roles. The … exec_dir TO jward; Note: Object privileges cannot be granted along with system privileges and roles … granting system privileges or roles with the ADMIN option. These privileges are usually reserved for a
Revoking System Privileges and Roles → You can revoke system privileges and roles using the SQL statement REVOKE. Any user with the ADMIN
Invoker's Rights and Definer's Rights (AUTHID Property) → those of the CURRENT_USER and the enabled roles. When a session starts, CURRENT_SCHEMA has the value of … currently enabled roles and the current values of CURRENT_USER and CURRENT_SCHEMA. It then changes both … stored and new roles and values are not necessarily different.) When the DR unit is popped from the … call stack, the
database roles → : Database users and database roles. A database user is also sometimes referred to as a database schema … to database users, applications, or other database roles — see \"Database Roles Map Database Privileges to Users\".
OMBLIST ROLES → Purpose To list existing roles or list existing roles whose names match the given regular expression or list the granted roles of a given user.
Associating Privileges with User Database Roles → contains: Why Users Should Only Have the Privileges of the Current Database Role Using the SET ROLE Statement to Automatically Enable or Disable Roles
Table 4-3 Oracle Database Predefined Roles → the DBA_SYS_PRIVS data dictionary view. Note: Oracle recommends that you design your own roles for … that you design your own roles for database security rather than relying on this role. This role may … tables SYS.INCVID, SYS.INCFIL, and SYS.INCEXP. Also the following roles: EXECUTE_CATALOG_ROLE and … DBA_SYS_PRIVS to view privileges)
Granting a User Privileges and Roles → This section contains: Granting System Privileges and Roles Granting Object Privileges Granting … Privileges on Columns It is also possible to grant roles to a user connected through a middle tier or
Revoking Privileges and Roles from a User → This section contains: Revoking System Privileges and Roles Revoking Object Privileges Cascading Effects of Revoking Privileges
Finding Information About User Privileges and Roles → privileges and roles. See Oracle Database Reference for detailed information about these views.
Predefined Roles in an Oracle Database Installation → Figure 4-1 Common Uses for Roles Description of ''Figure 4-1 Common Uses for Roles'' Common Uses of … Application Roles Grant an application role all privileges necessary to run a given database … application. Then, grant the secure application role to other roles or to specific users. An application … can have
Syntax → parseListRole = OMBLIST ROLES ( [ \"QUOTED_STRING\" | ( OF USER \"QUOTED_STRING\" ) ] )
Prerequisites → Warehouse Builder users can be list from any context.
Parameters → parseListRole This clause lists existing roles or lists existing roles whose names match the given … regular expression or lists the granted roles of a given user.
CREATE TRIGGER Statement → than acquired through roles. Syntax create_trigger::= Description of the illustration … roles or object privileges to another user or to a role. NOAUDIT Causes the database to fire the … trigger whenever a REVOKE statement removes system privileges or roles or object privileges from a
CREATE TYPE Statement → owner cannot obtain these privileges through roles. If the type owner intends to grant other users
Table 4-2 Properties of Roles and Their Description → the role. Selective availability of privileges You can selectively enable or disable the roles … awareness The data dictionary records which roles exist, so you can design applications to query … the dictionary and automatically enable (or disable) selective roles when a user attempts to execute … often create roles
Securing Role Privileges by Using Secure Application Roles → secure application roles to ensure the existence of a database connection. Because a secure application … Roles to Control Access to Applications\" Oracle Database 2 Day + Security Guide
Creating Secure Application Roles to Control Access to Applications → As explained in \"Securing Role Privileges by Using Secure Application Roles\", a secure
About Granting Roles Using the Operating System or Network → Instead of a security administrator explicitly granting and revoking database roles to and from … roles to users at connect time. Roles can be administered using the operating system and passed to … Oracle Database when a user creates a session. As part of this mechanism, the default roles of a user … and the
Required Roles for Data Pump Export and Import Operations → role and/or the DATAPUMP_IMP_FULL_DATABASE role. These roles are automatically defined for Oracle … the names of these roles contain the word FULL, these roles are actually required for all export and … SQLFILE parameter. These roles allow users performing exports and imports to do the following … ) that unprivileged
Example: Granting Privileges and Roles to a User Account → SELECT_CATALOG_ROLE role. The following table summarizes the privileges and roles to grant to Nick. Grant Type … on all tables in the hr schema Roles APPDEV, SELECT_CATALOG_ROLE The following example assumes that … : Modifying a User Account\" ). The example also assumes that you have not yet granted any privileges or roles to Nick.
Enabling and Disabling Roles When OS_ROLES Is Set to TRUE → Oracle Database ignores it.) When OS_ROLES is set to TRUE, then the user can enable up to 148 roles … . Remember that this number includes other roles that may have been granted to the role.
To grant privileges and roles to the user Nick: → Toward the top of the Create User or Edit User page, click Roles to display the Roles subpage. The … Roles subpage shows that the CONNECT role is assigned to Nick. Database Control automatically … .) Click Edit List. The Modify Roles page appears. Description of the illustration modify_roles.gif … In the Available
Granting Roles Using the Operating System or Network → This section contains: About Granting Roles Using the Operating System or Network Using Operating … System Role Identification Using Operating System Role Management Granting and Revoking Roles When … OS_ROLES Is Set to TRUE Enabling and Disabling Roles When OS_ROLES Is Set to TRUE Using Network Connections with Operating System Role
Restricting SQL*Plus Users from Using Database Roles → roles and thus, prevent serious security problems. Potential Security Problems of Using Ad Hoc Tools … Limiting Roles Through the PRODUCT_USER_PROFILE Table Using Stored Procedures to Encapsulate Business … control the potential actions of a user, including the enabling and disabling of user roles while … granted to him explicitly
Granting and Revoking Roles When OS_ROLES Is Set to TRUE → and revoking of roles to users. Any previous granting of roles to users using GRANT statements do … at the operating system level apply. Users can still grant privileges to roles and users. Note: If … the operating system grants a role to a user with the ADMIN option, then the user can grant the role only to other roles.
Listing Information About the Privilege Domains of Roles → about the privilege domains of roles. For example, the following query lists all the roles granted to
The Maximum Number of Roles That a User Can Enable → A user can enable no more than 148 roles.You can grant a user as many roles as you want, but you … should restrict the number of roles granted to a user to the minimum roles the user needs. See … \"Guidelines for Securing Roles\" for additional guidelines on granting roles to users.
Step 2 Grant Roles → The following SQL statement grants the required roles of RESOURCE, CONNECT, and CTXAPP to MYUSER: GRANT RESOURCE, CONNECT, CTXAPP TO MYUSER;
Disabling User Roles → the Userid column, \"ROLES\" in the Attribute column, and the role name in the Char_Value column … . You should only use \"%\" or \"PUBLIC\" for roles which are granted to \"PUBLIC\". If you try to … disable a role that has not been granted to a user, none of the roles for that user are disabled. The … ------- ------ ---------
Roles and Privileges → To run the examples, you need database roles CTXAPP, CONNECT, and RESOURCE. You must also have EXECUTE privilege on the CTXSYS package CTX_DDL.
Defining Security Roles → You can use roles to represent groups of users with similar responsibilities and privileges. Unlike … users which are also database users, these roles are not database roles. These roles are purely … design constructs for implementing security within the product. Roles enable you to more efficiently
Changing Database Default Roles → For security reasons, you cannot register database users that have ALL default roles in the … privilege and issue the required commands. Note the following SQL script for changing the default roles of
Creating and Controlling Roles → You can use SQL commands to create and control access to roles to provide security for your … certain users have access to particular database privileges. Roles are created and used with the SQL … CREATE, GRANT, and SET commands: To create a role, you use the CREATE command. You can create roles … with or without passwords. To
Understanding User Roles → divided into three primary roles: Developers create and edit applications. Workspace administrators
Understanding Application Express User Roles → area called a workspace. Users are divided into four primary roles: Developers are users who create and
Table 4-1 Roles to Allow Access to SYS Schema Objects → roles and the SELECT ANY DICTIONARY system privilege with extreme care, because the integrity of your system can be compromised by their misuse.
Using the SET ROLE Statement to Automatically Enable or Disable Roles → users operating in a well-defined privilege domain. If a user obtains privileges only from roles … Grants and Revokes Take Effect?\" for information about enabling and disabling roles \"How the SET ROLE Statement Affects Grants and Revokes\"
Setting the Precedence of Multiple Users and Roles in One Access Control List → By default, Oracle Database grants or denies privileges to users and roles based on their physical
Table 4-7 Data Dictionary Views That Display Information about Privileges and Roles → DBA_ROLES Lists all roles that exist in the database, including secure application roles DBA_ROLE_PRIVS … Lists roles directly granted to users and roles. Note that it does not list the PUBLIC role … . DBA_SYS_PRIVS Lists system privileges granted to users and roles ROLE_ROLE_PRIVS Lists roles
To identify which users and roles in your database are granted the CONNECT role → ', 'WMSYS', 'EXFSYS', 'SYSMAN', 'MDDATA', 'SI_INFORMTN_SCHEMA', 'XDB', 'ODM'); If users or roles require
12.1.3 Granting Roles and Privileges to Users → The system uses the standard SQL model for granting roles to users. To grant a Text role to a user
Setting Control Center Agent Security Roles → To configure Control Center Agent security roles: In a Web browser, navigate to the Enterprise … in Roles column. Description of the illustration jrt_security_06.gif On the Roles screen, click … Role screen, enter Name OWB_J2EE_OPERATOR. Under Assign Roles, in the list of Available Roles, select