How do I narrow my search results?
After you submit your search query:
- On the Refine Search results page, select one or more categories of products or services from the left sidebar.
- Then for a category with search results, click Select to choose your product and release filters, and then click OK.
For search queries that contain multiple words, surround the query with quotes, and then resubmit your query. Example: "database cloud service"
How do I find the documentation for my product or service?
From the home page, click the technology categories for your products or services. If you do not know which category to pick, try the following features:
- Click the Find a product tab and search for your product or service.
- Click Browse All Products & Services at the bottom of the home page to view an alphabetical listing of products and services.
- Apple Safari: Version 6
- Google Chrome: Version 29 and later
- Mozilla Firefox: Version 24 and later
- Microsoft Internet Explorer: Version 9 and later
OMBLIST ROLES → Purpose To list existing roles or list existing roles whose names match the given regular expression or list the granted roles of a given user.
Associating Privileges with User Database Roles → contains: Why Users Should Only Have the Privileges of the Current Database Role Using the SET ROLE Statement to Automatically Enable or Disable Roles
Table 4-3 Oracle Database Predefined Roles → the DBA_SYS_PRIVS data dictionary view. Note: Oracle recommends that you design your own roles for … that you design your own roles for database security rather than relying on this role. This role may … tables SYS.INCVID, SYS.INCFIL, and SYS.INCEXP. Also the following roles: EXECUTE_CATALOG_ROLE and … DBA_SYS_PRIVS to view privileges)
Granting a User Privileges and Roles → This section contains: Granting System Privileges and Roles Granting Object Privileges Granting … Privileges on Columns It is also possible to grant roles to a user connected through a middle tier or
Revoking Privileges and Roles from a User → This section contains: Revoking System Privileges and Roles Revoking Object Privileges Cascading Effects of Revoking Privileges
Finding Information About User Privileges and Roles → privileges and roles. See Oracle Database Reference for detailed information about these views.
Predefined Roles in an Oracle Database Installation → Figure 4-1 Common Uses for Roles Description of ''Figure 4-1 Common Uses for Roles'' Common Uses of … Application Roles Grant an application role all privileges necessary to run a given database … application. Then, grant the secure application role to other roles or to specific users. An application … can have
Syntax → parseListRole = OMBLIST ROLES ( [ \"QUOTED_STRING\" | ( OF USER \"QUOTED_STRING\" ) ] )
Prerequisites → Warehouse Builder users can be list from any context.
Parameters → parseListRole This clause lists existing roles or lists existing roles whose names match the given … regular expression or lists the granted roles of a given user.
CREATE TRIGGER Statement → than acquired through roles. Syntax create_trigger::= Description of the illustration … roles or object privileges to another user or to a role. NOAUDIT Causes the database to fire the … trigger whenever a REVOKE statement removes system privileges or roles or object privileges from a
CREATE TYPE Statement → owner cannot obtain these privileges through roles. If the type owner intends to grant other users
Table 4-2 Properties of Roles and Their Description → the role. Selective availability of privileges You can selectively enable or disable the roles … awareness The data dictionary records which roles exist, so you can design applications to query … the dictionary and automatically enable (or disable) selective roles when a user attempts to execute … often create roles
Securing Role Privileges by Using Secure Application Roles → secure application roles to ensure the existence of a database connection. Because a secure application … Roles to Control Access to Applications\" Oracle Database 2 Day + Security Guide
Creating Secure Application Roles to Control Access to Applications → As explained in \"Securing Role Privileges by Using Secure Application Roles\", a secure
About Granting Roles Using the Operating System or Network → Instead of a security administrator explicitly granting and revoking database roles to and from … roles to users at connect time. Roles can be administered using the operating system and passed to … Oracle Database when a user creates a session. As part of this mechanism, the default roles of a user … and the
Required Roles for Data Pump Export and Import Operations → role and/or the DATAPUMP_IMP_FULL_DATABASE role. These roles are automatically defined for Oracle … the names of these roles contain the word FULL, these roles are actually required for all export and … SQLFILE parameter. These roles allow users performing exports and imports to do the following … ) that unprivileged
Example: Granting Privileges and Roles to a User Account → SELECT_CATALOG_ROLE role. The following table summarizes the privileges and roles to grant to Nick. Grant Type … on all tables in the hr schema Roles APPDEV, SELECT_CATALOG_ROLE The following example assumes that … : Modifying a User Account\" ). The example also assumes that you have not yet granted any privileges or roles to Nick.
Enabling and Disabling Roles When OS_ROLES Is Set to TRUE → Oracle Database ignores it.) When OS_ROLES is set to TRUE, then the user can enable up to 148 roles … . Remember that this number includes other roles that may have been granted to the role.
To grant privileges and roles to the user Nick: → Toward the top of the Create User or Edit User page, click Roles to display the Roles subpage. The … Roles subpage shows that the CONNECT role is assigned to Nick. Database Control automatically … .) Click Edit List. The Modify Roles page appears. Description of the illustration modify_roles.gif … In the Available