You are using an outdated browser. Please upgrade to the latest version for the best experience.
How do I narrow my search results?

After you submit your search query:

  1. On the Refine Search results page, select one or more categories of products or services from the left sidebar.
  2. Then for a category with search results, click Select to choose your product and release filters, and then click OK.

For search queries that contain multiple words, surround the query with quotes, and then resubmit your query. Example: "database cloud service"

How do I find the documentation for my product or service?

From the home page, click the technology categories for your products or services. If you do not know which category to pick, try the following features:

  • Click the Find a product tab and search for your product or service.
  • Click Browse All Products & Services at the bottom of the home page to view an alphabetical listing of products and services.
  • Apple Safari: Version 6
  • Google Chrome: Version 29 and later
  • Mozilla Firefox: Version 24 and later
  • Microsoft Internet Explorer: Version 9 and later
Results for roles


21 to 40 of 1106 results. previous page Prev  Next next page
Results per page:   20  | 40 | 60


Database Security Guide, 11g Release 2 (11.2)

Configuring Privilege and Role Authorization

Revoking Privileges and Roles from a UserThis section contains: Revoking System Privileges and Roles Revoking Object Privileges Cascading Effects of Revoking Privileges

Database Security Guide, 11g Release 2 (11.2)

Configuring Privilege and Role Authorization

Granting a User Privileges and RolesThis section contains: Granting System Privileges and Roles Granting Object Privileges Granting … Privileges on Columns It is also possible to grant roles to a user connected through a middle tier or

Warehouse Builder OMB*Plus Command Reference, 11g Release 2 (11.2)

OMBLIST ROLES

PrerequisitesWarehouse Builder users can be list from any context.

Warehouse Builder OMB*Plus Command Reference, 11g Release 2 (11.2)

OMBLIST ROLES

SyntaxparseListRole = OMBLIST ROLES ( [ \"QUOTED_STRING\" | ( OF USER \"QUOTED_STRING\" ) ] )

Warehouse Builder OMB*Plus Command Reference, 11g Release 2 (11.2)

OMBLIST ROLES

ParametersparseListRole This clause lists existing roles or lists existing roles whose names match the given … regular expression or lists the granted roles of a given user.

Database Security Guide, 11g Release 2 (11.2)

Configuring Privilege and Role Authorization

About Granting Roles Using the Operating System or NetworkInstead of a security administrator explicitly granting and revoking database roles to and from … roles to users at connect time. Roles can be administered using the operating system and passed to … Oracle Database when a user creates a session. As part of this mechanism, the default roles of a user … and the

Database Security Guide, 11g Release 2 (11.2)

Configuring Privilege and Role Authorization

Listing Information About the Privilege Domains of Rolesabout the privilege domains of roles. For example, the following query lists all the roles granted to

Database Security Guide, 11g Release 2 (11.2)

Configuring Privilege and Role Authorization

Table 4-2 Properties of Roles and Their Descriptionthe role. Selective availability of privileges You can selectively enable or disable the roles … awareness The data dictionary records which roles exist, so you can design applications to query … the dictionary and automatically enable (or disable) selective roles when a user attempts to execute … often create roles

Database Utilities, 11g Release 2 (11.2)

Overview of Oracle Data Pump

Required Roles for Data Pump Export and Import Operationsrole and/or the DATAPUMP_IMP_FULL_DATABASE role. These roles are automatically defined for Oracle … the names of these roles contain the word FULL, these roles are actually required for all export and … SQLFILE parameter. These roles allow users performing exports and imports to do the following … ) that unprivileged

Database Security Guide, 11g Release 2 (11.2)

Configuring Privilege and Role Authorization

Restricting SQL*Plus Users from Using Database Rolesroles and thus, prevent serious security problems. Potential Security Problems of Using Ad Hoc Tools … Limiting Roles Through the PRODUCT_USER_PROFILE Table Using Stored Procedures to Encapsulate Business … control the potential actions of a user, including the enabling and disabling of user roles while … granted to him explicitly

Database Security Guide, 11g Release 2 (11.2)

Configuring Privilege and Role Authorization

Granting and Revoking Roles When OS_ROLES Is Set to TRUEand revoking of roles to users. Any previous granting of roles to users using GRANT statements do … at the operating system level apply. Users can still grant privileges to roles and users. Note: If … the operating system grants a role to a user with the ADMIN option, then the user can grant the role only to other roles.

Database Security Guide, 11g Release 2 (11.2)

Configuring Privilege and Role Authorization

Granting Roles Using the Operating System or NetworkThis section contains: About Granting Roles Using the Operating System or Network Using Operating … System Role Identification Using Operating System Role Management Granting and Revoking Roles When … OS_ROLES Is Set to TRUE Enabling and Disabling Roles When OS_ROLES Is Set to TRUE Using Network Connections with Operating System Role

Database Security Guide, 11g Release 2 (11.2)

Managing Security for Application Developers

Creating Secure Application Roles to Control Access to ApplicationsAs explained in \"Securing Role Privileges by Using Secure Application Roles\", a secure

Database Security Guide, 11g Release 2 (11.2)

Configuring Privilege and Role Authorization

Enabling and Disabling Roles When OS_ROLES Is Set to TRUEOracle Database ignores it.) When OS_ROLES is set to TRUE, then the user can enable up to 148 roles … . Remember that this number includes other roles that may have been granted to the role.

Database Security Guide, 11g Release 2 (11.2)

Configuring Privilege and Role Authorization

The Maximum Number of Roles That a User Can EnableA user can enable no more than 148 roles.You can grant a user as many roles as you want, but you … should restrict the number of roles granted to a user to the minimum roles the user needs. See … \"Guidelines for Securing Roles\" for additional guidelines on granting roles to users.

Database Security Guide, 11g Release 2 (11.2)

Configuring Privilege and Role Authorization

Securing Role Privileges by Using Secure Application Rolessecure application roles to ensure the existence of a database connection. Because a secure application … Roles to Control Access to Applications\" Oracle Database 2 Day + Security Guide

SQL*Plus User's Guide and Reference, 11g Release 2 (11.2)

SQL*Plus Security

Disabling User Rolesthe Userid column, \"ROLES\" in the Attribute column, and the role name in the Char_Value column … . You should only use \"%\" or \"PUBLIC\" for roles which are granted to \"PUBLIC\". If you try to … disable a role that has not been granted to a user, none of the roles for that user are disabled. The … ------- ------ ---------

Application Express Administration Guide, 11g Release 2 (11.2)

Understanding User Roles

Understanding User Rolesdivided into three primary roles: Developers create and edit applications. Workspace administrators

SQL*Plus User's Guide and Reference, 11g Release 2 (11.2)

SQL*Plus Security

Creating and Controlling RolesYou can use SQL commands to create and control access to roles to provide security for your … certain users have access to particular database privileges. Roles are created and used with the SQL … CREATE, GRANT, and SET commands: To create a role, you use the CREATE command. You can create roles … with or without passwords. To

Warehouse Builder Installation and Administration Guide, 11g Release 2 (11.2)

Managing Security

Defining Security RolesYou can use roles to represent groups of users with similar responsibilities and privileges. Unlike … users which are also database users, these roles are not database roles. These roles are purely … design constructs for implementing security within the product. Roles enable you to more efficiently