How do I narrow my search results?
After you submit your search query:
- On the Refine Search results page, select one or more categories of products or services from the left sidebar.
- Then for a category with search results, click Select to choose your product and release filters, and then click OK.
For search queries that contain multiple words, surround the query with quotes, and then resubmit your query. Example: "database cloud service"
How do I find the documentation for my product or service?
From the home page, click the technology categories for your products or services. If you do not know which category to pick, try the following features:
- Click the Find a product tab and search for your product or service.
- Click Browse All Products & Services at the bottom of the home page to view an alphabetical listing of products and services.
- Apple Safari: Version 6
- Google Chrome: Version 29 and later
- Mozilla Firefox: Version 24 and later
- Microsoft Internet Explorer: Version 9 and later
Revoking Privileges and Roles from a User → This section contains: Revoking System Privileges and Roles Revoking Object Privileges Cascading Effects of Revoking Privileges
Granting a User Privileges and Roles → This section contains: Granting System Privileges and Roles Granting Object Privileges Granting … Privileges on Columns It is also possible to grant roles to a user connected through a middle tier or
Prerequisites → Warehouse Builder users can be list from any context.
Syntax → parseListRole = OMBLIST ROLES ( [ \"QUOTED_STRING\" | ( OF USER \"QUOTED_STRING\" ) ] )
Parameters → parseListRole This clause lists existing roles or lists existing roles whose names match the given … regular expression or lists the granted roles of a given user.
About Granting Roles Using the Operating System or Network → Instead of a security administrator explicitly granting and revoking database roles to and from … roles to users at connect time. Roles can be administered using the operating system and passed to … Oracle Database when a user creates a session. As part of this mechanism, the default roles of a user … and the
Listing Information About the Privilege Domains of Roles → about the privilege domains of roles. For example, the following query lists all the roles granted to
Table 4-2 Properties of Roles and Their Description → the role. Selective availability of privileges You can selectively enable or disable the roles … awareness The data dictionary records which roles exist, so you can design applications to query … the dictionary and automatically enable (or disable) selective roles when a user attempts to execute … often create roles
Required Roles for Data Pump Export and Import Operations → role and/or the DATAPUMP_IMP_FULL_DATABASE role. These roles are automatically defined for Oracle … the names of these roles contain the word FULL, these roles are actually required for all export and … SQLFILE parameter. These roles allow users performing exports and imports to do the following … ) that unprivileged
Restricting SQL*Plus Users from Using Database Roles → roles and thus, prevent serious security problems. Potential Security Problems of Using Ad Hoc Tools … Limiting Roles Through the PRODUCT_USER_PROFILE Table Using Stored Procedures to Encapsulate Business … control the potential actions of a user, including the enabling and disabling of user roles while … granted to him explicitly
Granting and Revoking Roles When OS_ROLES Is Set to TRUE → and revoking of roles to users. Any previous granting of roles to users using GRANT statements do … at the operating system level apply. Users can still grant privileges to roles and users. Note: If … the operating system grants a role to a user with the ADMIN option, then the user can grant the role only to other roles.
Granting Roles Using the Operating System or Network → This section contains: About Granting Roles Using the Operating System or Network Using Operating … System Role Identification Using Operating System Role Management Granting and Revoking Roles When … OS_ROLES Is Set to TRUE Enabling and Disabling Roles When OS_ROLES Is Set to TRUE Using Network Connections with Operating System Role
Creating Secure Application Roles to Control Access to Applications → As explained in \"Securing Role Privileges by Using Secure Application Roles\", a secure
Enabling and Disabling Roles When OS_ROLES Is Set to TRUE → Oracle Database ignores it.) When OS_ROLES is set to TRUE, then the user can enable up to 148 roles … . Remember that this number includes other roles that may have been granted to the role.
The Maximum Number of Roles That a User Can Enable → A user can enable no more than 148 roles.You can grant a user as many roles as you want, but you … should restrict the number of roles granted to a user to the minimum roles the user needs. See … \"Guidelines for Securing Roles\" for additional guidelines on granting roles to users.
Securing Role Privileges by Using Secure Application Roles → secure application roles to ensure the existence of a database connection. Because a secure application … Roles to Control Access to Applications\" Oracle Database 2 Day + Security Guide
Disabling User Roles → the Userid column, \"ROLES\" in the Attribute column, and the role name in the Char_Value column … . You should only use \"%\" or \"PUBLIC\" for roles which are granted to \"PUBLIC\". If you try to … disable a role that has not been granted to a user, none of the roles for that user are disabled. The … ------- ------ ---------
Understanding User Roles → divided into three primary roles: Developers create and edit applications. Workspace administrators
Creating and Controlling Roles → You can use SQL commands to create and control access to roles to provide security for your … certain users have access to particular database privileges. Roles are created and used with the SQL … CREATE, GRANT, and SET commands: To create a role, you use the CREATE command. You can create roles … with or without passwords. To
Defining Security Roles → You can use roles to represent groups of users with similar responsibilities and privileges. Unlike … users which are also database users, these roles are not database roles. These roles are purely … design constructs for implementing security within the product. Roles enable you to more efficiently