3.2 Privileges for Managing Oracle Data Redaction Policies
Because data redaction involves the protection of highly sensitive data, only trusted users should create Oracle Data Redaction policies.
You must have the EXECUTE privilege on the DBMS_REDACT package in order to run its subprograms. Procedures in the interface are run with privileges of the current user.
In addition to the EXECUTE privilege on the
DBMS_REDACT package to run its subprograms, you must have the
ADMINISTER REDACTION POLICY privilege at the schema or system
level:
- Syntax of the
ADMINISTER REDACTION POLICYprivilege grant if the privilege is to apply to all non-SYSschemas across the database:GRANT ADMINISTER REDACTION POLICY TO grantee; - Syntax of the
ADMINISTER REDACTION POLICYprivilege grant if the privilege is to be restricted to a specific schema:GRANT ADMINISTER REDACTION POLICY ON SCHEMA schema TO grantee;
You do not need any Oracle Data Redaction-specific privileges to access the underlying tables or views that will be protected by the policy. See Exemption of Users from Oracle Data Redaction Policies for Oracle Data Redaction-specific privileges to access actual data.
To find the privileges that a user has been granted, you can query the DBA_SYS_PRIVS data dictionary view. To find schema-specific privileges that a user has been granted, you can query any of the *SCHEMA_PRIVS data dictionary views.
Parent topic: Configuring Oracle Data Redaction Policies