4.8 Validate User Connections and Data Access Control
In this final section, you'll validate the security configuration. You'll
log in as different users (Marvin and Emma), confirm the signed-in identity, and
then query the employees table to verify that role-based access is
applied as intended.
Note:
-
If your database server requires egress through a network proxy to validate Microsoft Entra ID tokens, set the HTTP proxy and restart the database listener.
export http_proxy=http://<your-proxy-host>:<port>/ export https_proxy=http://<your-proxy-host>:<port>/ lsnrctl stop lsnrctl start -
To make the query output easier to read in SQL*Plus, set page and column widths before you run the queries. For example, you can use the following settings:
SET LINES 200 PAGES 100 COL employee_id FOR 9999 COL first_name FOR a10 COL last_name FOR a10 COL email FOR a10 COL manager FOR a10 COL ssn FOR a15 COL salary FOR 99999 COL phone FOR a10
- Verify manager access (Marvin).
- Verify employee access (Emma).