ORACLE permission management
ORACLE's permission management
ORACLE's security mechanism is composed of a three-level architecture of system permissions, entity permissions and role permissions.
Permission type explanation
System permissions: refers to the right to operate the database system and data structure, such as creating/deleting users, tables, synonyms, indexes, etc.
Entity permissions: refers to the user's right to operate data, such as query, Update, insert, delete, integrity constraints, etc.
Role permissions: Several related permissions are combined into roles, and the roles can be further combined to form a hierarchical tree to correspond to administrative positions in the real world. In addition to restricting operation rights and control rights, role permissions can also restrict the permissions to execute certain applications.
Such a security control system enables managers and program developers of the entire system to control the operation of system commands, data operations and application execution.
(1) System permissions
The granting command of system permissions is GRANT. For example, grant the permission to create any table view to user scott:
GRANT create any view TO scott;
The revocation command of system permissions is REVOKE. For example, the permission to create any view is withdrawn from user scott. :
REVOKE create any view FROM scott;
(2) Entity Permissions
Each type of entity has entity permissions associated with it.
Examples of commands to grant entity permissions (grant Select and Insert permissions on the EMP table to scott):
GRANT select,insert ON emp TO scott;
Examples of commands to revoke entity permissions (recover Select permissions on the EMP table from scott):
REVOKE select ON emp FROM scott;
(3) Management roles
A role is a combination of many permissions and roles, which greatly facilitates ORACLE permission management.
·Create a role, for example, create a role named dept1 with the password hello:
CREATE ROLE dept1 IDENTIFIED BY hello;
·Use a role, you can use the role by modifying the user's default role, or use the role through authorization Granted to other roles or users. For example, change the default role of user scott to DEVELOPER:
ALTER USER scott DEFAULT ROLE DEVELOPER;
Grant the role dept1 to the manager role:
GRANT manager TO scott;
·Enable or invalidate the role. The DBA can temporarily recycle it by controlling the validity or invalidation of the role. Part of the user's permissions. To invalidate the dept1 role:
SET ROLE dept1 DISABLE;
·Delete the role, which will affect the permissions of users who own this role and other roles. Use the DROP ROLE command to delete a role, such as:
DROP ROLE dept1;
The above is the permission management of ORACLE. For more related articles, please pay attention to the PHP Chinese website (www.php.cn)!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

Solutions to Oracle cannot be opened include: 1. Start the database service; 2. Start the listener; 3. Check port conflicts; 4. Set environment variables correctly; 5. Make sure the firewall or antivirus software does not block the connection; 6. Check whether the server is closed; 7. Use RMAN to recover corrupt files; 8. Check whether the TNS service name is correct; 9. Check network connection; 10. Reinstall Oracle software.

The method to solve the Oracle cursor closure problem includes: explicitly closing the cursor using the CLOSE statement. Declare the cursor in the FOR UPDATE clause so that it automatically closes after the scope is ended. Declare the cursor in the USING clause so that it automatically closes when the associated PL/SQL variable is closed. Use exception handling to ensure that the cursor is closed in any exception situation. Use the connection pool to automatically close the cursor. Disable automatic submission and delay cursor closing.

Deleting all data in Oracle requires the following steps: 1. Establish a connection; 2. Disable foreign key constraints; 3. Delete table data; 4. Submit transactions; 5. Enable foreign key constraints (optional). Be sure to back up the database before execution to prevent data loss.

Oracle database paging uses ROWNUM pseudo-columns or FETCH statements to implement: ROWNUM pseudo-columns are used to filter results by row numbers and are suitable for complex queries. The FETCH statement is used to get the specified number of first rows and is suitable for simple queries.

In Oracle, the FOR LOOP loop can create cursors dynamically. The steps are: 1. Define the cursor type; 2. Create the loop; 3. Create the cursor dynamically; 4. Execute the cursor; 5. Close the cursor. Example: A cursor can be created cycle-by-circuit to display the names and salaries of the top 10 employees.

To stop an Oracle database, perform the following steps: 1. Connect to the database; 2. Shutdown immediately; 3. Shutdown abort completely.

SQL statements can be created and executed based on runtime input by using Oracle's dynamic SQL. The steps include: preparing an empty string variable to store dynamically generated SQL statements. Use the EXECUTE IMMEDIATE or PREPARE statement to compile and execute dynamic SQL statements. Use bind variable to pass user input or other dynamic values to dynamic SQL. Use EXECUTE IMMEDIATE or EXECUTE to execute dynamic SQL statements.

Building a Hadoop Distributed File System (HDFS) on a CentOS system requires multiple steps. This article provides a brief configuration guide. 1. Prepare to install JDK in the early stage: Install JavaDevelopmentKit (JDK) on all nodes, and the version must be compatible with Hadoop. The installation package can be downloaded from the Oracle official website. Environment variable configuration: Edit /etc/profile file, set Java and Hadoop environment variables, so that the system can find the installation path of JDK and Hadoop. 2. Security configuration: SSH password-free login to generate SSH key: Use the ssh-keygen command on each node
