The document discusses controlling user access in an Oracle database. It covers creating users and roles to manage privileges, using GRANT and REVOKE statements to assign and remove privileges, and creating database links to access data on remote databases. Key topics include granting system and object privileges to users and roles, revoking privileges, and using data dictionary views to check privileges.
e computer notes - Controlling user accessecomputernotes
This document discusses controlling user access in a database. It covers creating users and granting them privileges, creating roles to manage privileges, and granting object-level privileges on specific database objects. It also discusses revoking privileges, changing passwords, and creating database links to access data on remote databases.
This document discusses database user privileges and roles. It explains how database administrators can create users and grant them system privileges to access the entire database. It also describes how object privileges control access to specific database objects like tables or procedures. Privileges can be granted directly to users or grouped into roles for easier management. The data dictionary stores information about privileges, and privileges can be revoked from users when no longer needed.
The document discusses controlling user access in a database. It covers creating users and roles, granting and revoking privileges, and managing object and system privileges. The DBA can create users and roles, and grant privileges to access objects and the database. Users can be granted specific privileges on tables, views, and other objects. Privileges can later be revoked from users as needed.
The document discusses managing users, roles, and privileges in Oracle databases. It covers creating, altering, and dropping users, viewing user information, predefined user accounts, different types of privileges including system privileges and object privileges, and user roles. It provides examples and descriptions of commands for working with users, roles, and privileges in Oracle databases.
The document discusses creating users and roles in a database. It provides the SQL commands to:
1) Create a user called books_admin and grant it various privileges including CONNECT, RESOURCE, and DBA.
2) Explain that roles ease the management of privileges by allowing privileges to be granted to or revoked from the role, which then applies to users with that role.
3) Demonstrate creating a "manager" role, granting it privileges to CREATE TABLE and VIEW, and granting the role to users SAM and STARK, thereby allowing them to perform those actions. Privileges can also be revoked from roles.
This document discusses managing roles in a database. It covers creating and modifying roles, assigning roles to users, establishing default roles, enabling and disabling roles, removing roles from users, and displaying role information. The key benefits of roles are reduced granting of privileges, dynamic privilege management, and selective availability of privileges.
This document discusses managing roles in a database. It covers creating and modifying roles, assigning roles to users, establishing default roles, enabling and disabling roles, removing roles from users, and displaying role information. The key benefits of roles are reduced granting of privileges, dynamic privilege management, and selective availability of privileges.
The document discusses controlling user access in an Oracle database. It covers creating users and roles to manage privileges, using GRANT and REVOKE statements to assign and remove privileges, and creating database links to access data on remote databases. Key topics include granting system and object privileges to users and roles, revoking privileges, and using data dictionary views to check privileges.
e computer notes - Controlling user accessecomputernotes
This document discusses controlling user access in a database. It covers creating users and granting them privileges, creating roles to manage privileges, and granting object-level privileges on specific database objects. It also discusses revoking privileges, changing passwords, and creating database links to access data on remote databases.
This document discusses database user privileges and roles. It explains how database administrators can create users and grant them system privileges to access the entire database. It also describes how object privileges control access to specific database objects like tables or procedures. Privileges can be granted directly to users or grouped into roles for easier management. The data dictionary stores information about privileges, and privileges can be revoked from users when no longer needed.
The document discusses controlling user access in a database. It covers creating users and roles, granting and revoking privileges, and managing object and system privileges. The DBA can create users and roles, and grant privileges to access objects and the database. Users can be granted specific privileges on tables, views, and other objects. Privileges can later be revoked from users as needed.
The document discusses managing users, roles, and privileges in Oracle databases. It covers creating, altering, and dropping users, viewing user information, predefined user accounts, different types of privileges including system privileges and object privileges, and user roles. It provides examples and descriptions of commands for working with users, roles, and privileges in Oracle databases.
The document discusses creating users and roles in a database. It provides the SQL commands to:
1) Create a user called books_admin and grant it various privileges including CONNECT, RESOURCE, and DBA.
2) Explain that roles ease the management of privileges by allowing privileges to be granted to or revoked from the role, which then applies to users with that role.
3) Demonstrate creating a "manager" role, granting it privileges to CREATE TABLE and VIEW, and granting the role to users SAM and STARK, thereby allowing them to perform those actions. Privileges can also be revoked from roles.
This document discusses managing roles in a database. It covers creating and modifying roles, assigning roles to users, establishing default roles, enabling and disabling roles, removing roles from users, and displaying role information. The key benefits of roles are reduced granting of privileges, dynamic privilege management, and selective availability of privileges.
This document discusses managing roles in a database. It covers creating and modifying roles, assigning roles to users, establishing default roles, enabling and disabling roles, removing roles from users, and displaying role information. The key benefits of roles are reduced granting of privileges, dynamic privilege management, and selective availability of privileges.
After completing this lesson, you should be able to do the following:
Create users
Create roles to ease setup and maintenance of the security model
Use the GRANT and REVOKE statements to grant and revoke object privileges
This document discusses various topics related to user management in MariaDB databases including:
1) Creating users and specifying host names, authentication plugins, TLS options, and resource limits.
2) Granting and revoking user privileges at the global, database, table, column, function and procedure level.
3) Implementing role-based access control (RBAC) with roles.
4) Configuring password validation plugins.
Southeast Linuxfest -- MySQL User Admin Tips & TricksDave Stokes
This document discusses tips and tricks for MySQL user administration. It covers how MySQL stores user accounts and passwords, and two main ways to create accounts using SQL statements or manipulating grant tables directly. It also discusses user privileges, plugins for authentication, proxy users, and best practices like being stingy with privileges and auditing privileges regularly.
User Account Management
User Privileges
Administrative Privileges
Database Access Privileges
Creating and Rename User Account
Drop User Account
Grant Privileges
Revoke Privileges
Routines and Triggers
This document provides an overview of administering user security in a database. It covers how to create and manage database user accounts by authenticating users, assigning default tablespaces, granting and revoking privileges, and creating and managing roles. It also discusses how to create and manage profiles to implement standard password security features and control resource usage by users. The predefined SYS and SYSTEM accounts and their privileges are described. Methods for unlocking user accounts, assigning privileges to roles, and assigning roles to users are also summarized.
This document discusses database security and the use of GRANT and REVOKE statements in SQL. It defines authorization identifiers as database users assigned by the DBA. The owner of an object can grant privileges on it to other users using GRANT, and revoke those privileges using REVOKE. GRANT allows specifying privileges like SELECT, INSERT, UPDATE, DELETE etc. and REVOKE removes privileges that were previously granted. Both statements identify the user or users, object, and privileges involved.
Sql grant, revoke, privileges and rolesVivek Singh
The document discusses SQL GRANT and REVOKE commands used to manage database privileges and roles. GRANT is used to provide privileges to users and roles, while REVOKE removes privileges. Privileges define user access to database objects, and roles are collections of privileges that can be granted to users to easily manage access. The document provides syntax examples for creating roles and granting/revoking privileges to users and roles.
This document discusses managing privileges and auditing in a database. It covers granting and revoking system and object privileges to users, as well as enabling and viewing different types of auditing. System privileges allow users to perform actions in the database, while object privileges allow access to specific database objects. Auditing can track database activity, privileged operations, and changes to tables.
This document discusses managing privileges and auditing in a database. It covers granting and revoking system and object privileges to users, as well as defining and enabling auditing options. System privileges allow users to perform actions in the database, while object privileges allow access to specific database objects. Auditing can track database activity, statements, and privileges for security and monitoring purposes.
Presentation prepared for Oracle Tutorials series held at CERN, focusing on Oracle Database security from users and developers point of view. Apart from basics, there is a discussion about SQL injection attacks with illustrative examples.
This document provides an overview and agenda for a presentation on Oracle Database Vault. It discusses securing data using realms, factors, command rules and rule sets in Database Vault. It also covers auditing violations which are logged in the database and to the operating system. The document concludes with a brief section on the impact of backups on a Database Vault secured system when using export, Data Pump and RMAN.
This document summarizes key Oracle database administration commands related to users, roles, and privileges. It discusses how to create users and assign them to roles like CONNECT, RESOURCE, and DBA. These roles grant different levels of privileges. The document also covers granting and revoking privileges on database objects to users and roles, and how privileges can be passed along through roles.
This document discusses various DNN database tips and tricks presented by Will Strohl, including how to clear space by deleting old logs, change the dbo role owner when users cannot be created or dropped, change or replace themes by clearing default settings, and take over a site locally by changing the primary alias. The tips are demonstrated through SQL scripts that can automate common database tasks in DNN.
Oracle RDBMS uses usernames and passwords to control access to the database. Users are assigned privileges that determine what actions they can perform. Privileges can be granted directly to users or through roles, which are groups of privileges. The database administrator is responsible for security tasks like creating users, assigning privileges, and monitoring access.
Basic - Oracle Edition Based Redefinition PresentationN/A
The document discusses Oracle Edition Based Redefinition, which allows upgrading an application while it is in use. Key points include: Edition Based Redefinition introduces editions, editioning views, and crossedition triggers to enable in-place application upgrades. Editions allow different versions of objects to coexist. Editioning views provide a transition between table structures. Crossedition triggers propagate transactions between editions to support concurrent usage of pre- and post-upgrade applications.
This document discusses database user access and privileges in Oracle. It explains that the database administrator controls access by creating users, assigning them passwords and granting system and object privileges. System privileges control access to the database itself, while object privileges control access to specific database objects. The document provides examples of using SQL statements like CREATE USER, GRANT, ALTER USER, and REVOKE to manage users and privileges.
This document discusses SQL security concepts including users, database objects, privileges, and how the security scheme is established. It defines users as those making requests to the database, database objects as items security can be applied to like tables and views, and privileges as actions users can perform on objects like select, insert, update, delete. The security scheme is established using GRANT and REVOKE statements to specify which users have which privileges on which database objects. Views can also be used to restrict user access to only selected data. Examples show granting and revoking privileges on different database objects for various users.
Vpd Virtual Private Database By Saurabhguestd83b546
Virtual Private Database (VPD) offers lower cost of ownership, eliminates application security problems, and provides application transparency through fine-grained row-level access control. VPD works by appending predicates generated by policy functions to SQL statements before execution. These functions return strings that filter rows based on contextual information like the current user.
The document provides information on various SQL commands used for data manipulation and control, database objects like tables and schemas, users and privileges in SQL. It discusses commands like COMMIT, ROLLBACK, GRANT, REVOKE used for transactions and managing privileges. It also summarizes creation, alteration and deletion of database objects using commands like CREATE, ALTER, DROP and functions like SELECT, INSERT, UPDATE, DELETE for data manipulation. The document further discusses concepts like stored procedures in SQL and use of phpMyAdmin for administering MySQL databases.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
After completing this lesson, you should be able to do the following:
Create users
Create roles to ease setup and maintenance of the security model
Use the GRANT and REVOKE statements to grant and revoke object privileges
This document discusses various topics related to user management in MariaDB databases including:
1) Creating users and specifying host names, authentication plugins, TLS options, and resource limits.
2) Granting and revoking user privileges at the global, database, table, column, function and procedure level.
3) Implementing role-based access control (RBAC) with roles.
4) Configuring password validation plugins.
Southeast Linuxfest -- MySQL User Admin Tips & TricksDave Stokes
This document discusses tips and tricks for MySQL user administration. It covers how MySQL stores user accounts and passwords, and two main ways to create accounts using SQL statements or manipulating grant tables directly. It also discusses user privileges, plugins for authentication, proxy users, and best practices like being stingy with privileges and auditing privileges regularly.
User Account Management
User Privileges
Administrative Privileges
Database Access Privileges
Creating and Rename User Account
Drop User Account
Grant Privileges
Revoke Privileges
Routines and Triggers
This document provides an overview of administering user security in a database. It covers how to create and manage database user accounts by authenticating users, assigning default tablespaces, granting and revoking privileges, and creating and managing roles. It also discusses how to create and manage profiles to implement standard password security features and control resource usage by users. The predefined SYS and SYSTEM accounts and their privileges are described. Methods for unlocking user accounts, assigning privileges to roles, and assigning roles to users are also summarized.
This document discusses database security and the use of GRANT and REVOKE statements in SQL. It defines authorization identifiers as database users assigned by the DBA. The owner of an object can grant privileges on it to other users using GRANT, and revoke those privileges using REVOKE. GRANT allows specifying privileges like SELECT, INSERT, UPDATE, DELETE etc. and REVOKE removes privileges that were previously granted. Both statements identify the user or users, object, and privileges involved.
Sql grant, revoke, privileges and rolesVivek Singh
The document discusses SQL GRANT and REVOKE commands used to manage database privileges and roles. GRANT is used to provide privileges to users and roles, while REVOKE removes privileges. Privileges define user access to database objects, and roles are collections of privileges that can be granted to users to easily manage access. The document provides syntax examples for creating roles and granting/revoking privileges to users and roles.
This document discusses managing privileges and auditing in a database. It covers granting and revoking system and object privileges to users, as well as enabling and viewing different types of auditing. System privileges allow users to perform actions in the database, while object privileges allow access to specific database objects. Auditing can track database activity, privileged operations, and changes to tables.
This document discusses managing privileges and auditing in a database. It covers granting and revoking system and object privileges to users, as well as defining and enabling auditing options. System privileges allow users to perform actions in the database, while object privileges allow access to specific database objects. Auditing can track database activity, statements, and privileges for security and monitoring purposes.
Presentation prepared for Oracle Tutorials series held at CERN, focusing on Oracle Database security from users and developers point of view. Apart from basics, there is a discussion about SQL injection attacks with illustrative examples.
This document provides an overview and agenda for a presentation on Oracle Database Vault. It discusses securing data using realms, factors, command rules and rule sets in Database Vault. It also covers auditing violations which are logged in the database and to the operating system. The document concludes with a brief section on the impact of backups on a Database Vault secured system when using export, Data Pump and RMAN.
This document summarizes key Oracle database administration commands related to users, roles, and privileges. It discusses how to create users and assign them to roles like CONNECT, RESOURCE, and DBA. These roles grant different levels of privileges. The document also covers granting and revoking privileges on database objects to users and roles, and how privileges can be passed along through roles.
This document discusses various DNN database tips and tricks presented by Will Strohl, including how to clear space by deleting old logs, change the dbo role owner when users cannot be created or dropped, change or replace themes by clearing default settings, and take over a site locally by changing the primary alias. The tips are demonstrated through SQL scripts that can automate common database tasks in DNN.
Oracle RDBMS uses usernames and passwords to control access to the database. Users are assigned privileges that determine what actions they can perform. Privileges can be granted directly to users or through roles, which are groups of privileges. The database administrator is responsible for security tasks like creating users, assigning privileges, and monitoring access.
Basic - Oracle Edition Based Redefinition PresentationN/A
The document discusses Oracle Edition Based Redefinition, which allows upgrading an application while it is in use. Key points include: Edition Based Redefinition introduces editions, editioning views, and crossedition triggers to enable in-place application upgrades. Editions allow different versions of objects to coexist. Editioning views provide a transition between table structures. Crossedition triggers propagate transactions between editions to support concurrent usage of pre- and post-upgrade applications.
This document discusses database user access and privileges in Oracle. It explains that the database administrator controls access by creating users, assigning them passwords and granting system and object privileges. System privileges control access to the database itself, while object privileges control access to specific database objects. The document provides examples of using SQL statements like CREATE USER, GRANT, ALTER USER, and REVOKE to manage users and privileges.
This document discusses SQL security concepts including users, database objects, privileges, and how the security scheme is established. It defines users as those making requests to the database, database objects as items security can be applied to like tables and views, and privileges as actions users can perform on objects like select, insert, update, delete. The security scheme is established using GRANT and REVOKE statements to specify which users have which privileges on which database objects. Views can also be used to restrict user access to only selected data. Examples show granting and revoking privileges on different database objects for various users.
Vpd Virtual Private Database By Saurabhguestd83b546
Virtual Private Database (VPD) offers lower cost of ownership, eliminates application security problems, and provides application transparency through fine-grained row-level access control. VPD works by appending predicates generated by policy functions to SQL statements before execution. These functions return strings that filter rows based on contextual information like the current user.
The document provides information on various SQL commands used for data manipulation and control, database objects like tables and schemas, users and privileges in SQL. It discusses commands like COMMIT, ROLLBACK, GRANT, REVOKE used for transactions and managing privileges. It also summarizes creation, alteration and deletion of database objects using commands like CREATE, ALTER, DROP and functions like SELECT, INSERT, UPDATE, DELETE for data manipulation. The document further discusses concepts like stored procedures in SQL and use of phpMyAdmin for administering MySQL databases.
Similar to User Information in Oracle introduction.pptx (20)
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
This presentation was provided by Rebecca Benner, Ph.D., of the American Society of Anesthesiologists, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxEduSkills OECD
Iván Bornacelly, Policy Analyst at the OECD Centre for Skills, OECD, presents at the webinar 'Tackling job market gaps with a skills-first approach' on 12 June 2024
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.pptHenry Hollis
The History of NZ 1870-1900.
Making of a Nation.
From the NZ Wars to Liberals,
Richard Seddon, George Grey,
Social Laboratory, New Zealand,
Confiscations, Kotahitanga, Kingitanga, Parliament, Suffrage, Repudiation, Economic Change, Agriculture, Gold Mining, Timber, Flax, Sheep, Dairying,
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
User Information in Oracle introduction.pptx
1. SELECT sid, osuser, username, status,
TO_CHAR(logon_time, 'DAY HH24:MI:SS')
LOGON_TIME, FLOOR(last_call_et/3600)||':'||
FLOOR(MOD(last_call_et,3600)/60)||':'||
MOD(MOD(last_call_et,3600),60) IDLE, program
FROM v_$session WHERE username IS NOT NULL
ORDER BY last_call_et;
USER Information
5. USER Memory
SELECT username, VALUE || 'bytes' "Current
UGA memory" FROM v_$session sess,
v_$sesstat sstat, v_$statname sname WHERE
sess.sid = sstat.sid AND sstat.statistic# =
sname.statistic# AND sname.name = 'session
uga memory';
7. SCOTT User Open & Lock
SELECT username, account_status FROM
DBA_USERS WHERE username = 'SCOTT';
8. Total User Open & Lock
SELECT username, lock_date, account_status,
default_tablespace FROM dba_users;
9. User Sample List
HR - Human resources, basic topics, supports Oracle
Internet Directory
OE - Order entry, intermediate topics, various data types
PM - Product media, used for multimedia data types
QS - Queued shipping, shows advanced queuing
(renamed IX in Oracle 10g)
SH - Sales history, large amount of data, analytic
processing
SCOTT- Demo User (Only Deptt, and Sale)
13. Check SYS Info
How to get SID name
select instance_name from v$instance;
OR
select global_name from global_name;
OR
select name from v$database;
use the v$database table, you must have a sysdba privilege
14. Change Oracle passwords, expire,
and lock unnecessary users
There are many users on a full installation of
Oracle, most of which you probably won't
need. To lock an Oracle user account, you can
use the following command:
alter user username account lock;
To unlock the user, simply replace 'lock' with
'unlock.‘
Oracle comes with a few default accounts that
should never be locked or dropped. These
include: SYS, SYSTEM, SYSMAN
15. you do want always to change the password for these
users. The default password for SYS is
change_on_install. It is important that you follow
these directions. To change the password for a user:
alter user username identified by new_password;
Change Oracle passwords, expire,
and lock unnecessary users
16. Setting the Oracle database user
password lifetime
SQL> select * from dba_profiles s where s.profile='DEFAULT'
and resource_name='PASSWORD_LIFE_TIME';
PROFILE RESOURCE_NAME RESOURCE LIMIT
---------------------------------------------------------------------------------------
DEFAULT PASSWORD_LIFE_TIME PASSWORD 180dys
The output shows that the lifetime of the user is 180 days.
Set the password lifetime to Unlimited.
SQL> ALTER PROFILE DEFAULT LIMIT PASSWORD_LIFE_TIME UNLIMITED
17. User Lock and password expired
ALTER USER user_name IDENTIFIED BY password
ACCOUNT UNLOCK;
alter user scott identified by tiger
account lock password expire;
23. User Sample Scott
Run this script:
CREATE USER scott IDENTIFIED BY tiger;
scott is the user tiger is the password.
Grant all access to user scott,run this script:
GRANT ALL PRIVILEGES TO scott;
Extract the downloaded file in your system.
Then Connect to Scott user as: CONNECT scott Password: tiger
Then type this in your sql command prompt:
@(extract file path)oracle.sql;
for example: @C:UsersABCoracleoracle.sql;
24. Show all table and table structure
select * from tab;
SQL> DESC emp;
26. System User
The SYSTEM account is one of a handful of predefined administrative
accounts generated automatically when Oracle is installed. SYSTEM is
capable of most administrative tasks, but the task we’re particularly
interested in is account management.
32. Create A New User
CREATE USER zahid
IDENTIFIED BY password123
DEFAULT TABLESPACE USERS
TEMPORARY TABLESPACE temp
QUOTA UNLIMITED ON USERS
ACCOUNT UNLOCK;
SELECT username, lock_date, account_status
FROM dba_users where username='ZAHID';
QUOTA 100M on users
34. Drop User
The DROP USER statement is used to remove a
user from the Oracle database and remove all
objects owned by that user.
35. Drop User
If zahid did own objects in its schema, you
would need to run the following DROP USER
statement instead:
DROP USER zahid CASCADE;
This DROP USER statement would remove the
user zahid, drop all objects (ie: tables and
views) owned by zahid, and all referential
integrity constraints on zahid objects would also
be dropped.
37. Grant Privileges
grant create session, resource to zahid;
Check Grant Privileges
SELECT grantee, PRIVILEGE
FROM dba_sys_privs
WHERE grantee = 'ZAHID'
ORDER BY privilege;
41. Check User how many tables
select table_name FROM user_tables;
42. Create a Table
CREATE TABLE suppliers
( supplier_id number(10) NOT NULL,
supplier_name varchar2(50) NOT NULL,
address varchar2(50), city varchar2(50),
state varchar2(25), zip_code
varchar2(10) );
44. Data Control Language Statements are used to grant privileges on
tables, views, sequences, synonyms, procedures to other users or
roles.
Data Control Language
45. System Privileges
System Privileges are normally granted by a DBA to
users. Examples of system privileges are CREATE
SESSION, CREATE TABLE, CREATE USER etc.
Object privileges
Object privileges means privileges on objects such as
tables, views, synonyms, procedure. These are
granted by owner of the object.
Data Control Language
46. Syntax for tables
GRANT privilegeType ON [ TABLE ] {
tableName | viewName } TO grantees
Grant Privileges
47. Grant Privileges on Table
You can grant users various privileges to tables. These
privileges can be any combination of SELECT, INSERT,
UPDATE, DELETE, REFERENCES, ALTER, INDEX, or ALL.
Syntax
The syntax for granting privileges on a table in Oracle is:
GRANT privileges ON object TO user;
Grant Privileges
48. Grant Privileges
Grant on Table
You can grant users various privileges to tables. These
privileges can be any combination of SELECT, INSERT,
UPDATE, DELETE, REFERENCES, ALTER, INDEX, or ALL.
49. Grant Privileges
For example, if you wanted to grant SELECT, INSERT,
UPDATE, and DELETE privileges on a table called
suppliers to a user name zahid, you would run the
following GRANT statement:
GRANT select, insert, update, delete
ON suppliers TO zahid;
50. Grant Privileges
You can also use the
ALL keyword to indicate
that you wish ALL
permissions to be
granted for a user
named Zahid. For
example:
GRANT ALL ON suppliers TO zahid;
51. Grant Privileges
If you wanted to grant only SELECT access on your
table to all users, you could grant the privileges to the
public keyword.
For example:
GRANT SELECT ON suppliers TO public;
52. Grant Privileges
If you wanted to grant only SELECT access on your
table to all users, you could grant the privileges to
the public keyword.
For example:
GRANT SELECT ON suppliers TO public;
53. Grant Privileges
Suppose you want to grant update and insert privilege
on only certain columns not on all the columns then
include the column names in grant statement. For
example you want to grant update privilege on ename
column only and insert privilege on empno and ename
columns only.
grant update (ename),insert (empno,
ename) on emp to zahid;
54. Grant Privileges
To grant select statement on emp table to zahid and to
make zahid be able further pass on this privilege you
have to give WITH GRANT OPTION clause in GRANT
statement like this.
grant select on emp to zahid
with grant option;
55. REVOKE Privileges
Use to revoke privileges already granted to other users.
For example to revoke select, update, insert privilege you
have granted to zahid then give the following statement.
revoke select, update, insert on
emp from zahid;
REVOKE DELETE ON suppliers FROM anderson;
REVOKE ALL ON suppliers FROM anderson;
REVOKE ALL ON suppliers FROM public;
57. ROLES
A role is a group of Privileges. A role is very handy
in managing privileges, Particularly in such
situation when number of users should have the
same set of privileges.
63. ROLES
For example you have four users : zahid, Scott, khalid, Ali
in the database. To these users you want to grant select
,update privilege on emp table, select, delete privilege on
dept table. To do this first create a role by giving the
following statement
create role clerks;
Check how many roles
SELECT * FROM USER_ROLE_PRIVS;
64. ROLES
Then grant privileges to this role.
grant select, update on Scott.emp to clerks;
grant select, delete on Scott.dept to clerks;
Now grant this clerks role to users like this
grant clerks to zahid, scott, khalid, ali;
65. ROLES
Suppose after one month you want grant delete on
privilege on emp table all these users then just grant
this privilege to clerks role and automatically all the
users will have the privilege.
grant delete on emp to clerks;
If you want to take back update privilege on emp table
from these users just take it back from clerks role.
revoke update on emp from clerks;
To Drop a role
Drop role clerks;