2/46
List of Examples
2-1 Creating a Common User Account
2-2 Creating a Local User Account
2-3 Altering a User Account
2-4 Using ORAPWD to Change the SYS User Password
2-5 Creating a Resource Limits Profile
3-1 Password Creation SQL Statements Using the IDENTIFIED BY Clause
3-2 Locking an Account with the CREATE PROFILE Statement
3-3 Setting Password Aging and Expiration with the CREATE PROFILE Statement
3-4 Enabling Password Case Sensitivity
3-5 Sample SQLNET.ORA File with Wallet Parameters Set
4-1 Setting O7_DICTIONARY_ACCESSIBILITY to FALSE
4-2 Granting a System Privilege to a Common User
4-3 Granting an Object Privilege to a Common User
4-4 Granting a Privilege in a Multitenant Environment
4-5 Finding Information about CONTAINER_DATA Attributes
4-6 Enabling a Common User to View Specific Object Data
4-7 Granting a Common Role to a Common User for All Containers
4-8 Granting a Common Role to a Common User for the Current Container
4-9 Revoking a Local Role
4-10 Using SET ROLE for a Password-Authenticated Role
4-11 Granting a Role to a Program Unit
4-12 Revoking All Object Privileges Using CASCADE CONSTRAINTS
4-13 Compiling a Procedure
4-14 Package Objects Affected by Procedure Privileges: Example 1
4-15 Package Objects Affected by Procedure Privileges: Example 2
4-16 Granting a System Privilege and a Role to a User
4-17 Granting the EXECUTE Privilege on a Directory Object
4-18 Granting the ADMIN Option
4-19 Creating a New User with the GRANT Statement
4-20 Granting Object Privileges to Users
4-21 Revoking a System Privilege and a Role from a User
4-22 Using SET ROLE to Grant a Role and Specify a Password
4-23 Using SET ROLE to Disable All Roles
4-24 Using ALTER USER to Set Default Roles
5-1 Granting INHERIT PRIVILEGES on an Invoking User to a Procedure Owner
5-2 Revoking INHERIT PRIVILEGES
5-3 Granting INHERIT ANY PRIVILEGES to a Trusted Procedure Owner
5-4 View Created Using the BEQUEATH Clause
6-1 Granting Privileges to a Database Role External Network Services
6-2 Revoking External Network Services Privileges
6-3 Configuring Access Control for a Single Role and Network Connection
6-4 Configuring Access Control List Using a Grant and a Deny for User and Role
6-5 Using the DBA_HOST_ACES View to Show Granted Privileges
6-6 Configuring ACL Access Using Passwords in a Non-Shared Wallet
6-7 Configuring ACL Access for a Wallet in a Shared Database Session
6-8 Administrator Checking User Network Access Control Permissions
6-9 User Checking Network Access Control Permissions
6-10 Configuring Network Access for JDWP Operations
8-1 Java Code for Reading Passwords
9-1 Simple Procedure to Create an Application Context Value
9-2 Creating a Logon Trigger
9-3 Creating a Logon Trigger for a Production Environment
9-4 Creating a Logon Trigger for a Development Environment
9-5 Package to Retrieve Session Data and Set a Database Session Context
9-6 Creating an Externalized Database Session-based Application Context
9-7 Package to Manage Global Application Values for All Database Users
9-8 Package for Global Application Context Values for Moving Between Applications
9-9 Package to Manage Global Application Context Values for Nondatabase Users
9-10 Using OCIStmtExecute to Retrieve a Client Session ID Value
9-11 Retrieving a Client Session ID Value for Client Session-Based Contexts
10-1 Attaching a Simple Oracle Virtual Private Database Policy to a Table
10-2 Specifying SQL Statement Types with DBMS_RLS.ADD_POLICY
10-3 Creating a Column-Level Oracle Virtual Private Database Policy
10-4 Adding a Column Masking to an Oracle Virtual Private Database Policy
10-5 Creating a DYNAMIC Policy with DBMS_RLS.ADD_POLICY
10-6 Creating a STATIC Policy with DBMS_RLS.ADD_POLICY
10-7 Creating a SHARED_STATIC Policy with DBMS_RLS.ADD_POLICY
10-8 Creating a Context-Sensitive Policy with DBMS_RLS.ADD_POLICY
10-9 Refreshing Cached Statements for a VPD Context-Sensitive Policy
10-10 Altering an Existing Context-Sensitive Policy
10-11 SHARED_CONTEXT_SENSITIVE Policy with DBMS_RLS.ADD_POLICY
11-1 Creating a Sensitive Type
11-2 Importing a Sensitive Columns List from ADM
11-3 Creating a Transparent Sensitive Data Protection Policy
11-4 Enabling TSDP Protection for All Columns Identified By a Source
11-5 Enabling TSDP Protection for a Table Column
11-6 Enabling TSDP Protection for a Column Type
11-7 Altering a Transparent Sensitive Data Protection Policy
11-8 Disabling the REDACT_AUDIT Policy for One Sensitive Column
11-9 Disabling the REDACT_AUDIT Policy for All Columns in the Database
11-10 Enabling the REDACT_AUDIT Policy for One Sensitive Column
11-11 Enabling the REDACT_AUDIT Policy for All Columns in the Database
14-1 Using AnoServices Constants in JDBC Client Code
22-1 Syntax for the CREATE AUDIT POLICY Statement
22-2 Auditing the DBA Role in a Multitenant Environment
22-3 Auditing a User Who Has ANY Privileges
22-4 Using a Condition to Audit a System Privilege
22-5 Auditing the SYS User
22-6 Auditing Actions on SYS Objects
22-7 Auditing Multiple Actions on One Object
22-8 Auditing Both Actions and Privileges on an Object
22-9 Auditing All Actions on a Table
22-10 Auditing All Actions in the Database
22-11 Using AUDIT to Audit a SQL Statement for a User
22-12 Auditing Access to SQL*Plus
22-13 Auditing Actions Not in Specific Hosts
22-14 Auditing Both a System-Wide and a Schema-Specific Action
22-15 Auditing a Condition Per Statement Occurrence
22-16 Unified Audit Session ID of a Current Administrative User Session
22-17 Unified Audit Session ID of a Current Non-Administrative User Session
22-18 Auditing Application Context Values in a Default Database
22-19 Auditing Application Context Values from Oracle Label Security
22-20 Auditing Real Application Security User Account Modifications
22-21 Using a Condition in a Real Application Security Unified Audit Policy
22-22 Auditing Two Oracle Database Vault Events
22-23 Auditing Oracle Database Vault Factor Settings
22-24 Auditing Oracle Label Security Session Label Attributes
22-25 Excluding a User from an Oracle Label Security Policy
22-26 Auditing Oracle Label Security Policy Actions
22-27 Querying for Audited Oracle Label Security Session Labels
22-28 Auditing Multiple Oracle Data Mining Operations by a User
22-29 Auditing All Failed Oracle Data Mining Operations by a User
22-30 Auditing Oracle Data Pump Import Operations
22-31 Auditing All Oracle Data Pump Operations
22-32 Auditing Oracle SQL*Loader Direct Path Load Operations
22-33 Local Unified Audit Policy
22-34 Common Unified Audit Policy
22-35 Syntax for the ALTER AUDIT POLICY Statement
22-36 Altering a Condition in a Unified Audit Policy
22-37 Altering an Oracle Label Security Component in a Unified Audit Policy
22-38 Altering Roles in a Unified Audit Policy
22-39 Dropping a Condition from a Unified Audit Policy
22-40 Enabling a Unified Audit Policy
22-41 Disabling a Unified Audit Policy
22-42 Disabling and Dropping a Unified Audit Policy
22-43 ORA_LOGON_FAILURES Predefined Unified Audit Policy Setting
22-44 ORA_SECURECONFIG Predefined Unified Audit Policy Settings
22-45 ORA_DATABASE_PARAMETER Predefined Unified Audit Policy Settings
22-46 ORA_ACCOUNT_MGMT Predefined Unified Audit Policy Settings
22-47 ORA_CIS_RECOMMENDATIONS Predefined Unified Audit Policy Settings
22-48 ORA_RAS_POLICY_MGMT Predefined Unified Audit Policy
22-49 ORA_RAS_SESSION_MGMT Predefined Unified Audit Policy
22-50 ORA_DV_AUDPOL Predefined Unified Audit Policy
22-51 Using DBMS_FGA.ADD_POLICY to Create a Fine-Grained Audit Policy
23-1 Directly Calling a Database Audit Trail Purge Operation
D-1 OracleRadiusInterface Interface
F-1 Create a Wallet with a Self-Signed Certificate and Export the Certificate
F-2 Create a Wallet and a User Certificate
Scripting on this page enhances content navigation, but does not change the content in any way.