Home > php教程 > PHP开发 > body text

ORACLE permission management

黄舟
Release: 2016-12-15 10:14:12
Original
1077 people have browsed it

ORACLE's permission management
ORACLE's security mechanism is composed of a three-level architecture of system permissions, entity permissions and role permissions.
Permission type explanation
System permissions: refers to the right to operate the database system and data structure, such as creating/deleting users, tables, synonyms, indexes, etc.
Entity permissions: refers to the user's right to operate data, such as query, Update, insert, delete, integrity constraints, etc.
Role permissions: Several related permissions are combined into roles, and the roles can be further combined to form a hierarchical tree to correspond to administrative positions in the real world. In addition to restricting operation rights and control rights, role permissions can also restrict the permissions to execute certain applications.
Such a security control system enables managers and program developers of the entire system to control the operation of system commands, data operations and application execution.
(1) System permissions
The granting command of system permissions is GRANT. For example, grant the permission to create any table view to user scott:

 GRANT create any view TO scott;
Copy after login

The revocation command of system permissions is REVOKE. For example, the permission to create any view is withdrawn from user scott. :

 REVOKE create any view FROM scott;
Copy after login


(2) Entity Permissions
Each type of entity has entity permissions associated with it.
Examples of commands to grant entity permissions (grant Select and Insert permissions on the EMP table to scott):

 GRANT select,insert ON emp TO scott;
Copy after login


Examples of commands to revoke entity permissions (recover Select permissions on the EMP table from scott):

 REVOKE select ON emp FROM scott;
Copy after login

(3) Management roles
A role is a combination of many permissions and roles, which greatly facilitates ORACLE permission management.
·Create a role, for example, create a role named dept1 with the password hello:

CREATE ROLE dept1 IDENTIFIED BY hello;
Copy after login


·Use a role, you can use the role by modifying the user's default role, or use the role through authorization Granted to other roles or users. For example, change the default role of user scott to DEVELOPER:

ALTER USER scott DEFAULT ROLE DEVELOPER;
Copy after login


Grant the role dept1 to the manager role:

 GRANT manager TO scott;
Copy after login

·Enable or invalidate the role. The DBA can temporarily recycle it by controlling the validity or invalidation of the role. Part of the user's permissions. To invalidate the dept1 role:

 SET ROLE dept1 DISABLE;
Copy after login


·Delete the role, which will affect the permissions of users who own this role and other roles. Use the DROP ROLE command to delete a role, such as:

 DROP ROLE dept1;
Copy after login

The above is the permission management of ORACLE. For more related articles, please pay attention to the PHP Chinese website (www.php.cn)!


Related labels:
source:php.cn
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Popular Recommendations
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template