Skip Headers
Oracle® Database Security Guide
11g Release 1 (11.1)
Part Number B28531-01
Home
Book List
Contents
Index
Master Index
Contact Us
Previous
Next
View PDF
List of Examples
2-1 Creating a User Account with CONNECT and CREATE SESSION Privileges
2-2 Altering a User Account
2-3 Querying V$SESSION for the Session ID of a User
2-4 Killing a User Session
2-5 Finding Objects Owned by a User
2-6 Dropping a User Account
3-1 Locking an Account with the CREATE PROFILE Statement
3-2 Setting Password Aging and Expiration with the CREATE PROFILE Statement
3-3 Enabling Case Sensitivity in Passwords
3-4 Enabling Password Case Sensitivity
3-5 Sample SQLNET.ORA File with Wallet Parameters Set
3-6 Altering a User Account to Connect Through a Proxy User Account
4-1 Setting O7_DICTIONARY_ACCESSIBILITY to FALSE
4-2 Creating a User Role Authorized by a Password
4-3 Altering a Role to be Authorized by an External Source
4-4 Creating a Role Authorized by a PL/SQL Package for an Application
4-5 Creating a Role Authorized by an External Source
4-6 Creating a Global Role
4-7 Revoking All Object Privileges Using CASCADE CONSTRAINTS
4-8 Package Objects Affected by Procedure Privileges
4-9 Granting a System Privilege and a Role to a User
4-10 Granting the ADMIN OPTION
4-11 Creating a New User with the GRANT Statement
4-12 Granting Object Privileges to Users
4-13 Using SET ROLE to Grant a Role and Specify a Password
4-14 Using SET ROLE to Disable All Roles
4-15 Using ALTER USER to Set Default Roles
4-16 Creating an Access Control List for a Single Role and Network Connection
4-17 Creating an Access Control List for Multiple Roles and Network Connections
4-18 Using the DBA_NETWORK_ACL_PRIVILEGES View to Show Granted Privileges
4-19 Using the DBA_NETWORK_ACLS View to Show Host Assignments
4-20 Administrator Checking User Permissions for Network Host Connections
4-21 Administrator Checking Permissions for Domain Name Resolution
4-22 User Checking Permissions for Network Host Connections
4-23 User Checking Privileges for Domain Name Resolution
6-1 Checking the Current Value of the AUDIT_TRAIL Initialization Parameter
6-2 Enabling the Standard Audit Trail
6-3 AUDIT Statement Using BY Clause
6-4 Using AUDIT to Enable SQL Statement Auditing
6-5 Using NOAUDIT to Disable Session and SQL Statement Auditing
6-6 Using NOAUDIT to Disable All Auditing
6-7 Using AUDIT to Enable Privilege Auditing
6-8 Using AUDIT to Audit a SQL Statement on Behalf of a Proxy User
6-9 Using AUDIT to Enable Auditing for Schema Objects
6-10 Using AUDIT to Audit User Actions
6-11 Using NOAUDIT to Disable Network Auditing
6-12 Enabling Auditing for Users Who Connect as SYS
6-13 Using a Trigger to Record Customized Audit Information
6-14 Using DBMS_FGA.ADD_POLICY to Create a Fine-Grained Audit Policy
6-15 Disabling a Fine-Grained Audit Policy
6-16 Enabling a Fine-Grained Audit Policy
6-17 Dropping a Fine-Grained Audit Policy
7-1 Creating a Database Session-Based Application Context
7-2 Finding SYS_CONTEXT Values
7-3 Simple Procedure to Create an Application Context Value
7-4 Package to Retrieve Session Data and Set a Database Session Context
7-5 Creating an Externalized Database Session-based Application Context
7-6 Creating a Global Application Context
7-7 Package to Manage Global Application Values for All Database Users
7-8 Package to Manage Global Application Context Values for a User Moving Between Applications
7-9 Package to Manage Global Application Context Values for Nondatabase Users
7-10 Using OCIStmtExecute to Retrieve a Client Session ID Value
7-11 Retrieving a Client Session ID Value for Client Session-Based Contexts
8-1 Attaching a Simple Oracle Virtual Private Database Policy to a Table
8-2 Specifying SQL Statement Types with DBMS_RLS.ADD_POLICY
8-3 Creating a Column-Level Oracle Virtual Private Database Policy
8-4 Adding a Column Masking to an Oracle Virtual Private Database Policy
8-5 Creating a DYNAMIC Policy with DBMS_RLS.ADD_POLICY
8-6 Creating a STATIC Policy with DBMS_RLS.ADD_POLICY
8-7 Creating a SHARED_STATIC Policy with DBMS_RLS.ADD_POLICY
8-8 Creating a CONTEXT_SENSITIVE Policy with DBMS_RLS.ADD_POLICY
8-9 Creating a SHARED_CONTEXT_SENSITIVE Policy with DBMS_RLS.ADD_POLICY