Skip Headers
Oracle® Database Security Guide
11
g
Release 2 (11.2)
Part Number E10574-02
Home
Book List
Contents
Index
Master Index
Contact Us
Previous
Next
View PDF
List of Examples
2-1 Creating a User Account with the CREATE SESSION Privilege
2-2 Altering a User Account
2-3 Querying V$SESSION for the Session ID of a User
2-4 Killing a User Session
2-5 Finding Objects Owned by a User
2-6 Dropping a User Account
3-1 Password Creation PL/SQL Statements
3-2 Locking an Account with the CREATE PROFILE Statement
3-3 Setting Password Aging and Expiration with the CREATE PROFILE Statement
3-4 Enabling Password Case Sensitivity
3-5 Sample SQLNET.ORA File with Wallet Parameters Set
3-6 Altering a User Account to Connect Through a Proxy User Account
4-1 Setting O7_DICTIONARY_ACCESSIBILITY to FALSE
4-2 Creating a User Role Authorized by a Password
4-3 Altering a Role to be Authorized by an External Source
4-4 Using SET ROLE for a Password-Authenticated Role
4-5 Creating a Role Authorized by a PL/SQL Package for an Application
4-6 Creating a Role Authorized by an External Source
4-7 Creating a Global Role
4-8 Revoking All Object Privileges Using CASCADE CONSTRAINTS
4-9 Package Objects Affected by Procedure Privileges
4-10 Granting a System Privilege and a Role to a User
4-11 Granting the EXECUTE Privilege on a Directory Object
4-12 Granting the ADMIN OPTION
4-13 Creating a New User with the GRANT Statement
4-14 Granting Object Privileges to Users
4-15 Using SET ROLE to Grant a Role and Specify a Password
4-16 Using SET ROLE to Disable All Roles
4-17 Using ALTER USER to Set Default Roles
4-18 Creating an Access Control List for a Single Role and Network Connection
4-19 Creating an Access Control List for Multiple Roles and Network Connections
4-20 Using the DBA_NETWORK_ACL_PRIVILEGES View to Show Granted Privileges
4-21 Using the DBA_NETWORK_ACLS View to Show Host Assignments
4-22 Configuring ACL Access Using Passwords in a Non-Shared Wallet
4-23 Configuring ACL Access for a Wallet in a Shared Database Session
4-24 Administrator Checking User Permissions for Network Host Connections
4-25 Administrator Checking Permissions for Domain Name Resolution
4-26 User Checking Permissions for Network Host Connections
4-27 User Checking Privileges for Domain Name Resolution
5-1 Java Code for Reading Passwords
6-1 Creating a Database Session-Based Application Context
6-2 Finding SYS_CONTEXT Values
6-3 Simple Procedure to Create an Application Context Value
6-4 Creating a Simple Logon Trigger
6-5 Creating a Logon Trigger for a Production Environment
6-6 Creating a Logon Trigger for a Development Environment
6-7 Package to Retrieve Session Data and Set a Database Session Context
6-8 Creating an Externalized Database Session-based Application Context
6-9 Creating a Global Application Context
6-10 Package to Manage Global Application Values for All Database Users
6-11 Package to Manage Global Application Context Values for a User Moving Between Applications
6-12 Package to Manage Global Application Context Values for Nondatabase Users
6-13 Using OCIStmtExecute to Retrieve a Client Session ID Value
6-14 Retrieving a Client Session ID Value for Client Session-Based Contexts
7-1 Attaching a Simple Oracle Virtual Private Database Policy to a Table
7-2 Specifying SQL Statement Types with DBMS_RLS.ADD_POLICY
7-3 Creating a Column-Level Oracle Virtual Private Database Policy
7-4 Adding a Column Masking to an Oracle Virtual Private Database Policy
7-5 Creating a DYNAMIC Policy with DBMS_RLS.ADD_POLICY
7-6 Creating a STATIC Policy with DBMS_RLS.ADD_POLICY
7-7 Creating a SHARED_STATIC Policy with DBMS_RLS.ADD_POLICY
7-8 Creating a CONTEXT_SENSITIVE Policy with DBMS_RLS.ADD_POLICY
7-9 Creating a SHARED_CONTEXT_SENSITIVE Policy with DBMS_RLS.ADD_POLICY
9-1 Checking the Current Value of the AUDIT_TRAIL Initialization Parameter
9-2 Enabling the Standard Audit Trail
9-3 Text File Operating System Audit Trail
9-4 XML File Operating System Audit Trail
9-5 Syslog Audit Trail for SYS User
9-6 Using AUDIT to Audit User Actions
9-7 Using AUDIT to Enable SQL Statement Auditing
9-8 Using NOAUDIT to Remove Session and SQL Statement Auditing
9-9 Using NOAUDIT to Remove ALL STATEMENTS Auditing
9-10 Using AUDIT to Configure Privilege Auditing
9-11 Auditing Unsuccessful Statements and Privileges
9-12 Using AUDIT to Audit a SQL Statement on Behalf of a Proxy User
9-13 Configuring Auditing for a Schema Table
9-14 Auditing Successful Statements on a Schema Table
9-15 Configuring Auditing for Any New Objects Using the DEFAULT Clause
9-16 Auditing the Execution of a Procedure or Function
9-17 Auditing a Directory Object
9-18 Auditing All Functions, Procedures, Packages, and Triggers
9-19 Auditing a User's Execution of Functions, Procedures, Packages, and Triggers
9-20 Auditing the Execution of a Procedure or Function within a Schema
9-21 Using DBMS_FGA.ADD_POLICY to Create a Fine-Grained Audit Policy
9-22 Disabling a Fine-Grained Audit Policy
9-23 Enabling a Fine-Grained Audit Policy
9-24 Dropping a Fine-Grained Audit Policy
9-25 Directly Calling a Database Audit Trail Purge Operation
Scripting on this page enhances content navigation, but does not change the content in any way.