Skip Headers
Oracle® Database Security Guide
11g Release 1 (11.1)
Part Number B28531-04
Home
Book List
Contents
Index
Master Index
Contact Us
Previous
Next
View PDF
List of Examples
2-1 Creating a User Account with CONNECT and CREATE SESSION Privileges
2-2 Altering a User Account
2-3 Querying V$SESSION for the Session ID of a User
2-4 Killing a User Session
2-5 Finding Objects Owned by a User
2-6 Dropping a User Account
3-1 Password Creation PL/SQL Statements
3-2 Locking an Account with the CREATE PROFILE Statement
3-3 Setting Password Aging and Expiration with the CREATE PROFILE Statement
3-4 Enabling Case Sensitivity in Passwords
3-5 Enabling Password Case Sensitivity
3-6 Sample SQLNET.ORA File with Wallet Parameters Set
3-7 Altering a User Account to Connect Through a Proxy User Account
4-1 Setting O7_DICTIONARY_ACCESSIBILITY to FALSE
4-2 Creating a User Role Authorized by a Password
4-3 Altering a Role to be Authorized by an External Source
4-4 Creating a Role Authorized by a PL/SQL Package for an Application
4-5 Creating a Role Authorized by an External Source
4-6 Creating a Global Role
4-7 Revoking All Object Privileges Using CASCADE CONSTRAINTS
4-8 Package Objects Affected by Procedure Privileges
4-9 Granting a System Privilege and a Role to a User
4-10 Granting the ADMIN OPTION
4-11 Creating a New User with the GRANT Statement
4-12 Granting Object Privileges to Users
4-13 Using SET ROLE to Grant a Role and Specify a Password
4-14 Using SET ROLE to Disable All Roles
4-15 Using ALTER USER to Set Default Roles
4-16 Creating an Access Control List for a Single Role and Network Connection
4-17 Creating an Access Control List for Multiple Roles and Network Connections
4-18 Using the DBA_NETWORK_ACL_PRIVILEGES View to Show Granted Privileges
4-19 Using the DBA_NETWORK_ACLS View to Show Host Assignments
4-20 Administrator Checking User Permissions for Network Host Connections
4-21 Administrator Checking Permissions for Domain Name Resolution
4-22 User Checking Permissions for Network Host Connections
4-23 User Checking Privileges for Domain Name Resolution
5-1 Java Code for Reading Passwords
6-1 Creating a Database Session-Based Application Context
6-2 Finding SYS_CONTEXT Values
6-3 Simple Procedure to Create an Application Context Value
6-4 Creating a Simple Logon Trigger
6-5 Creating a Logon Trigger for a Production Environment
6-6 Creating a Logon Trigger for a Development Environment
6-7 Package to Retrieve Session Data and Set a Database Session Context
6-8 Creating an Externalized Database Session-based Application Context
6-9 Creating a Global Application Context
6-10 Package to Manage Global Application Values for All Database Users
6-11 Package to Manage Global Application Context Values for a User Moving Between Applications
6-12 Package to Manage Global Application Context Values for Nondatabase Users
6-13 Using OCIStmtExecute to Retrieve a Client Session ID Value
6-14 Retrieving a Client Session ID Value for Client Session-Based Contexts
7-1 Attaching a Simple Oracle Virtual Private Database Policy to a Table
7-2 Specifying SQL Statement Types with DBMS_RLS.ADD_POLICY
7-3 Creating a Column-Level Oracle Virtual Private Database Policy
7-4 Adding a Column Masking to an Oracle Virtual Private Database Policy
7-5 Creating a DYNAMIC Policy with DBMS_RLS.ADD_POLICY
7-6 Creating a STATIC Policy with DBMS_RLS.ADD_POLICY
7-7 Creating a SHARED_STATIC Policy with DBMS_RLS.ADD_POLICY
7-8 Creating a CONTEXT_SENSITIVE Policy with DBMS_RLS.ADD_POLICY
7-9 Creating a SHARED_CONTEXT_SENSITIVE Policy with DBMS_RLS.ADD_POLICY
9-1 Checking the Current Value of the AUDIT_TRAIL Initialization Parameter
9-2 Enabling the Standard Audit Trail
9-3 AUDIT Statement Using BY Clause
9-4 Using AUDIT to Enable SQL Statement Auditing
9-5 Using NOAUDIT to Disable Session and SQL Statement Auditing
9-6 Using NOAUDIT to Disable All Auditing
9-7 Using AUDIT to Enable Privilege Auditing
9-8 Using AUDIT to Audit a SQL Statement on Behalf of a Proxy User
9-9 Using AUDIT to Enable Auditing for Schema Objects
9-10 Using AUDIT to Audit User Actions
9-11 Using NOAUDIT to Disable Network Auditing
9-12 Enabling Auditing for Users Who Connect as SYS
9-13 Using a Trigger to Record Customized Audit Information
9-14 Using DBMS_FGA.ADD_POLICY to Create a Fine-Grained Audit Policy
9-15 Disabling a Fine-Grained Audit Policy
9-16 Enabling a Fine-Grained Audit Policy
9-17 Dropping a Fine-Grained Audit Policy