Administering Users For Security Purposes: User and Roles
Administering Users For Security Purposes: User and Roles
Administering Users For Security Purposes: User and Roles
Welcome to the third module of this course. For this lesson, we will
discuss the importance of administering user and assign a specific role.
– A unique username
– An authentication method
– A default tablespace
– A temporary tablespace
– A user profile
– An initial consumer group
– An account status
• A schema:
Benefits of Roles
2
MODULE OF INSTRUCTION
Privileges
Database security:
System security
Data security
System privileges: Gaining access to the database
System Privileges
Creating Users
Syntax:
This user IT_MGR may access only the oracle server once a
session is granted. A session in database is also known as
system privilege.
Syntax:
4
MODULE OF INSTRUCTION
CREATE SESSION
CREATE TABLE
CREATE SEQUENCE
CREATE VIEW
CREATE PROCEDURE
What Is a Role?
First, the DBA must create the role. Then the DBA can
assign privileges to the role and assign the role to users.
Syntax
In the syntax:
Example:
After the role is created, the DBA can use the GRANT
statement to assign the role to users as well as assign
privileges to the role.
Example:
The user IT_MGR will now have the new password set
as myornpassword01.
Object Privileges
Syntax:
6
MODULE OF INSTRUCTION
GRANT IT
To IT_MGR
all the associated role of IT is now granted to IT_MGR, this
means IT_MGR can now perform SELECT, INSERT ,
UPDATE and DELETE
Example:
LESSON SUMMARY:
In this lesson, you should have learned about statements that control
access to the database and database objects.
Activities/Exercises
Download the Laboratory Exercise 1: Managing User
and Roles in LMS Portal.
Download the Departments.txt – this is the table to use
for the succeeding activity
Follow the instruction carefully, when you skip once
transaction that must be performed before jumping unto
the next number this might cause a different output.
In each number questions with essay part should
answered briefly, question with PL/SQL requires the
PL/SQL used in order to come up with the solution.
8
MODULE OF INSTRUCTION
Glossary
• Database security covers access and use of the database
objects and the actions that those users can have on the objects.
References
Textbook:
Oracle Database 11g 2nd Edition K Gopalakrishnan (
2012)
References:
Carlos, Peter (2009). Database Systems
Connoly, Thomas & Begg, Carolyn (2010). Database
Systems : A practical approach to design,
implementation and management
Sciore, Edward (2009). Database Design and
Implementation
Bulusu, Lakshman (2008). Oracle PL/SQL : Expert
Techniques for Developers and Database
Administrators
Loshin, David (2008). Master Data Management
10