Understanding of oracle grant authorization GRANT name GRANT-GRANT a user, a group or all users access permissions grant privilege [,...] ON object [,...] TO {PUBLIC | GROUP group | username} You can enter privilege with the following permissions: www.2cto.com select to access all columns/fields in the declared table/view. INSERT inserts all column fields into the declared table. UPDATE all columns/fields declared. DELETE
Delete all rows from the declared table. RULE defines rules on the table/view (see create rule Statement ). ALL grant ALL permissions. object Name. possible objects are: table (table) view (view) sequence (sequence) index (index) ============================================================== PUBLIC represents the abbreviation of all users. GROUP group www.2cto.com. in the current version, the Group must be explicitly created using the following method. username: the user name to be granted permissions. PUBLIC is short for all users. output
If CHANGE is successful, this message is returned. ERROR: ChangeAcl: class "object" not found if the declared object is unavailable or it is impossible to grant permissions to the declared group or user. description GRANT allows the Object Creator to GRANT certain permissions to a user or a group or all users (PUBLIC. after an object is created, no one except the Creator grants the object permission.
Once a user has the permission of an object, he can use the permission. you do not need to GRANT (GRANT) the object permissions to the creator. The Creator automatically has all the permissions of the object, including the permission to delete it. note: To grant only several columns of permissions to ipvs, you must create a view containing those columns and grant the permissions to those views. Www.2cto.com use the psql z command to obtain more information about the existing object permissions: database = lusitania + ---------------- + region + | Relation | Grant/Revoke Permissions | + ------------------ + region + | mytable | {"= rw", "miriam = arwR ", "group todos = rw"} | + -------------------- + ------------------------------------------- + Legend: uname = arwR -- privileges granted to a user group gname = arwR -- privileges granted to a GROUP = arwR -- privileges granted to PUBLIC r -- SELECT w -- UPDATE/DELETE a -- insert r -- RULE arwR -- ALL
TIPS: currently, to create a GROUP, you have to manually INSERT data to the pg_group table, such as: insert into pg_group VALUES ('todos '); create user miriam in group todos; refer to the REVOKE statement to reassign access permissions. usage: grant insert on films to public;
Grant all permissions TO the manuel operation view kinds: grant all on kinds TO manuel; compatibility SQL92 www.2cto.com SQL92 GRANT syntax allows you TO set permissions for a single column/field in the table, you can also set a permission to grant the same permissions to others. GRANT privilege [,...] ON object [(column [,...])] [,...] TO {PUBLIC | username [,...]} [with grant option] these fields are compatible WITH ipvs implementation, except for the following exceptions: privilege SQL92 allows declaring additional permissions: select references allows certain or all columns/fields to be used in the integration constraints of a declared table. USAGE allows a domain, Character Set, set, or transaction. if the declared object is not a table or view, privilege can only be declared as USAGE. object [TABLE] table SQL92 allows an additional non-function keyword TABLE. CHARACTER SET
The declared character set is allowed. COLLATION www.2cto.com allows the use of declared set sequences. TRANSLATION allows the use of declared Character Set conversion. DOMAIN www.2cto.com allows the use of the declared DOMAIN. with grant option allows you to GRANT the same permissions to others. oracle because the user is not dba ORA-01536: because there is no TABLESPACE operation permission can be added: grant unlimited tablespace to create a user in Oracle10, then write the stored procedure to debug in PL/SQL Developer, prompting ORA-0131: Insufficient privileges. note: Debugging requires the debug connect session system privilege. log On with the Administrator account, run the grant Debug Connect Session to sky_test; command, and then Debug. Everything is OK.