User Permissions for Oracle databases in Linux

Source: Internet
Author: User

Grant, view, and manage user permissions in Oracle in Linux.

In Oracle databases, user permissions are divided into two types (here we do not discuss the permissions of dba or role, but only the permissions of common users ), system Privilege System permission and User Table Privilege User data Table permission.

1. First, create a user. The following commands can be used to create a user, provided that you must Log On As a dba (if you are not a DBA, do not check it ):

Create user DB_USER identified by DB_USER_PW 'create user DB_USER with the password DB_USER_PW

Grant create session to DB_USER permission to create a session for the user

Grant resource to DB_USER

2. after a user is created, Scheme of the user is automatically generated in the Oracle database system (it can be understood as all tables belonging to the user, view .... object set ).

This user can grant access permissions to these objects to other system users.

3. After the user logs on with sqlplus, the following command shows the user's permissions (this part is taken from the CNOUG website ):

This user's permission to read other user objects:

Select * from user_tab_privs;

System permissions of the User:

Select * from user_sys_privs;

ORACLE Database User and permission management

ORACLE is a multi-user system that allows many users to share system resources. To ensure the security of the database system, the database management system is configured with a sound security mechanism.

2. 1 ORACLE Database Security Policy

Establish system-level security assurance

System-level privileges are implemented by granting users system-level rights. System-level rights (SYSTEM privileges) include creating tablespaces, creating users, modifying users' rights, and deleting users. System privileges can be granted to users or recycled at any time. The ORACLE system has over 80 privileges.

Establish object-level security assurance

Object-level privileges are implemented by granting users the right to operate (query, add, delete, and modify) Specific tables, views, and sequences in the database.

Establish user-level security assurance

User-level security assurance is implemented through user passwords and role mechanisms (a set of rights. The role mechanism is introduced to simplify user authorization and management. The practice is to group users by their functions, create roles for each user, and assign roles to users. users with the same roles have the same privileges.

2.2 user management

The content of ORACLE user management mainly includes User Creation, modification and deletion.

User Creation


> Identified by jxzy_password

> Default tablespace system

> QUATA 5 m on system; // maximum space limit for users

User Modification


> Identified by jxzy_pw

> QUATA 10 m on system;

Delete users and their created objects

SQL> DROP USER jxzy CASCADE; // Delete the created object at the same time

  • 1
  • 2
  • 3
  • Next Page

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.