• oracle权限类型大全


    Listings of System and Object Privileges

    System Privilege NameOperations Authorized

    Advisor Framework Privileges: All of the advisor framework privileges are part of the DBA role.

    ADVISOR

    Access the advisor framework through PL/SQL packages such as DBMS_ADVISOR and DBMS_SQLTUNE.

    ADMINISTER SQL TUNING SET

    Create, drop, select (read), load (write), and delete SQL tuning sets owned by the grantee through the DBMS_SQLTUNE package.

    ADMINISTER ANY SQL TUNING SET

    Create, drop, select (read), load (write), and delete SQL tuning sets owned by any user through the DBMS_SQLTUNE package.

    CREATE ANY SQL PROFILE

    Accept a SQL Profile recommended by the SQL Tuning Advisor, which is accessed through Enterprise Manager or by the DBMS_SQLTUNE package.

    Note: This privilege has been deprecated in favor of ADMINISTER SQL MANAGEMENT OBJECT.

    ALTER ANY SQL PROFILE

    Alter the attributes of an existing SQL Profile.

    Note: This privilege has been deprecated in favor of ADMINISTER SQL MANAGEMENT OBJECT.

    DROP ANY SQL PROFILE

    Drop existing SQL Profiles.

    Note: This privilege has been deprecated in favor of ADMINISTER SQL MANAGEMENT OBJECT.

    ADMINISTER SQL MANAGEMENT OBJECT

    Create, alter, and drop SQL Profiles owned by any user through the DBMS_SQLTUNE package.

    ANALYTIC VIEWS

    CREATE ANALYTIC VIEW

    Create analytic views in the grantee's schema.

    CREATE ANY ANALYTIC VIEW

    Create analytic views in any schema except SYSAUDSYS.

    ALTER ANY ANALYTIC VIEW

    Rename analytic views in any schema except SYS, AUDSYS.

    DROP ANY ANALYTIC VIEW

    Drop analytic views in any schema except SYSAUDSYS .

    ATTRIBUTE DIMENSIONS

    CREATE ATTRIBUTE DIMENSION

    Create attribute dimensions in the grantee's schema.

    CREATE ANY ATTRIBUTE DIMENSION

    Create attribute dimensions in any schema except SYS,AUDSYS.

    ALTER ANY ATTRIBUTE DIMENSION

    Rename attribute dimensions in any schema except SYS,AUDSYS.

    DROP ANY ATTRIBUTE DIMENSION

    Drop attribute dimensions in any schema except SYS,AUDSYS.

    CLUSTERS:

    CREATE CLUSTER

    Create clusters in the grantee's schema.

    CREATE ANY CLUSTER

    Create clusters in any schema except SYS,AUDSYS. Behaves similarly to CREATE ANY TABLE.

    ALTER ANY CLUSTER

    Alter clusters in any schema except SYSAUDSYS.

    DROP ANY CLUSTER

    Drop clusters in any schema except SYS,AUDSYS.

    CONTEXTS:

    CREATE ANY CONTEXT

    Create any context namespace.

    DROP ANY CONTEXT

    Drop any context namespace.

    DATA REDACTION:

    EXEMPT REDACTION POLICY

    Bypass any existing Oracle Data Redaction policies and view actual data from tables or views on which Data Redaction policies are defined.

    DATABASE:

    ALTER DATABASE

    Alter the database.

    ALTER SYSTEM

    Issue ALTER SYSTEM statements.

    AUDIT SYSTEM

    Issue AUDIT statements.

    DATABASE LINKS:

    CREATE DATABASE LINK

    Create private database links in the grantee's schema.

    CREATE PUBLIC DATABASE LINK

    Create public database links.

    ALTER DATABASE LINK

    Modify a fixed-user database link when the password of the connection or authentication user changes.

    ALTER PUBLIC DATABASE LINK

    Modify a public fixed-user database link when the password of the connection or authentication user changes.

    DROP PUBLIC DATABASE LINK

    Drop public database links.

    DEBUGGING:

    DEBUG CONNECT SESSION

    Connect the current session to a debugger.

    DEBUG ANY PROCEDURE

    Debug all PL/SQL and Java code in any database object. Display information on all SQL statements executed by the application.

    Note: Granting this privilege is equivalent to granting the DEBUG object privilege on all applicable objects in the database.

    DICTIONARIES:

    ANALYZE ANY DICTIONARY

    Analyze any data dictionary object.

    DIMENSIONS:

    CREATE DIMENSION

    Create dimensions in the grantee's schema.

    CREATE ANY DIMENSION

    Create dimensions in any schema except SYS,AUDSYS.

    ALTER ANY DIMENSION

    Alter dimensions in any schema except SYS,AUDSYS.

    DROP ANY DIMENSION

    Drop dimensions in any schema except SYS,AUDSYS.

    DIRECTORIES:

    CREATE ANY DIRECTORY

    Create directory database objects.

    DROP ANY DIRECTORY

    Drop directory database objects.

    EDITIONS:

    CREATE ANY EDITION

    Create editions.

    DROP ANY EDITION

    Drop editions.

    FLASHBACK DATA ARCHIVES:

    FLASHBACK ARCHIVE ADMINISTER

    Create, alter, or drop any flashback data archive.

    HIERARCHIES

    CREATE HIERARCHY

    Create hierarchies in the grantee's schema.

    CREATE ANY HIERARCHY

    Create hierarchies in any schema except SYS,AUDSYS.

    ALTER ANY HIERARCHY

    Rename hierarchies in any schema except SYS,AUDSYS.

    DROP ANY HIERARCHY

    Drop hierarchies in any schema except SYSAUDSYS.

    INDEXES:

    CREATE ANY INDEX

    Create in any schema, except SYSAUDSYS, a domain index or an index on any table in any schema except SYS,AUDSYS.

    ALTER ANY INDEX

    Alter indexes in any schema except SYS,AUDSYS.

    DROP ANY INDEX

    Drop indexes in any schema except SYS,AUDSYS.

    INDEXTYPES:

    CREATE INDEXTYPE

    Create indextypes in the grantee's schema.

    CREATE ANY INDEXTYPE

    Create indextypes in any schema except SYS and create comments on indextypes in any schema except SYS.

    ALTER ANY INDEXTYPE

    Modify indextypes in any schema except SYS,AUDSYS.

    DROP ANY INDEXTYPE

    Drop indextypes in any schema except SYS,AUDSYS.

    EXECUTE ANY INDEXTYPE

    Reference indextypes in any schema except SYS,AUDSYS.

    JOB SCHEDULER OBJECTS:

    The following privileges are needed to execute procedures in the DBMS_SCHEDULER package. This privileges do not apply to lightweight jobs, which are not database objects. Refer to Oracle Database Administrator's Guide for more information about lightweight jobs.

    CREATE JOB

    Create, alter, or drop jobs, chains, schedules, programs, credentials, resource objects, or incompatibility resource objects in the grantee's schema.

    CREATE ANY JOB

    Create, alter, or drop jobs, chains, schedules, programs, credentials, resource objects, or incompatibility resource objects in any schema except SYS,AUDSYS.

    Note: This extremely powerful privilege allows the grantee to execute code as any other user. It should be granted with caution.

    CREATE EXTERNAL JOB

    Create in the grantee's schema an executable scheduler job that runs on the operating system.

    EXECUTE ANY CLASS

    Specify any job class in a job in the grantee's schema.

    EXECUTE ANY PROGRAM

    Use any program in a job in the grantee's schema.

    MANAGE SCHEDULER

    Create, alter, or drop any job class, window, or window group.

    USE ANY JOB RESOURCE

    Associate any schedule resource object with any program or job in the grantee’s schema.

    KEY MANAGEMENT FRAMEWORK:

    ADMINISTER KEY MANAGEMENT

    Manage keys and keystores.

    LIBRARIES:

    Caution: CREATE LIBARARYCREATE ANY LIBRARYALTER ANY LIBRARY, and EXECUTE ANY LIBRARY are extremely powerful privileges that should be granted only to trusted users. Refer to Oracle Database Security Guide before granting these privileges.

    CREATE LIBRARY

    Create external procedure or function libraries in the grantee's schema.

    CREATE ANY LIBRARY

    Create external procedure or function libraries in any schema except SYS,AUDSYS.

    ALTER ANY LIBRARY

    Alter external procedure or function libraries in any schema except SYS,AUDSYS.

    DROP ANY LIBRARY

    Drop external procedure or function libraries in any schema except SYS,AUDSYS.

    EXECUTE ANY LIBRARY

    Use external procedure or function libraries in any schema except SYS,AUDSYS.

    LOGMINER:

    LOGMINING

    Execute procedures in the DBMS_LOGMNR package in a CDB or a PDB. Query the contents of the V$LOGMNR_CONTENTS view.

    MATERIALIZED VIEWS:

    CREATE MATERIALIZED VIEW

    Create materialized views in the grantee's schema.

    CREATE ANY MATERIALIZED VIEW

    Create materialized views in any schema except SYS,AUDSYS.

    ALTER ANY MATERIALIZED VIEW

    Alter materialized views in any schema except SYS,AUDSYS.

    DROP ANY MATERIALIZED VIEW

    Drop materialized views in any schema except SYS,AUDSYS.

    QUERY REWRITE

    This privilege has been deprecated. No privileges are needed for a user to enable rewrite for a materialized view that references tables or views in the user's own schema.

    GLOBAL QUERY REWRITE

    Enable rewrite using a materialized view when that materialized view references tables or views in any schema except SYS.

    ON COMMIT REFRESH

    Create a refresh-on-commit materialized view on any table in the database.

    Alter a refresh-on-demand materialized view on any table in the database to refresh-on-commit.

    FLASHBACK ANY TABLE

    Issue a SQL Flashback Query on any table, view, or materialized view in any schema except SYS. This privilege is not needed to execute the DBMS_FLASHBACK procedures.

    MINING MODELS:

    CREATE MINING MODEL

    Create mining models in the grantee's schema using the DBMS_DATA_MINING.CREATE_MODEL procedure.

    CREATE ANY MINING MODEL

    Create mining models in any schema, except SYSAUDSYS, using the DBMS_DATA_MINING.CREATE_MODEL procedure.

    ALTER ANY MINING MODEL

    Change the mining model name or the associated cost matrix of a model in any schema, except SYSAUDSYS, using the applicable DBMS_DATA_MINING procedures.

    DROP ANY MINING MODEL

    Drop mining models in any schema, except SYS,AUDSYS, using the DBMS_DATA_MINING.DROP_MODEL procedure.

    SELECT ANY MINING MODEL

    Score or view mining models in any schema except SYS, AUDSYS. Scoring is done either with the PREDICTION family of SQL functions or with the DBMS_DATA_MINING.APPLY procedure. Viewing the model is done with the DBMS_DATA_MINING.GET_MODEL_DETAILS_* procedures.

    COMMENT ANY MINING MODEL

    Create comments on mining models in any schema, except SYSAUDSYS, using the SQL COMMENT statement.

    OLAP CUBES:

    The following privileges are valid when you are using Oracle Database with the OLAP option.

    CREATE CUBE

    Create OLAP cubes in the grantee's schema.

    CREATE ANY CUBE

    Create OLAP cubes in any schema except SYS,AUDSYS.

    ALTER ANY CUBE

    Alter OLAP cubes in any schema except SYS,AUDSYS.

    DROP ANY CUBE

    Drop OLAP cubes in any schema except SYS,AUDSYS.

    SELECT ANY CUBE

    Query or view OLAP cubes in any schema except SYS,AUDSYS.

    UPDATE ANY CUBE

    Update OLAP cubes in any schema except SYS,AUDSYS.

    OLAP CUBE MEASURE FOLDERS:

    The following privileges are valid when you are using Oracle Database with the OLAP option.

    CREATE MEASURE FOLDER

    Create OLAP measure folders in the grantee's schema.

    CREATE ANY MEASURE FOLDER

    Create OLAP measure folders in any schema except SYS,AUDSYS.

    DELETE ANY MEASURE FOLDER

    Delete a measure from an OLAP measure folder in any schema except SYS,AUDSYS.

    DROP ANY MEASURE FOLDER

    Drop OLAP measure folders in any schema except SYS,AUDSYS.

    INSERT ANY MEASURE FOLDER

    Insert a measure into an OLAP measure folder in any schema except SYS,AUDSYS.

    OLAP CUBE DIMENSIONS:

    The following privileges are valid when you are using Oracle Database with the OLAP option.

    CREATE CUBE DIMENSION

    Create OLAP cube dimension in the grantee's schema.

    CREATE ANY CUBE DIMENSION

    Create OLAP cube dimensions in any schema except SYS,AUDSYS.

    ALTER ANY CUBE DIMENSION

    Alter OLAP cube dimensions in any schema except SYS,AUDSYS.

    DELETE ANY CUBE DIMENSION

    Delete from OLAP cube dimensions in any schema except SYS, AUDSYS.

    DROP ANY CUBE DIMENSION

    Drop OLAP cube dimensions in any schema except SYS,AUDSYS.

    INSERT ANY CUBE DIMENSION

    Insert into OLAP cube dimensions in any schema except SYS,AUDSYS.

    SELECT ANY CUBE DIMENSION

    View or query OLAP cube dimensions in any schema except SYS,AUDSYS.

    UPDATE ANY CUBE DIMENSION

    Update OLAP cube dimensions in any schema except SYS,AUDSYS.

    OLAP CUBE BUILD PROCESSES:

    CREATE CUBE BUILD PROCESS

    Create OLAP cube build processes in the grantee's schema.

    CREATE ANY CUBE BUILD PROCESS

    Create OLAP cube build processes in any schema except SYS,AUDSYS.

    DROP ANY CUBE BUILD PROCESS

    Drop OLAP cube build processes in any schema except SYS,AUDSYS.

    UPDATE ANY CUBE BUILD PROCESS

    Update OLAP cube build processes in any schema except SYS,AUDSYS.

    OPERATORS:

    CREATE OPERATOR

    Create an operator and its bindings in the grantee's schema.

    CREATE ANY OPERATOR

    Create an operator and its bindings in any schema and create a comment on an operator in any schema.

    ALTER ANY OPERATOR

    Modify operators in any schema.

    DROP ANY OPERATOR

    Drop operators in any schema.

    EXECUTE ANY OPERATOR

    Reference operators in any schema.

    OUTLINES:

    CREATE ANY OUTLINE

    Create public outlines that can be used in any schema that uses outlines.

    ALTER ANY OUTLINE

    Modify outlines.

    DROP ANY OUTLINE

    Drop outlines.

    PDB LOCKDOWN PROFILES:

    CREATE LOCKDOWN PROFILE

    Create PDB lockdown profiles.

    ALTER LOCKDOWN PROFILE

    Alter PDB lockdown profiles.

    DROP LOCKDOWN PROFILE

    Drop PDB lockdown profiles.

    PLAN MANAGEMENT:

    ADMINISTER SQL MANAGEMENT OBJECT

    Perform controlled manipulation of plan history and SQL plan baselines maintained for various SQL statements.

    PLUGGABLE DATABASES:

    CREATE PLUGGABLE DATABASE

    Create a PDB.

    Plug in a PDB that was previously unplugged from a CDB.

    Clone a PDB.

    SET CONTAINER

    Allow a common user to switch into the container for which this privilege was granted. This privilege can be granted only to a common user or common role.

    PROCEDURES:

    CREATE PROCEDURE

    Create stored procedures, functions, or packages in the grantee's schema.

    CREATE ANY PROCEDURE

    Create stored procedures, functions, or packages in any schema except SYS,AUDSYS.

    ALTER ANY PROCEDURE

    Alter stored procedures, functions, or packages in any schema except SYS,AUDSYS.

    DROP ANY PROCEDURE

    Drop stored procedures, functions, or packages in any schema except SYS,AUDSYS.

    EXECUTE ANY PROCEDURE

    Execute procedures or functions, either standalone or packaged.

    Reference public package variables in any schema except SYS,AUDSYS.

    INHERIT ANY REMOTE PRIVILEGES

    Execute definer's rights procedures or functions that contain current user database links.

    PROFILES:

    CREATE PROFILE

    Create profiles.

    ALTER PROFILE

    Alter profiles.

    DROP PROFILE

    Drop profiles.

    ROLES:

    CREATE ROLE

    Create roles.

    ALTER ANY ROLE

    Alter any role in the database.

    DROP ANY ROLE

    Drop roles.

    GRANT ANY ROLE

    Grant any role in the database.

    ROLLBACK SEGMENTS:

    CREATE ROLLBACK SEGMENT

    Create rollback segments.

    ALTER ROLLBACK SEGMENT

    Alter rollback segments.

    DROP ROLLBACK SEGMENT

    Drop rollback segments.

    SEQUENCES:

    CREATE SEQUENCE

    Create sequences in the grantee's schema.

    CREATE ANY SEQUENCE

    Create sequences in any schema except SYS,AUDSYS.

    ALTER ANY SEQUENCE

    Alter sequences in any schema except SYS,AUDSYS.

    DROP ANY SEQUENCE

    Drop sequences in any schema except SYS,AUDSYS.

    SELECT ANY SEQUENCE

    Reference sequences in any schema except SYS,AUDSYS.

    SESSIONS:

    CREATE SESSION

    Connect to the database.

    ALTER RESOURCE COST

    Set costs for session resources.

    ALTER SESSION

    Enable and disable the SQL trace facility.

    RESTRICTED SESSION

    Logon after the instance is started using the SQL*Plus STARTUP RESTRICT statement.

    SNAPSHOTS:

    See MATERIALIZED VIEWS

    SQL TRANSLATION PROFILES:

    CREATE SQL TRANSLATION PROFILE

    Create SQL translation profiles in the grantee's schema.

    CREATE ANY SQL TRANSLATION PROFILE

    Create SQL translation profiles in any schema except SYS,AUDSYS.

    ALTER ANY SQL TRANSLATION PROFILE

    Alter the translator, custom SQL statement translations, or custom error translations of a SQL translation profile in any schema except SYS,AUDSYS.

    USE ANY SQL TRANSLATION PROFILE

    Use SQL translation profiles in any schema except SYS,AUDSYS.

    DROP ANY SQL TRANSLATION PROFILE

    Drop SQL translation profiles in any schema except SYS,AUDSYS.

    TRANSLATE ANY SQL

    Translate SQL through the grantee's SQL translation profile for any user.

    SYNONYMS:

    Caution: CREATE PUBLIC SYNONYM and DROP PUBLIC SYNONYM are extremely powerful privileges that should be granted only to trusted users. Refer to Oracle Database Security Guide before granting these privileges.

    CREATE SYNONYM

    Create synonyms in the grantee's schema.

    CREATE ANY SYNONYM

    Create private synonyms in any schema except SYS,AUDSYS.

    CREATE PUBLIC SYNONYM

    Create public synonyms.

    DROP ANY SYNONYM

    Drop private synonyms in any schema except SYS,AUDSYS.

    DROP PUBLIC SYNONYM

    Drop public synonyms.

    TABLES:

    Note: For external tables, the only valid privileges are CREATE ANY TABLEALTER ANY TABLEDROP ANY TABLEREAD ANY TABLE, and SELECT ANY TABLE.

    CREATE TABLE

    Create tables in the grantee's schema.

    CREATE ANY TABLE

    Create a table in any schema except SYS,AUDSYS. The owner of the schema containing the table must have space quota on the tablespace to contain the table.

    ALTER ANY TABLE

    Alter a table or view in any schema except SYSAUDSYS.

    BACKUP ANY TABLE

    Use the Export utility to incrementally export objects from the schema of other users except SYS,AUDSYS.

    DELETE ANY TABLE

    Delete rows from tables, table partitions, or views in any schema except SYS,AUDSYS.

    DROP ANY TABLE

    Drop or truncate tables or table partitions in any schema except SYS,AUDSYS.

    INSERT ANY TABLE

    Insert rows into tables and views in any schema except SYS,AUDSYS.

    LOCK ANY TABLE

    Lock tables and views in any schema except SYS,AUDSYS.

    READ ANY TABLE

    Query tables, views, or materialized views in any schema except SYS,AUDSYS.

    SELECT ANY TABLE

    Query tables, views, or materialized views in any schema except SYS,AUDSYS. Obtain row locks using a SELECT ... FOR UPDATE.

    FLASHBACK ANY TABLE

    Issue a SQL Flashback Query on any table, view, or materialized view in any schema except SYS,AUDSYS. This privilege is not needed to execute the DBMS_FLASHBACK procedures.

    UPDATE ANY TABLE

    Update rows in tables and views in any schema except SYS,AUDSYS.

    REDEFINE ANY TABLE

    Perform online redefinition without granting any of the privileges in USER or FULL mode.

    TABLESPACES:

    CREATE TABLESPACE

    Create tablespaces.

    ALTER TABLESPACE

    Alter tablespaces.

    DROP TABLESPACE

    Drop tablespaces.

    MANAGE TABLESPACE

    Take tablespaces offline and online and begin and end tablespace backups.

    UNLIMITED TABLESPACE

    Use an unlimited amount of any tablespace. This privilege overrides any specific quotas assigned. If you revoke this privilege from a user, then the user's schema objects remain but further tablespace allocation is denied unless authorized by specific tablespace quotas. You cannot grant this system privilege to roles.

    TRIGGERS:

    CREATE TRIGGER

    Create database triggers in the grantee's schema.

    CREATE ANY TRIGGER

    Create database triggers in any schema except SYS, AUDSYS.

    ALTER ANY TRIGGER

    Enable, disable, or compile database triggers in any schema except SYS,AUDSYS.

    DROP ANY TRIGGER

    Drop database triggers in any schema except SYS,AUDSYS.

    ADMINISTER DATABASE TRIGGER

    Create a trigger on DATABASE. You must also have the CREATE TRIGGER or CREATE ANY TRIGGER system privilege.

    TYPES:

    CREATE TYPE

    Create object types and object type bodies in the grantee's schema.

    CREATE ANY TYPE

    Create object types and object type bodies in any schema except SYS,AUDSYS.

    ALTER ANY TYPE

    Alter object types in any schema except SYS,AUDSYS.

    DROP ANY TYPE

    Drop object types and object type bodies in any schema except SYS,AUDSYS.

    EXECUTE ANY TYPE

    Use and reference object types and collection types in any schema except SYS,AUDSYS, and invoke methods of an object type in any schema, except SYS,AUDSYS, if you make the grant to a specific user. If you grant EXECUTE ANY TYPE to a role, then users holding the enabled role will not be able to invoke methods of an object type in any schema.

    UNDER ANY TYPE

    Create subtypes under any nonfinal object types.

    USERS:

    CREATE USER

    Create users. This privilege also allows the creator to:

    • Assign quotas on any tablespace.

    • Set default and temporary tablespaces.

    • Assign a profile as part of a CREATE USER statement.

    ALTER USER

    Alter any user except SYS. This privilege authorizes the grantee to:

    • Change another user's password or authentication method.

    • Assign quotas on any tablespace.

    • Set default and temporary tablespaces.

    • Assign a profile and default roles.

    DROP USER

    Drop users

    VIEWS:

    CREATE VIEW

    Create views in the grantee's schema.

    CREATE ANY VIEW

    Create views in any schema except SYS,AUDSYS.

    DROP ANY VIEW

    Drop views in any schema except SYS,AUDSYS.

    UNDER ANY VIEW

    Create subviews under any object views.

    FLASHBACK ANY TABLE

    Issue a SQL Flashback Query on any table, view, or materialized view in any schema except SYS,AUDSYS. This privilege is not needed to execute the DBMS_FLASHBACK procedures.

    MERGE ANY VIEW

    If a user has been granted the MERGE ANY VIEW privilege, then for any query issued by that user, the optimizer can use view merging to improve query performance without performing the checks that would otherwise be performed to ensure that view merging does not violate any security intentions of the view creator. See also Oracle Database Reference for information on the OPTIMIZER_SECURE_VIEW_MERGING parameter and Oracle Database SQL Tuning Guide for information on view merging.

    MISCELLANEOUS:

    ANALYZE ANY

    Analyze a table, cluster, or index in any schema except SYS.

    AUDIT ANY

    Audit an object in any schema, except SYS,AUDSYS, using AUDIT schema_objects statements.

    BECOME USER

    Allow users of the Data Pump Import utility (impdp) and the original Import utility (imp) to assume the identity of another user in order to perform operations that cannot be directly performed by a third party (for example, loading objects such as object privilege grants).

    Allow Streams administrators to create or alter capture users and apply users in a Streams environment. By default this privilege is part of the DBA role. Database Vault removes this privileges from the DBA role. Therefore, this privilege is needed by Streams only in an environment where Database Vault is installed.

    CHANGE NOTIFICATION

    Create a registration on queries and receive database change notifications in response to DML or DDL changes to the objects associated with the registered queries. Refer to Oracle Database Development Guide for more information on database change notification.

    COMMENT ANY TABLE

    Comment on a table, view, or column in any schema except SYS,AUDSYS.

    EXEMPT ACCESS POLICY

    Bypass fine-grained access control.

    Caution: This is a very powerful system privilege, as it lets the grantee bypass application-driven security policies. Database administrators should use caution when granting this privilege.

    FORCE ANY TRANSACTION

    Force the commit or rollback of any in-doubt distributed transaction in the local database.

    Induce the failure of a distributed transaction.

    FORCE TRANSACTION

    Force the commit or rollback of the grantee's in-doubt distributed transactions in the local database.

    GRANT ANY OBJECT PRIVILEGE

    Grant any object privilege that the object owner is permitted to grant.

    Revoke any object privilege that was granted by the object owner or by some other user with the GRANT ANY OBJECT PRIVILEGE privilege.

    GRANT ANY PRIVILEGE

    Grant any system privilege.

    INHERIT ANY PRIVILEGES

    Execute invoker's rights procedures owned by the grantee with the privileges of the invoker.

    KEEP DATE TIME

    The SYSDATE and SYSTIMESTAMP functions return their original values during replay for Application Continuity when the grantee is running the application. This privilege is useful for providing bind variable consistency after recoverable errors.

    Note: If this privilege is granted or revoked between runtime and failover of a request, then the original values are not returned during replay for Application Continuity for that request.

    KEEP SYSGUID

    The SYS_GUID function returns its original value during replay for Application Continuity when the grantee is running the application. This privilege is useful for providing bind variable consistency after recoverable errors.

    Note: If this privilege is granted or revoked between runtime and failover of a request, then the original value is not returned during replay for Application Continuity for that request.

    PURGE DBA_RECYCLEBIN

    Remove all objects from the system-wide recycle bin.

    RESUMABLE

    Enable resumable space allocation.

    SELECT ANY DICTIONARY

    Query any data dictionary object in the SYS schema, with the exception of the following objects: DEFAULT_PWD$ENC$LINK$USER$USER_HISTORY$, and XS$VERIFIERS.

    This privilege lets you selectively override the default FALSE setting of the O7_DICTIONARY_ACCESSIBILITY initialization parameter.

    SELECT ANY TRANSACTION

    Query the contents of the FLASHBACK_TRANSACTION_QUERY view.

    Caution: This is a very powerful system privilege, as it lets the grantee view all data in the database, including past data. This privilege should be granted only to users who need to use the Oracle Flashback Transaction Query feature.

    SYSBACKUP

    Perform the following backup and recovery operations:

    STARTUP and SHUTDOWN.

    CREATE CONTROLFILE.

    CREATE PFILE and CREATE SPFILE.

    FLASHBACK DATABASE.

    Create, use, view, and drop restore points (including guaranteed restore points).

    Execute procedures in the DBMS_DATAPUMPDBMS_PIPEDBMS_TDB, and DBMS_TTS packages.

    SELECT on X$ tables, V$ views, and GV$ views.

    Includes the ALTER DATABASEALTER SESSIONALTER SYSTEMALTER TABLESPACECREATE ANY CLUSTERCREATE ANY DIRECTORYCREATE ANY TABLECREATE SESSIONDROP DATABASEDROP TABLESPACERESUMABLESELECT ANY DICTIONARYSELECT ANY TRANSACTIONUNLIMITED TABLESPACE privileges and the SELECT_CATALOG_ROLE role.

    SYSDBA

    STARTUP and SHUTDOWN.

    ALTER DATABASE: open, mount, back up, or change character set.

    CREATE DATABASE.

    DROP DATABASE.

    ARCHIVELOG and RECOVERY.

    CREATE SPFILE.

    Includes the RESTRICTED SESSION privilege.

    SYSDG

    Perform the following Oracle Data Guard operations:

    STARTUP and SHUTDOWN.

    FLASHBACK DATABASE.

    Create, use, view, and drop restore points (including guaranteed restore points).

    SELECT on X$ tables, V$ views, and GV$ views.

    Includes the ALTER DATABASEALTER SESSIONALTER SYSTEMCREATE SESSION, and SELECT ANY DICTIONARY privileges.

    SYSKM

    Perform the following encryption key management operations:

    Connect to the database even if the database is not open.

    SELECT on the following views when the database is open: V$CLIENT_SECRETSV$ENCRYPTED_TABLESPACESV$ENCRYPTION_KEYSV$ENCRYPTION_WALLET and V$WALLET.

    Includes the ADMINISTER KEY MANAGEMENT and CREATE SESSION privileges.

    SYSOPER

    STARTUP and SHUTDOWN operations.

    ALTER DATABASE: open, mount, or back up.

    ARCHIVELOG and RECOVERY.

    CREATE SPFILE.

    Includes the RESTRICTED SESSION privilege.

    Object Privileges

    Object Privilege NameOperations Authorized

    ANALYTIC VIEW PRIVILEGES

    The following analytic view privileges authorize operations on analytic views.

    ALTER

    Rename the analytic view.

    READ

    Query the object with the SELECT statement.

    SELECT Query the object with the SELECT statement.

    ATTRIBUTE DIMENSION PRIVILEGES

    The following attribute dimension privileges authorize operations on attribute dimensions..

    ALTER

    Rename the attribute dimension.

    DIRECTORY PRIVILEGES

    The following directory privileges provide secured access to the files stored in the operating system directory to which the directory object serves as a pointer. The directory object contains the full path name of the operating system directory where the files reside. Because the files are actually stored outside the database, Oracle Database server processes also need to have appropriate file permissions on the file system server. Granting object privileges on the directory database object to individual database users, rather than on the operating system, allows the database to enforce security during file operations.

    READ

    Read files in the directory.

    WRITE

    Write files in the directory. This privilege is useful only in connection with external tables. It allows the grantee to determine whether the external table agent can write a log file or a bad file to the directory.

    Restriction: This privilege does not allow the grantee to write to a BFILE.

    EXECUTE

    Execute a preprocessor program that resides in the directory. A preprocessor program converts data to a supported format when loading data records from an external table with the ORACLE_LOADER access driver. Refer to Oracle Database Utilities for more information. This privilege does not implicitly allow READ access on the external table data.

    EDITION PRIVILEGE

    The following edition privilege authorizes the use of an edition.

    USE

    Use an edition.

    FLASHBACK DATA ARCHIVE PRIVILEGE

    The following flashback data archive privilege authorizes operations on flashback data archives.

    FLASHBACK ARCHIVE

    Enable or disable historical tracking for a table.

    HIERARCHY PRIVILEGES

    The following hierarchy privileges authorize operations on hierarchies.

    ALTER

    Rename the hierarchy.

    READ

    Query the object with the SELECT statement.

    SELECT

    Query the object with the SELECT statement.

    INDEXTYPE PRIVILEGE

    The following indextype privilege authorizes operations on indextypes.

    EXECUTE

    Reference an indextype.

    LIBRARY PRIVILEGE

    The following library privilege authorizes operations on a library.

    EXECUTE

    Use and reference the specified object and invoke its methods.

    Caution: This extremely powerful privilege should be granted only to trusted users. Refer to Oracle Database Security Guide before granting this privilege.

    MATERIALIZED VIEW PRIVILEGES

    The following materialized view privileges authorize operations on a materialized view. The DELETEINSERT, and UPDATE privileges can be granted only to updatable materialized views.

    ON COMMIT REFRESH

    Create a refresh-on-commit materialized view on the specified table.

    QUERY REWRITE

    Create a materialized view for query rewrite using the specified table.

    READ

    Query the materialized view.

    SELECT

    Query the materialized view. Obtain row locks with the SELECT ... FOR UPDATE or LOCK TABLE statement.

    MINING MODEL PRIVILEGES

    The following mining model privileges authorize operations on a mining model. These privileges are not required for models within the users own schema.

    ALTER

    Change the mining model name or the associated cost matrix using the applicable DBMS_DATA_MINING procedures.

    SELECT

    Score or view the mining model. Scoring is done with the PREDICTION family of SQL functions or with the DBMS_DATA_MINING.APPLY procedure. Viewing the model is done with the DBMS_DATA_MINING.GET_MODEL_DETAILS_* procedures.

    OBJECT TYPE PRIVILEGES

    The following object type privileges authorize operations on a database object type.

    DEBUG

    Access, through a debugger, all public and nonpublic variables, methods, and types defined on the object type.

    Place a breakpoint or stop at a line or instruction boundary within the type body.

    EXECUTE

    Use and reference the specified object and invoke its methods.

    Access, through a debugger, public variables, types, and methods defined on the object type.

    UNDER

    Create a subtype under this type. You can grant this object privilege only if you have the UNDER ANY TYPE privilege WITH GRANT OPTION on the immediate supertype of this type.

    OLAP PRIVILEGES

    The following object privileges are valid if you are using Oracle Database with the OLAP option.

    INSERT

    Insert members into the OLAP cube dimension or measures into the measures folder.

    ALTER

    Change the definition of the OLAP cube dimension or cube.

    DELETE

    Delete members from the OLAP cube dimension or measures from the measures folder.

    SELECT

    View or query the OLAP cube or cube dimension.

    UPDATE

    Update measure values of the OLAP cube or attribute values of the cube dimension.

    OPERATOR PRIVILEGE

    The following operator privilege authorizes operations on user-defined operators.

    EXECUTE

    Reference an operator.

    PROCEDURE, FUNCTION, PACKAGE PRIVILEGES

    The following procedure, function, and package privileges authorize operations on procedures, functions, and packages. These privileges also apply to Java sources, classes, and resources, which Oracle Database treats as though they were procedures for purposes of granting object privileges.

    DEBUG

    Access, through a debugger, all public and nonpublic variables, methods, and types defined on the object.

    Place a breakpoint or stop at a line or instruction boundary within the procedure, function, or package. This privilege grants access to the declarations in the method or package specification and body.

    EXECUTE

    Execute the procedure or function directly, or access any program object declared in the specification of a package, or compile the object implicitly during a call to a currently invalid or uncompiled function or procedure. This privilege does not allow the grantee to explicitly compile using ALTER PROCEDURE or ALTER FUNCTION. For explicit compilation you need the appropriate ALTER system privilege.

    Access, through a debugger, public variables, types, and methods defined on the procedure, function, or package. This privilege grants access to the declarations in the method or package specification only.

    Job scheduler objects are created using the DBMS_SCHEDULER package. After these objects are created, you can grant the EXECUTE object privilege on job scheduler classes and programs. You can also grant ALTER privilege on job scheduler jobs, programs, and schedules.

    Note: Users do not need this privilege to execute a procedure, function, or package indirectly.

    SCHEDULER PRIVILEGES

    Job scheduler objects are created using the DBMS_SCHEDULER package. After these objects are created, you can grant the following privileges.

    EXECUTE

    Operations on job classes, programs, chains, and credentials.

    ALTER

    Modifications to jobs, programs, chains, credentials, and schedules.

    USE

    Associate the specified scheduler resource object with programs and jobs.

    SEQUENCE PRIVILEGES

    The following sequence privileges authorize operations on a sequence.

    ALTER

    Change the sequence definition with the ALTER SEQUENCE statement.

    KEEP SEQUENCE

    The sequence pseudocolumn NEXTVAL retains its original value during replay for Application Continuity when the grantee is running the application. This privilege is useful for providing bind variable consistency when replaying after recoverable errors.

    If this privilege is granted or revoked between runtime and failover of a request, then the original value of NEXTVAL is not retained during replay for Application Continuity for that request.

    Note: This privilege is not granted by the GRANT ALL PRIVILEGES ON sequence statement. You must explicitly grant this privilege.

    Note: This privilege is part of the DBA role.

    SELECT

    Examine and increment values of the sequence with the CURRVAL and NEXTVAL pseudocolumns.

    SQL TRANSLATION PROFILE PRIVILEGES

    The following SQL translation profile privileges authorize operations on a SQL translation profile.

    ALTER

    Alter the translator, custom SQL statement translations, or custom error translations of a SQL translation profile.

    USE

    Use a SQL translation profile.

    SYNONYM PRIVILEGES

    Synonym privileges are the same as the privileges for the target object. Granting a privilege on a synonym is equivalent to granting the privilege on the base object. Similarly, granting a privilege on a base object is equivalent to granting the privilege on all synonyms for the object. If you grant to a user a privilege on a synonym, then the user can use either the synonym name or the base object name in the SQL statement that exercises the privilege.

    TABLE PRIVILEGES

    The following table privileges authorize operations on a table. Any one of following object privileges, except the READ privilege, allows the grantee to lock the table in any lock mode with the LOCK TABLE statement.

    Note: For external tables, the only valid object privileges are ALTERREAD, and SELECT.

    ALTER

    Change the table definition with the ALTER TABLE statement.

    DEBUG

    Access, through a debugger:

    • PL/SQL code in the body of any triggers defined on the table

    • Information on SQL statements that reference the table directly

    DELETE

    Remove rows from the table with the DELETE statement.

    Note: You must grant the SELECT privilege on the table along with the DELETE privilege if the table is on a remote database.

    INDEX

    Create an index on the table with the CREATE INDEX statement.

    INSERT

    Add new rows to the table with the INSERT statement.

    Note: You must grant the SELECT privilege on the table along with the INSERT privilege if the table is on a remote database.

    READ

    Query the table with the SELECT statement. Does not allow SELECT ... FOR UPDATE.

    REFERENCES

    Create a constraint that refers to the table. You cannot grant this privilege to a role.

    SELECT

    Query the table with the SELECT statement, including SELECT ... FOR UPDATE.

    UPDATE

    Change data in the table with the UPDATE statement.

    Note: You must grant the SELECT privilege on the table along with the UPDATE privilege if the table is on a remote database.

    USER PRIVILEGES

    The following privileges authorize operations on a user.

    INHERIT PRIVILEGES

    Execute invoker's rights procedures or functions owned by the grantee with the privileges of the invoker when the invoker is the user on whom this privilege is granted.

    INHERIT REMOTE PRIVILEGES

    Allow the user on whom this privilege is granted to execute definer's rights procedures or functions that contain current user database links and are owned by the grantee.

    TRANSLATE SQL

    Translate SQL through the grantee's SQL translation profile for the user on whom this privilege is granted.

    VIEW PRIVILEGES

    The following view privileges authorize operations on a view. Any one of the following object privileges, except the READ privilege, allows the grantee to lock the view in any lock mode with the LOCK TABLE statement.

    To grant a privilege on a view, you must have that privilege with the GRANT OPTION on all of the base tables of the view.

    DEBUG

    Access, through a debugger:

    • PL/SQL code in the body of any triggers defined on the view

    • Information on SQL statements that reference the view directly

    DELETE

    Remove rows from the view with the DELETE statement.

    INSERT

    Add new rows to the view with the INSERT statement.

    MERGE VIEW

    This object privilege has the same behavior as the system privilege MERGE ANY VIEW, except that the privilege is limited to the views specified in the ON clause. For any query issued by the grantee on the specified views, the optimizer can use view merging to improve query performance without performing the checks that would otherwise be performed to ensure that view merging does not violate any security intentions of the view creator.

    READ

    Query the view with the SELECT statement. Does not allow SELECT ... FOR UPDATE.

    REFERENCES

    Define foreign key constraints on the view.

    SELECT

    Query the view with the SELECT statement, including SELECT ... FOR UPDATE.

    See Also: object_privilege for additional information on granting this object privilege on a view

    UNDER

    Create a subview under this view. You can grant this object privilege only if you have the UNDER ANY VIEW privilege WITH GRANT OPTION on the immediate superview of this view.

    UPDATE

    Change data in the view with the UPDATE statement.

  • 相关阅读:
    alloffthelights使用方法
    tweenMax学习笔记
    移动端获取手机摄像头和相册
    livereload使用方法
    Bower使用笔记
    github 远程仓库
    git for windows 本地仓库
    python 对文件操作
    Python 装饰器
    JavaScript 做的网页版扫雷小游戏
  • 原文地址:https://www.cnblogs.com/wonchaofan/p/16714084.html
Copyright © 2020-2023  润新知