8. Managing Users and Security. Practices. Database Master UPB, Computer Science Department 1 8. Managing Users and Security Abstract: Controlling database access and resource limits is an important aspect of the DBA’s function. You use profiles to manage the database and system resources and to manage database passwords and password verification. You control database and data access using privileges, and you create roles to manage the privileges. This lesson covers creating users and assigning proper resources and privileges. It also discusses the auditing capabilities of the database and using Globalization Support. Contents 1. Profiles .............................................................................................................................................2 1.1. Managing Resources ...............................................................................................................2 1.2. Managing Password ................................................................................................................4 1.3. Managing Profiles ...................................................................................................................5 1.4. Querying Profile Information .................................................................................................8 2. Users...............................................................................................................................................10 2.1. Managing Users ....................................................................................................................10 2.2. Authenticating Users.............................................................................................................13 2.3. Complying with Oracle Licensing Terms .............................................................................14 2.4. Querying User Information...................................................................................................15 3. Managing Privileges.......................................................................................................................18 3.1. Object Privileges ...................................................................................................................19 3.2. System Privileges..................................................................................................................21 3.3. Granting System Privileges ..................................................................................................25 3.4. Revoking Privileges ..............................................................................................................25 3.5. Querying Privilege Information ............................................................................................26 4. Managing Roles .............................................................................................................................30 4.1. Using Predefined Roles ........................................................................................................31 4.2. Removing Roles....................................................................................................................31 4.3. Enabling and Disabling Roles...............................................................................................31 5. Querying Role Information ............................................................................................................33 6. Auditing the Database ....................................................................................................................36 7. Using Globalization Support ..........................................................................................................37 7.1. The Unicode Character Set ...................................................................................................38 7.2. Using NLS Parameters..........................................................................................................39 7.3. Using NLS to Change Application Behavior........................................................................41 7.4. Obtaining NLS Data Dictionary Information .......................................................................41 8. Summary ........................................................................................................................................44 References ..............................................................................................................................................45