ORACLE core technology of information security

2010-09-07  来源:本站原创  分类:Database  人气:56 

--=======================================
--  The following three steps in the System / manager user to operate
--scott  Lack of user rights
--=======================================
--(  Note :  Needless to build the table so if the user object, use  create user jyp identified by jyp  Users can build, otherwise  ,  Take the following three steps  )
--  First step  :  Create table space
create tablespace MYTS
datafile 'e:\MyOracleData.dbf'
size 5m
--  The second step  :  Create a user
create user jyp identified by jyp--  If you write the password number, you need to add  ""
default tablespace MYTS
temporary tablespace temp
quota 1m on myts;--  Limit must be allocated, or when the construction will be reported in Table  "  Without permission in the tablespace MYTS  "  Error
--  The third step  :  Authorize
grant create session to jyp;

grant create table to jyp;
--  Note : When the permissions granted to the user to build tables, built for the users table  ,  Needless to once again grant the user data in the table
--  To increase. Delete  .  Change permissions
grant create sequence to jyp;
grant create synonym to jyp;
--  Other user's actions
--
--  Change Password
alter user jyp identified by "111";
--  Modify the table space limits
alter user jyp quota 2m on myts;

--  Delete User
drop user jyp
drop user jyp cascade;--  If the model contains a database object, use the operating
--  Delete the table space
drop tablespace myts;
drop tablespace myts including contents;--  If the tablespace contains database objects, use the operating
--=============================
--  Role authorization
--=============================
--------------------------------------------------------------
--  Scott user operation in
grant select on emp to jyp; revoke select on emp from jyp;

grant insert on emp to jyp; revoke insert on emp from jyp;

grant update on emp to jyp; revoke update on emp from jyp;

grant delete on emp to jyp; revoke delete on emp from jyp;
--------------------------------------------------------------
]--  The method of repeated authorization powers  ,  A lot of trouble
--  Use role-based authorization
------------------------------------------------------------------
--  Granted in the system  scott  Users create role permissions  ,  Scott carried out in the following
--  First step  :  Establish the role of
create role role_A
--  The second step  :  Given the appropriate permissions roles
grant select,insert,update,delete on emp to role_A;
--  The third step  :  Assign roles to users
grant role_A to jyp;
------------------------------------------------------------------
--  Note  :  After roles in the award of jyp  ,  Sometimes users need to log in again to take effect jyp
相关文章
  • ORACLE core technology of information security 2010-09-07

    --======================================= -- The following three steps in the System / manager user to operate --scott Lack of user rights --======================================= --( Note : Needless to build the table so if the user object, use cre

  • Concerned about the Web application layer "information security war" 2010-12-24

    Concerned about the Web application layer "information security war" Information] [IT168 hackers in China have their own General Assembly it? There. XCon General Assembly - the most professional security technology seminars. XCon General Assembl

  • J2EE Core Technology 2010-12-31

    http://www.berheley.com/jsnl/J2EEhxjs/index.html Quote J2EE (or Java 2 Platform, Enterprise Edition) is hosted by the Sun, launched a middleware technology. From the CORBA, IDL to message-oriented systems, middleware technology has come a long way, a

  • Oracle RAC technology option value? 2010-07-14

    With the development of IT technology, grid computing has become a hot topic, it bring low-cost, high performance and to facilitate sharing of computing resources is pursued by many companies. In this wave, the database technology where it will devel

  • Java architecture to support information security 2010-07-30

    Java language has three major characteristics: platform independence, network mobility and security Java Architecture First, Java source code files by the Java compiler to compile the binary byte code into Java class files Then, class file by a Java

  • The arrival of new opportunities: "Five-second" information security will usher in a period of unprecedented development 2010-12-24

    The arrival of new opportunities: "Five-second" information security will usher in a period of unprecedented development of "second Five-Year" plan affects the development of the next five years the direction of the entire national eco

  • Spring core technology learning summary 2010-03-29

    Spring core technology learning summary http://penghuaiyi.javaeye.com/blog/182616 During this time, read some documents and information on Spring, have a basic understanding of their. Spring's core technology consists of two main components: IoC and

  • Real wax fabric cotton mercerized heat through the core technology 2010-02-14

    Keywords: heat silk, silk through the core, real wax cotton fabric Qingdao Phoenix Printing & Dyeing Co., Xiao-Hui Guo 1, Introduction to the traditional cotton fabric, in order to improve the gloss and feel, common alkali treatment. Fabric padding l

  • VPN strategy - State Chevalier IPass3000 enterprise information security to new heights 2010-06-20

    As computer and Internet technology rapid development, Internat has become an important national and enterprise information infrastructure. At the same time, on the one hand with the growing scale enterprises in the province and even set up branches

  • VPN strategy - State Chevalier IPass3000 heights for enterprise information security 2010-06-20

    As computer and Internet technology rapid development, Internat has become an important national and enterprise information infrastructure. At the same time, on the one hand with the growing scale enterprises in the province and even set up branches

  • Explore the mystery behind the Google App Engine (1) - Google's core technology 2010-08-13

    This series of articles based on public information on the Google App Engine's implementation mechanism for in-depth study of this topic. Before the cut into the Google App Engine, Google's core technology will be the first of its overall framework a

  • Google's top ten core technology 2010-08-20

    Ten core technology of Google: Internet, that something of this series is based on public information on how Google App Engine is the depth of this topic. And before the cut into the Google App Engine, Google's core technology will be the first of it

  • Chevalier Country: Focus on the development of information security outsourcing 2010-10-08

    Chevalier Country: Focus on the development of service outsourcing of information security in 2009 and 2010, "service outsourcing" as the popular word is known to everyone. State issued a special service outsourcing for the development of releva

  • Development plan of things to focus on the introduction of information security 2010-11-02

    Development plan of things introduced in 2010 as the focus of information security is the most critical things a year industry, the introduction of government policies at all levels, the university institutes of technology development, standardizatio

  • Explore the mystery behind the Google App Engine (1) - Google's core technology (Zhuantie) 2011-05-26

    Note: This is a guest blog article series. Wu Zhu Hua contributor was engaged in the IBM China Research Institute of cloud computing-related research, is now working on cloud computing. This series of articles based on publicly available information

  • Explore the mystery behind the Google App Engine (1) - Google's core technology (reprint) 2011-05-26

    Note: This is a guest blog series. Zhu Hua Wu contributor was engaged in the IBM China Research Institute of the research associated with cloud computing, is now working on cloud computing. This series of articles based on publicly available informat

  • CRM and information security 2011-08-05

    CRM and enterprise information security CRM (Customer Relationship Management) is a customer relationship management, help companies serve customers. It can be divided into two categories, namely, Saas (Software-as-a-service) software as a service an

  • Google cloud computing core technology development team 2010-06-13

    Introduces Google's 10 core technology, and can be divided into four categories: Distributed Infrastructure: GFS, Chubby and the Protocol Buffer. Distributed large-scale data processing: MapReduce and Sawzall. Distributed database technology: BigTabl

  • China's information security 2010-11-09

    Engaged in sales of security products for many years. I thought know so many friends. If we can organize. Forces would be strong. Although set up not long. I think he will be accompanied by information security together with China's Internet growth.

  • Detailed core technology and examples of Android-Android game development practice - Happy Sudoku (with full source code) 2010-12-29

    Puzzle games are a popular game, most of the screen is relatively simple, with little of the game very complicated special effects, But usually use artificial intelligence algorithms to control the game more difficult. The optimization algorithm of t