Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Oracle Database 12c Security Cookbook
  • Toc
  • feedback
Oracle Database 12c Security Cookbook

Oracle Database 12c Security Cookbook

By : Maja Veselica & Zoran Pavlovic, Pavlovic, Veselica
4.7 (3)
close
Oracle Database 12c Security Cookbook

Oracle Database 12c Security Cookbook

4.7 (3)
By: Maja Veselica & Zoran Pavlovic, Pavlovic, Veselica

Overview of this book

Businesses around the world are paying much greater attention toward database security than they ever have before. Not only does the current regulatory environment require tight security, particularly when dealing with sensitive and personal data, data is also arguably a company’s most valuable asset - why wouldn’t you want to protect it in a secure and reliable database? Oracle Database lets you do exactly that. It’s why it is one of the world’s leading databases – with a rich portfolio of features to protect data from contemporary vulnerabilities, it’s the go-to database for many organizations. Oracle Database 12c Security Cookbook helps DBAs, developers, and architects to better understand database security challenges. Let it guide you through the process of implementing appropriate security mechanisms, helping you to ensure you are taking proactive steps to keep your data safe. Featuring solutions for common security problems in the new Oracle Database 12c, with this book you can be confident about securing your database from a range of different threats and problems.
Table of Contents (13 chapters)
close

How to revoke unused privileges


You can manually revoke unused privileges one by one from users, write your own scripts to complete that task, or use Enterprise Manager Cloud Control 12c. In this recipe, you'll use EM12c to efficiently revoke unused privileges based on reports you generated in the previous recipes.

How to do it...

  1. Select policy, and from Actions drop-down menu, choose Revoke Scripts (see Figure 48):

    Figure 48 - Create revoke scripts

  2. You'll see a message about required privileges (see Figure 49). Click on the OK button.

    Figure 49 - The info message

  3. Select policy (Policy Name) and click on the Generate button (see Figure 50):

    Figure 50 - Generating a script

  4. Generate script to revoke all the unused object privileges from the user Alan. Fill out form as shown in Figure 51 and click on the Next button:

    Figure 51 - Revoking the script configuration

  5. Click on the Select None link and tick revoke checkbox for the user Alan (see Figure 52):

    Figure 52 - Choose to revoke privilege only from the...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete