Overview

Introduction

The Administering User Security module explores the concepts of how the database can be secured using the privileges, profiles, and roles.

  • Create and manage Database user accounts
  • Granting and Revoking Privileges
  • Create and manage Roles
  • Create and manage Profiles

Exercise 1 - Create and Manage Database User Accounts

In this exercise you will learn the following about creating and managing tablespaces:

  • Configuring authentication
  • Assigning tablespaces and quotas
  • Assigning accounts and profile settings
  • Removing users from the database
  • Managing default user accounts

Exercise 2 - Granting and Revoking Privileges

In this exercise, you will learn the following about granting and revoking Privileges:

  • Granting Privileges
  • Granting System Privileges

Privileges allow a user to access database objects or execute stored programs that are owned by another user. Privileges also enable a user to perform system level operations, such as connecting to a database, creating a table, or altering the database. A user has complete privileges on the objects it owns. However, the privileges are required only on objects owned by some other user.

There are three types of privileges:

  • Object Privileges
  • System Privileges
  • Role Privileges

Exercise 3 - Creating and Managing Roles

In this exercise, you will learn the following about creating and managing roles:

  • Creating and managing roles
  • Granting role privileges
  • Using default database roles
  • Applying the principle of least privileges

Exercise 4 - Creating and Managing Profiles

In this exercise, you will learn the following about Oracle Memory Structures:

  • Assigning profile and account settings

Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.