Home
Search results “Grant execute any type oracle”
How to create an user and to grant all privileges to them in Oracle database
 
03:52
This video shows you how to create a new user and to grant privileges to them. Syntax to create a new user: create user username identified by password
Views: 35459 Thamizh arasaN
ORACLE: GRANT BASIC PERMISSIONS TO USER.
 
07:11
ORACLE USING COMMANDS IN SYSTEM DASHBOARD TO ENABLE A USER LOGIN CREDENTIAL.WITHOUT SESSION THE USER WILL NOT BE ABLE TO DO LOGIN AND ANY OTHER RELATED THINGS LIKE CREATE,DELETE ETC. PRACTICAL BY itechsolution.
Views: 21 itechsolution
SQL tutorial 47: How to Grant Object Privileges With Grant Option in Oracle Database
 
07:13
In this SQL Tutorial you will learn How To Grant Object Privilege using Grant Data Control Language (DCL) statement along with GRANT OPTION flag. Third SQL Tutorial in the series of user privileges in oracle database ------------------------------------------------------------------------ ►►►Timeline◄◄◄ 1:06- Query 1- How To grant Basic Object Privilege (i.e.SELECT Object privilege) to a user 3:31- Query 2 - How to Grant Multiple Object Privilege To a user in 4:26- Query 3 - How To grant Object Privilege on Column Level 5:30- Query 4- How To Grant System Privilege WITH GRANT OPTION flag 6:06- WITH ADMIN OPTION demonstration ------------------------------------------------------------------------ Celebrating 1000 subscribers. Thanks a lot guys for all your love and support. ------------------------------------------------------------------------ ►►►LINKS◄◄◄ List of Object Privilege http://bit.ly/list_of_object_privileges Object Privileges Blog http://bit.ly/object_privileges-in-oracle-database Previous Tutorial System Privilege: http://youtu.be/EQzdtKPiErU Introduction to user privilege: http://youtu.be/iQFb86lM1gs ------------------------------------------------------------------------- Copy Cloud referral link || Use this link to join copy cloud and get 20GB of free storage https://copy.com?r=kb4rc1 -------------------------------------------------------------------------- ►Make sure you SUBSCRIBE and be the first one to see my videos! -------------------------------------------------------------------------- Amazon Wishlist: http://bit.ly/wishlist-amazon ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ►►►Find me on Social Media◄◄◄ Follow What I am up to as it happens on https://twitter.com/rebellionrider https://www.facebook.com/imthebhardwaj http://instagram.com/rebellionrider https://plus.google.com/+Rebellionrider http://in.linkedin.com/in/mannbhardwaj/ http://rebellionrider.tumblr.com/ http://www.pinterest.com/rebellionrider/ You can also Email me at [email protected] Please please LIKE and SHARE my videos it makes me happy. Thanks for liking, commenting, sharing and watching more of our videos This is Manish from RebellionRider.com ♥ I LOVE ALL MY VIEWERS AND SUBSCRIBERS
Views: 23477 Manish Sharma
Simple way to create New user in Oracle 10g/11g. Grant All privileges Easily
 
04:51
In this Video you guyz are gonna learn to create a new user in Oracle and then Grant All the Privileges to that User easily with One statement Only. First Press CTRL+R and type cmd and press ENTER. then type sqlplus sys as sysdba enter any password like tiger etc.. after being connected to database type create user USERNAME identified by PASSWORD; press enter then to grant All privileges type grant all privileges to USERNAME; press enter exit from cmd open SQLPLUS and enter the new username created and password write any simple query to test. If you have any questions you can comment.
Views: 920 Abdul ReHmaN
03 Installing Oracle 11G Express Edition and Schema Creation
 
09:37
In this video we are going to see how to install Oracle 11G Express Edition, Schema creation and use with IBM Sterling Order Management System Link : http://activekite.com Register : http://activekite.com/wp-login.php?action=register Welcome to ActiveKite.com Google Search String : oracle 11g express edition free download Download Link : http://www.oracle.com/technetwork/database/database-technologies/express-edition/downloads/index.html ----------------------------------- Create Schema ----------------------------------- create user sterling94 identified by sterling94; --grant privileges: grant create session, alter session, create any sequence, alter any sequence, create procedure, create synonym to sterling94; grant create table, create trigger, create type, create view, delete any table, execute any procedure, execute any type to sterling94; grant connect, insert any table, select any dictionary, select any sequence, update any table to sterling94; grant select_catalog_role to sterling94; create bigfile tablespace sterts_01 datafile 'sterts_f1.dat' size 100M autoextend on; alter user sterling94 default tablespace sterts_01 quota unlimited on sterts_01;
Views: 302 ActiveKite
MySQL - CREATE USER with GRANT Privileges in Terminal
 
11:22
In this tutorial I explain how to insert a user into the mysql database, with all privileges required to become a "super user". I also show you how you can remove the user from the database with the DROP command.
Views: 58898 Davids Videos
How to solve insufficient privileges in oracle and create a new user
 
03:09
This video is about how to solve the error insufficient privileges in oracle and how to create a new user in oracle......... You can use this method for sql developer. After opening sql developer go to command prompt and follow this instruction .... I hope this will help you for solving the insufficient privileges in oracle 10g...... -------------------------------------------------------------------------------- If face any problem then .. Contact/Follow on........ Email : [email protected] Google+ : https://plus.google.com/102074100342156490577 Twitter : https://twitter.com/Alamgir21409730 Facebook : https://www.facebook.com/computersoftwaresolution/ Subscribe this youtube channel : https://www.youtube.com/channel/UCkE_J-tXiqxzASO6nlB8D6w
Views: 6697 Education Help
Simplified DBA-018-User Privileges
 
13:21
A privilege is a right to execute a particular type of SQL statement or to access another user’s object. The Oracle database enables you to control what the users can and cannot do in the database. Privileges are divided into two categories: System privileges: Each system privilege allows a user to perform a particular database operation or class of database operations. For example, the privilege to create tablespaces is a system privilege. System privileges can be granted by the administrator or by someone who has been given explicit permission to administer the privilege. Object privileges: Object privileges allow a user to perform a particular action on a specific object, such as a table, view, sequence, procedure, function, or package. Without specific permission, users can access only their own objects. Object privileges can be granted by the owner of an object, by the administrator, or by someone who has been explicitly given permission to grant privileges on the object. For example, in our demo ERPUSER will own the tables and other users will require read, write object privileges on ERPUSER tables. Example Connect erpuser/welcome1 Grant insert on myable1 to user1; Grant insert on myable1 to user5 Create tablespace erp_data datafile ‘/u01/app/oradata/db11lin/erpdata01.dbf’ size 100M autoextend on; Create user erpuser identified by welcome1 default tablespace erp_data temporary tablespace temp; Grant connect, resource to erpuser; Create user user1 identified by welcome1 default tablespace erp_data temporary tablespace temp; Create table erpuser.mytable1 ( sno number(5), sname varchar2(20)); We can create a table for any user in this format if we have dba privileges. [owner.tablename] Connect user1/welcome1 Insert into erpuser.mytable1 values(100, ‘by user1’); Commit;
SQL tutorial 45: Introduction to user Privileges in Oracle Database By Manish Sharma RebellionRider
 
04:30
First SQL Tutorial in the series of user privileges in oracle database an introduction to user privileges. In this tutorial you will learn ● What is user privileges ● Different types of user Privileges ● Data Control Language (DCL) Grant and Revoke ● Who Can Grant or Revoke System Privileges? ● Oracle grant flags such as "With Admin option, With Grant option and with hierarchy option " This is a quick video on Introduction of user privileges expaining the theoretical concepts for the better understanding of the concept and up coming videos in USER PRIVILEGE series. Celebrating 1000 subscribers. Thanks a lot guys for all your love and support. ------------------------------------------------------------------------ ►►►LINKS◄◄◄ Blog: http://bit.ly/introduction-to-user-privileges ------------------------------------------------------------------------- Copy Cloud referral link || Use this link to join copy cloud and get 20GB of free storage https://copy.com?r=kb4rc1 -------------------------------------------------------------------------- ►Make sure you SUBSCRIBE and be the first one to see my videos! -------------------------------------------------------------------------- Amazon Wishlist: http://bit.ly/wishlist-amazon ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ►►►Find me on Social Media◄◄◄ Follow What I am up to as it happens on https://twitter.com/rebellionrider https://www.facebook.com/imthebhardwaj http://instagram.com/rebellionrider https://plus.google.com/+Rebellionrider http://in.linkedin.com/in/mannbhardwaj/ http://rebellionrider.tumblr.com/ http://www.pinterest.com/rebellionrider/ You can also Email me at [email protected] Please please LIKE and SHARE my videos it makes me happy. Thanks for liking, commenting, sharing and watching more of our videos This is Manish from RebellionRider.com ♥ I LOVE ALL MY VIEWERS AND SUBSCRIBERS
Views: 27731 Manish Sharma
Oracle 12c PL/SQL Security New Features - Session 5 of 8 - The New Inherit Privileges Privilege
 
06:47
Learn the Oracle Database 12c Inherit Privileges Privilege. Demonstration and Examples. There's a whole new privilege. The inherit privileges privilege. We indeed inherit any privileges privileged. That's just in privileged of course. Any privileges - system privileges, any privileges is an object privilege or new type objects. We can now assign privileges, grant privileges on users. It limits the owner's inheritance of privileges from the invoker. Oracle Corporation is presumably reasonably happy with the way definer's rights code works and definer's rights code as I demonstrated can be highly dangerous. That hasn't really changed in the current release except is will see with the ability to grant roles to code because in invoker's rights we've got huge differences and that's the inheriting of privileges privilege. If you don't have the inheritance enabled, any attempt to execute invoker's rights code will fail because the definer will not be in able to inherit the rights of the invoker. So I'm going to go straight in to do it and then go through the rest of the slides so we can see the sort of issue. Let me lose 11g and go to 12c. What I shall do is create my low privileged user or drop user dev. I don't think he exists. He doesn't. So I'll create my low privileged user. Grant create session, create procedure, select any table to dev identified by dev. It's the same mechanism I use. The same command I use in 11g. I'm creating a developer with a bare minimum that he needs to do his job, which is writing code that lets people query the database. Then log on as him, comm dev/dev and create my procedure. I'll create a version of the code, create or replace procedure list_emp, author ID current user. Invoker's rights code. Remember, this gives my low privilege user dev the ability to insert something horrible in his code which shall then be executed with the invoker's rights. We create the procedure. Now connect / as sysdba - I'll be the highest possible person there is - set server output on and run the code. Execute dev.list_emp looking for the CLARKS. I can't do it. Even as user sys, I can't run that because of the lack of this new privilege. I can correct the situation. I can grant inherit privileges on user sys - which of course one would never normally do - to dev. So I'm now giving my low privilege user the ability to inherit the privileges of user sys when we are running invoker's rights code. And having done that, the code now succeeds. That's the general principle. Without this inherit any privileges code all that doesn't have any privileges privilege, all your invoker's rights code is now blocked. It simply won't run until you grant that privilege to your trusted user. So without inheritance the invoker's rights code will fail. This privilege is in fact granted by default in 12.1 when a user is created. I believe this is purely for backward compatibility. So you don't have to worry about all your codes ceasing to function the moment you have to upgrade but there's no guarantee that this situation will remain as we go through 12.2, 12.3. Also in upgrade I haven't had the time to test comprehensively every possible method of upgrade but certainly this simple test I've done so far, the privilege does appear to be being granted and we can see it. If we look at who's been granted this privilege so far Select grantee, table_name, privilege from dba_tab_privs where privilege like inherit and we see that straight out of the box inherit privileges on a number of users have been granted to public. They have been granted to public. So if I create a brand new user, I grant connect to jw identified by jw, we will see that in the current release - there he is - inherit has beeen granted to public. In the current release by default, your code will continue to function and Oracle often does this with their [05:46 inaudible] with powerful new features. By default, it's configured so there's no change and in the next release it all changes. That's happened to a quite a few releases, quite a few new features, and it wouldn't surprise me if by the time we get to say 12.2 and certainly by the time we get to 13 this behavior changes. So plan for it and look at that privilege and see who it's been granted to and secure your systems. What you need to do is revoke all the inherit privileges grants that's there by default and then grant inherit any privileges very, very sparingly only to a very few trusted users and that should tighten up the danger of definer's inheriting invoker's rights. So a few trusted schemas, create the code in those schemas only and control this very tightly indeed.
Views: 1572 SkillBuilders
Oracle username and password and Account unlocking
 
08:37
all education purpose videos
Views: 273992 Chandra Shekhar Reddy
SQL tutorials 17: SQL Primary Key constraint,  Drop primary Key
 
09:22
Blog link: http://www.rebellionrider.com/sql-primary-key.htm SQL tutorial on Primary key / SQL Primary key, In this tutorial you will learn about simple primary key, composute primary key, how to drop primary key. defining primary key using create table and alter table along with many other things. Tool used in this tutorial is SQL Developer. This tutorial series is part of SQL expert exam certification training. if you are preparing for SQL certification you can use my tutorials. This SQL Tutorial is a part of free training. Copy Cloud referral link || Use this link to join copy cloud and get 20GB of free storage https://copy.com?r=j7eYO7 Contacts E-Mail [email protected] Twitter https://twitter.com/rebellionrider Instagram http://instagram.com/rebellionrider Facebook. https://www.facebook.com/imthebhardwaj Linkedin. http://in.linkedin.com/in/mannbhardwaj/ Thanks for linking, commenting, sharing and watching more of our videos This is Manish from RebellionRider.com So Primary Key There are two types of Primary keys First is Simple primary Key: Primary key which Involves only one column and Second is Composite Primary Key: Primary Key which involves more than one column. We will start with Simple primary key. You can create Primary key either with Create Table statement of by using Alter table Statement. Let's define simple primary key using create table statements. With create table statement we can either define primary key at column level or at table level. We will start with defining Primary key at column level using create table statement. You just have to put keyword Primary key after data type and size of column while defining a column of a table. Here oracle server will create a primary key on product id with default constraint name which will be slightly difficult to understand. You can give your own name to your constraint which is also a good practice.
Views: 99450 Manish Sharma
ServiceNow - How to grant Update Set Access to non-Admins in London
 
08:52
Items demonstrated/discussed in this video: * How to give a user (scrum master, etc) access to the update set picker and update set table. * Navigated to Roles in User Administration and created a new role called update_set. * Navigated to the ACL table and added the role to the sys_update_set ACL with a read operation. * Navigated to sys_properties and added the glide.ui.update_set_picker.role as a String Type and a value of update_set (the role created earlier). * Displayed the user's profile before and after the changes were made and showed how to tell the implementation was a success. * Bonus material: Third Republic is looking for an Orchestration SME in the United Kingdom.
Views: 299 AAspenNow Solutions
Create new connection with new user in Oracle SQL Developer
 
10:28
This video shows you how to create a new connection using a new user account (other than the system user account) in Oracle SQL Developer, so that you have a clean workspace without all the clutter of system tables. It is NOT a general introduction to using Oracle SQL Developer.
Views: 342974 Chitu Okoli
PL/SQL tutorial 62: PL/SQL Collection Method LIMIT in Oracle Database
 
07:38
In this PL/SQL tutorial we will explore the concepts of collection method LIMIT and learn: - What is collection method Limit - How to use this collection method - What are the differences between collection method LIMIT & Collection Method COUNT - What happens when function LIMIT is used with Nested table and Associative array Go ahead and enjoy. Also do not forget to LIKE, SHARE & Subscribe. ------------------------------------------------------------------------ ►►►LINKS◄◄◄ Blog: http://bit.ly/limit-function Previous Tutorial ► Associative Array: https://youtu.be/wGXeD_oWxUk ------------------------------------------------------------------------- ►Make sure you SUBSCRIBE and be the 1st one to see my videos! ------------------------------------------------------------------------- ►►►Find me on Social Media◄◄◄ Follow What I am up to as it happens on https://twitter.com/rebellionrider http://instagram.com/rebellionrider https://plus.google.com/+Rebellionrider http://in.linkedin.com/in/mannbhardwaj/ ___Facebook Official Page of Manish Sharma___ https://www.facebook.com/TheRebellionRider/ ___Facebook Official Page of RebellionRider.com___ https://www.facebook.com/RebellionRider.official/ You can also Email me at for E-mail address please check the About section Please please LIKE and SHARE my videos it makes me happy. Thanks for liking, commenting, sharing and watching more of our videos This is Manish from RebellionRider.com ♥ I LOVE ALL MY VIEWERS AND SUBSCRIBERS
Views: 5578 Manish Sharma
How to implement VPD in Oracle Database (Part 1)
 
12:37
How to implement VPD (Virtual Private Database) in Oracle Database(9i,10g,11g,12c) Enterprise Edition. PART 1 Video links: Part 1 https://youtu.be/JVvtvh3cN1I Part 2 https://youtu.be/xLcin_Wgbvs Part 3 https://youtu.be/mE1cSbmEwnQ This is Part of Oracle Advance Security. Please view my earlier videos on how to create a database , if you are not having a database. 1)First we will create the users needed for our environment a)Owner of the schema which will have the objects or tables b)security admin user c)non owner user1 & user2 which will have limited access as per data in the rows (here user1 will have access to data with HR and user2 with FINANCE) Object owner creation: -------------- CREATE USER schemaowner IDENTIFIED BY schemaowner DEFAULT TABLESPACE users TEMPORARY TABLESPACE temp; GRANT connect, resource TO schemaowner; alter user schemaowner quota unlimited on users; security admin user creation: -------------- CREATE USER SEC_ADM IDENTIFIED BY sec_adm default tablespace users temporary tablespace TEMP; GRANT CONNECT, RESOURCE TO sec_adm; alter user sec_adm quota unlimited on users; garnts for the sec_adm user: ------------- GRANT CREATE SESSION,CREATE ANY CONTEXT,CREATE PROCEDURE,CREATE TRIGGER, ADMINISTER DATABASE TRIGGER TO SEC_ADM; GRANT EXECUTE ON DBMS_SESSION TO SEC_ADM; GRANT EXECUTE ON DBMS_RLS TO SEC_ADM; create user with restricted access on table: ----------------------- CREATE USER user1 IDENTIFIED BY user1 DEFAULT TABLESPACE users TEMPORARY TABLESPACE temp; GRANT connect, resource TO user1; CREATE USER user2 IDENTIFIED BY user2 DEFAULT TABLESPACE users TEMPORARY TABLESPACE temp; GRANT connect, resource TO user2; Now we will log in as schemaowner and create one tables : ------------------- CONN schemaowner/schemaowner This table is the table which contains the secure as well as un-restricted data CREATE TABLE user_data (column1 VARCHAR2(50) NOT NULL, user_id VARCHAR2(30) NOT NULL); Now to access this table from other schema we need to give the select and insert privs to: GRANT SELECT, INSERT ON user_data TO sec_adm,user1, user2;
Views: 839 OracleDBA
Oracle Database11g tutorials 14 : How to CREATE TABLE using sql developer and command prompt
 
08:36
Oracle Database11g tutorials 14 How to Create table using command prompt and Create table using sql developer Blog Link http://bit.ly/1TkY4Oe Time Line 0:25 Introduction of Tables in Database 1:03 What is Create Table (Introduction of create table) 1:30 Syntax of Create Table 2:08 How to create table using Command Prompt 4:55 How to create table using SQL Developer Links for Oracle Database tutorials 4: database connectivity using SQL developer and command prompt http://youtu.be/wSqoXRlXDUU You can have indepth knowledge about SQL create table here http://www.rebellionrider.com/sql-create-table.html Tool used in this tutorial is command prompt. This tutorial series is part of SQL expert exam certification training. if you are preparing for SQL certification you can use my tutorials. This SQL Tutorial is a part of free training. Copy Cloud referral link || Use this link to join copy cloud and get 20GB of free storage https://copy.com?r=j7eYO7 Contacts E-Mail [email protected] Twitter https://twitter.com/rebellionrider Instagram http://instagram.com/rebellionrider Facebook. https://www.facebook.com/imthebhardwaj Linkedin. http://in.linkedin.com/in/mannbhardwaj/ Thanks for linking, commenting, sharing and watching more of our videos This is Manish from RebellionRider.com Today in this oracle database tutorial we will see How to CREATE A TABLE. if we have to define a table in layman language then we can say that Tables are just a collection of Rows and Columns but In RDBMS tables are database objects which help in organizing data into ROWS and COLUMNS. We can also say that SQL tables are kind of data structure which are used by database for efficient storage of data. To create a table in our database we use SQL CREATE TABLE command. SQL CREATE TABLE is a type of DATA DEFINITION LANGUAGE also known as DDL. To Create a table in your schema you will require CREATE TABLE system privilege. In our future videos we will see what are system and object privileges and how to grant them to a user. Today for this video we will be using Sample schema HR which already has all the necessary privileges. Ohk Let's see the syntax. CREATE TABLE table name ( column name1 Data-Type(size), column name2 Data-Type(size), ..... ); CREATE TABLE is an oracle reserved word or say an Oracle key word whereas There are 3 different ways of creating a table in Oracle database. Creating a table using Command Line Interface (CLI) in Oracle database For demonstrating how to create table in oracle database using CLI, I'll be using Command prompt. Thats how we create table using command prompt. you can check your table structure by DESCRIBE command for that just write DESC and your table name. Like this Another way of creating a table is by using Graphic user interface (GUI) in Oracle database To demonstrate how to create table using GUI we will use SQL developer. Lets open our SQL developer I am connected to HR schema if you do not know how to create a connection to database using SQL developer please watch my oracle database tutorial 4 that explains database connectivity using SQL developer and command prompt. Link for this video is in the description below. So lets create a table. Creating a table using SQL developer is very easy we do not have to fire any query here. Let's start First of all right click on your connection in which you want to create a table and choose schema browser. This will open a separate schema browser pane or you can expend your connection by clicking this + sign and then right click on table and choose New Table. However I prefer working with schema browser so let's skip to schema browser pane here from the first drop-down list you can choose connection name and in the second drop down list you can choose what database objects you want to work with we want to create a table thus I'll choose table and then click this arrow here and choose option for new table Ok we have created a table wizard first of all give a unique name to your table and add some column as well. For this, click the green plus button. Now we already have a column so give it some name. Also choose a datatype from the list and specify any size you can check this not null column if in case you want to make this a mandatory column you can also specify default value and constraint If you want to make this column a primary key you can click here In my future video i'll show you what are these constraints and different ways of applying them on a column in a table. for this video we will concentrate on create table only so when you are done with all your columns click ok Thats your table You can double click on your table here and can see its structure. Thats it
Views: 175815 Manish Sharma
Oracle DBA Justin - How to execute sql and Sqlplus commands from an external script
 
09:33
How to execute sql and Sqlplus commands from an external script
Views: 84239 jbleistein11
PL/SQL tutorial 18: DDL Trigger with Schema Auditing Example
 
08:12
Learn how to create a DDL Trigger in Oracle Database with Schema Auditing Example where we will learn how to keep an any on which object is created, altered or drop and by who. Manish Sharma From RebellionRider ------------------------------------------------------------------------ ►►►LINKS◄◄◄ Blog : http://bit.ly/DDL-Trigger Previous Tutorial ►PL/SQL Tut 14 Triggers Introduction https://youtu.be/R3fvX_xf5P4 ► PL/SQL Tut 17 Table Backup Using DML Trigger https://youtu.be/jSv1LIlNKU0 ------------------------------------------------------------------------- ►►►Let's Get Free Uber Cab◄◄◄ Use Referral Code UberRebellionRider and get $20 free for your first ride. ------------------------------------------------------------------------- ►Make sure you SUBSCRIBE and be the 1st one to see my videos! ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ►►►Find me on Social Media◄◄◄ Follow What I am up to as it happens on https://twitter.com/rebellionrider https://www.facebook.com/imthebhardwaj http://instagram.com/rebellionrider https://plus.google.com/+Rebellionrider http://in.linkedin.com/in/mannbhardwaj/ http://rebellionrider.tumblr.com/ http://www.pinterest.com/rebellionrider/ You can also Email me at for E-mail address please check About section Please please LIKE and SHARE my videos it makes me happy. Thanks for liking, commenting, sharing and watching more of our videos This is Manish from RebellionRider.com ♥ I LOVE ALL MY VIEWERS AND SUBSCRIBERS
Views: 44691 Manish Sharma
How to installation  Oracle Designer 10 g  and Introduction
 
16:49
دي الصلاحيات المطلوبه لليوزر GRANT EXECUTE ON DBMS_LOCK TO &U; GRANT EXECUTE ON DBMS_PIPE TO &U; GRANT EXECUTE ON DBMS_RLS TO &U; GRANT SELECT ON dba_rollback_segs TO &U; GRANT SELECT ON dba_segments TO &U; GRANT SELECT ON sys.v_$nls_parameters TO &U WITH GRANT OPTION; GRANT SELECT on V_$PARAMETER TO &U; GRANT ALTER SESSION TO &U; GRANT CREATE ANY SYNONYM TO &U; GRANT CREATE SESSION TO &U; GRANT CREATE DATABASE LINK TO &U; GRANT CREATE PROCEDURE TO &U; GRANT CREATE ROLE TO &U; GRANT CREATE SEQUENCE TO &U; GRANT CREATE SESSION TO &U; GRANT CREATE TABLE TO &U; GRANT CREATE TRIGGER TO &U; GRANT CREATE TYPE TO &U; GRANT CREATE VIEW TO &U; GRANT DROP ANY SYNONYM TO &U; GRANT SELECT ANY SEQUENCE TO &U; GRANT CREATE PUBLIC SYNONYM TO &U; grant execute on dbms_lock to &U; grant execute on dbms_pipe to a&U; grant execute on dbms_rls to &U; grant select on dba_rollback_segs to &U; grant select on dba_segments to &u; grant select on v_$nls_parameters to &u; grant select on v_$parameter to &u;
Views: 3710 Ahmed Tartour
Oracle 12c Grant Role to PL/SQL Procedures - Lesson 1 of 2
 
03:35
A great new security feature that can - among other things - prevent SQL injection and a multitude of other security vulnerabilities. In 12c you can make your PL/SQL code secure using a declarative technique. Simply grant a role to the PL/SQL code and add AUTHID CURRENT_USER so that Oracle runs the code with the privileges of the invoker - not the developer (invoker rights procedures). Presto! Without code reviews and / or debugging you will have hardened your PL/SQL web application! In this free tutorial from SkillBuilders Director of Oracle Database Services, Oracle Certified Master John Watson will demonstrate the development of a simple PL/SQL web application, demonstrate SQL injection and how to prevent it with this new feature.
Views: 688 SkillBuilders
How to Grant Roles and Privileges in  Sql Anywhere | Sybase Central
 
01:27
In this video you will learn how to assign or grant roles and privileges in sql anywhere database. The users can be given various roles and privileges to perform different tasks A role-based access control model is provided for the execution of privileged operations. A role-based security model provides complete control and granularity for the privileges you want to grant to users. Each privileged operation a user can perform in the database requires one or more system or object-level privileges. A system privilege is a right to perform an authorized database task. For example, the CREATE TABLE system privilege allows a user to create self-owned tables. An object-level privilege is a right to perform an authorized task on a specified object. For example, having ALTER privileges on TableA allows a user to alter that table, but not other tables. A role is a collection of one or more system privileges, object-level privileges, or roles. You can grant roles to other roles to create a role hierarchy. Granting a role to a user is equivalent to granting the user the underlying system privileges for the role. Each new or migrated database includes a predefined set of roles you can use to get started. These system roles act as a starting point for implementing role-based security. There are three types of roles in the role-based security model: system roles, user-defined roles (which include user-extended roles), and compatibility roles. View the roles and privileges a user has in SQL Central by clicking the user and viewing the details that are displayed. You can also retrieve the details using the sp_displayroles system procedure. A privilege is a right to perform a privileged operation on the system. For example, altering a table is a privileged operation, depending on the type of alteration you are making. There are two types of privileges: system privileges and object-level privileges. System privileges give you the general right to perform a privileged operation, while object-level privileges restrict you to performing the operation on a specific object. For example, if you have the ALTER ANY TABLE system privilege, you can alter any table in the system. If you do not, you can only edit tables you create or tables on which you have the ALTER TABLE object-level privilege. System privileges are built in to the database and can be granted or revoked, but not created or dropped. With the exception of the MANAGE ROLES and UPGRADE ROLE privileges, system privileges cannot have system privileges granted to, or revoked from, them. Each system privilege, with the exception of the SET USER system privilege, is granted by default to either the SYS_AUTH_SA_ROLE or SYS_AUTH_SSO_ROLE compatibility role, but not both. The SET USER system privilege is granted to both roles (WITH ADMIN OPTION to SYS_AUTH_SSO_ROLE and WITH NO ADMIN OPTION to SYS_AUTH_SA_ROLE). You grant and revoke system and object-level privileges by using the GRANT and REVOKE statements.
Views: 38 Tech World
How to Grant Roles and Privileges in  Sql Anywhere | Sybase Central
 
01:12
In this video you will learn how to assign or grant roles and privileges in sql anywhere database. The users can be given various roles and privileges to perform different tasks A role-based access control model is provided for the execution of privileged operations. A role-based security model provides complete control and granularity for the privileges you want to grant to users. Each privileged operation a user can perform in the database requires one or more system or object-level privileges. A system privilege is a right to perform an authorized database task. For example, the CREATE TABLE system privilege allows a user to create self-owned tables. An object-level privilege is a right to perform an authorized task on a specified object. For example, having ALTER privileges on TableA allows a user to alter that table, but not other tables. A role is a collection of one or more system privileges, object-level privileges, or roles. You can grant roles to other roles to create a role hierarchy. Granting a role to a user is equivalent to granting the user the underlying system privileges for the role. Each new or migrated database includes a predefined set of roles you can use to get started. These system roles act as a starting point for implementing role-based security. There are three types of roles in the role-based security model: system roles, user-defined roles (which include user-extended roles), and compatibility roles. View the roles and privileges a user has in SQL Central by clicking the user and viewing the details that are displayed. You can also retrieve the details using the sp_displayroles system procedure. A privilege is a right to perform a privileged operation on the system. For example, altering a table is a privileged operation, depending on the type of alteration you are making. There are two types of privileges: system privileges and object-level privileges. System privileges give you the general right to perform a privileged operation, while object-level privileges restrict you to performing the operation on a specific object. For example, if you have the ALTER ANY TABLE system privilege, you can alter any table in the system. If you do not, you can only edit tables you create or tables on which you have the ALTER TABLE object-level privilege. System privileges are built in to the database and can be granted or revoked, but not created or dropped. With the exception of the MANAGE ROLES and UPGRADE ROLE privileges, system privileges cannot have system privileges granted to, or revoked from, them. Each system privilege, with the exception of the SET USER system privilege, is granted by default to either the SYS_AUTH_SA_ROLE or SYS_AUTH_SSO_ROLE compatibility role, but not both. The SET USER system privilege is granted to both roles (WITH ADMIN OPTION to SYS_AUTH_SSO_ROLE and WITH NO ADMIN OPTION to SYS_AUTH_SA_ROLE). You grant and revoke system and object-level privileges by using the GRANT and REVOKE statements.
Views: 150 Tech World
Oracle 12c PL/SQL Security Features - Lesson 4 of 8 - Roles and PLSQL
 
06:21
Learn how Roles really work with Oracle PL/SQL and why a privilege granted via a role can't be used in PL/SQL. Demonstrations, examples. See all lessons and many more free Oracle Database tutorials at https://www.skillbuilders.com/free-oracle-database-tutorials John Watson: We have the business of roles - roles and PL/SQL. The point here is that roles are invisible to PL/SQL. When you compile your code, only direct privileges are available. When you run your code, only direct privileges are available. This is for definer's rights, I should say. When you run the code, only direct privileges are available to grant to the definer. In effect, the definer's rights code, all roles are disabled within the stored procedure. And certainly roles are disabled when compiling the code. Functionally, it's equivalent to having issued the command SET ROLE NONE. Why is this? Why is it you can't use your privileges? It's perfectly straightforward. It's a technology limitation. Quickly to see what's going on. If I go in and say - let me connect or create a clear schema. I'll create myself, grant dba to jw identified by jw. I've created a user and given him ridiculously high privileges. Connect.... What can you do? You can do pretty much anything. If he wants to delete from scott.emp, he can do it. Let's roll back, because along with his dba role, he has the ability to pretty much anything to use the data. Now we'll create a procedure. If I create a procedure, create delemp as begin, and in there I delete from scott.emp, end, compilation errors. What are they? Show error. At line 2 table of view doesn't exist. That's line 2 delete from scott.emp. I remember way back in version 7, this cause so much confusion before we realized what was going on. It's quite simple that when we are within the code, as the definer or the invoker, because this is definer's rights code, when we are within the definer's rights code block or indeed when we are compiling a definer's rights code block, the roles are disabled and that's why we cannot see it. But why is this and why do I say it's a technology limitation? It's because roles can be enabled and disabled. They can be enabled or disabled. That makes it logically impossible to consider a role when executing a stored procedure because I might have the role enabled while I compile it, but how do I know that it's going to be enabled when I run it? If I grant execute on the code to a third party, he doesn't have the role at all and that he must not even be logged on. So it becomes a logical impossibility because of the way roles are used because roles are enabled or disabled. You can dynamically switch them on and off. It's a logical impossibility to use role within definer's rights program module. Invoker's rights code, however, is very different. That infuses some interesting issues. Invoker's rights code can use any roles that happen to be enabled for the user at the time that he invokes it in exactly the same way that an anonymous PL/SQL can use any enabled roles. In the security point of view, the definer can in effect grab any roles within his code that the invoker happens to have. Dave: [Question], John, pardon. How do you enable or disable a role? John: Right now there's several techniques. I won't spend too much time demonstrating. The easiest technique will be alter - I can set role none. And that will have disabled all my roles. Now if you look at this, I've got nothing. If I try to run my code and query - let's see. Yes. If I try to delete from scott.emp I can't see it. So I'll set role dba and now of course I can. That's the easiest way. In fact, there are much more [05:07 inaudible] ways to switch roles on and off. We can do it with operating system authentication and I can do it with proxy authentication. We have a persistent session through application server as well as a user when we pass that session out to many of the users that can switch roles on and off. That's the persistent session switch identities. Perhaps, best of all, I can create what I call secure application roles well it protect the role with a package and that can contest any number of issues - environment variables, maybe the time, maybe your IP address, perhaps the program you're using and switch roles on and off accordingly. So there are many ways for controlling roles and you should do it. Blindly granting roles and letting them be enabled all the time is not good security. The end result for this, however, you can get some pretty unexpected results within your code. I've tried to run through in our first half hour some of the issues that we see with PL/SQL in release 11g and earlier. After a short break, we'll move on to the 12c features.
Views: 281 SkillBuilders
Oracle SQL Developer - Comparing SQL Execution Plans
 
10:36
This is a short video about a feature in SQL Developer which alllow any DBA or developer to compare different execution plans of a SQL Statement. My Blog: https://navneetupnejadba.wordpress.com/ Slideshare: https://www.slideshare.net/navneetupneja1/sql-developer-powerful-free-tool-for-developers-and-dbas
Views: 230 Navneet Upneja
Oracle Database 12c: Creating a User using Oracle Enterprise Manager Database Express
 
07:02
Demo of how to create a user with EM Express.
Views: 36920 OracleDBVision
Oracle Database Tutorial 52 : Data Pump expdp - How to Export full database using expdp
 
07:26
Oracle Database tutorial/SQL Tutorial 52 On Data Pump expdp utility here in this tutorial you'll learn how to export full/complete Database using expdp data pump utility of oracle Database ------------------------------------------------------------------------ ►►►LINKS◄◄◄ Blog: http://bit.ly/database-full-export-using-expdp Tut 48 Roles: http://youtu.be/tyYxSrCXzCM ------------------------------------------------------------------------- Copy Cloud referral link || Use this link to join copy cloud and get 20GB of free storage https://copy.com?r=kb4rc1 -------------------------------------------------------------------------- ►Make sure you SUBSCRIBE and be the 1st one to see my videos! -------------------------------------------------------------------------- Amazon Wishlist: http://bit.ly/wishlist-amazon ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ►►►Find me on Social Media◄◄◄ Follow What I am up to as it happens on https://twitter.com/rebellionrider https://www.facebook.com/imthebhardwaj http://instagram.com/rebellionrider https://plus.google.com/+Rebellionrider http://in.linkedin.com/in/mannbhardwaj/ http://rebellionrider.tumblr.com/ http://www.pinterest.com/rebellionrider/ You can also Email me at [email protected] Please please LIKE and SHARE my videos it makes me happy. Thanks for liking, commenting, sharing and watching more of our videos This is Manish from RebellionRider.com ♥ I LOVE ALL MY VIEWERS AND SUBSCRIBERS
Views: 75334 Manish Sharma
SQL tutorial 37: How to create NEW USER account using Create User statement in Oracle database
 
07:39
How to create new user accounts using Create User statement in oracle database. In This tutorial you will learn how to create a new user account. Brief explanation of Create user statement syntax and an example of creating a new user and You will learn How to grant Create session system privilege to your ----_Links_--- Blog :http://bit.ly/create_user_account Video Tut 4: http://youtu.be/wSqoXRlXDUU How to create database: http://youtu.be/enFFezPYhCg Copy Cloud referral link || Use this link to join copy cloud and get 20GB of free storage https://copy.com?r=kb4rc1 Amazon Wishlist: http://bit.ly/wishlist-amazon Contacts E-Mail [email protected] Twitter https://twitter.com/rebellionrider Instagram http://instagram.com/rebellionrider Facebook. https://www.facebook.com/imthebhardwaj Linkedin. http://in.linkedin.com/in/mannbhardwaj/ Thanks for liking, commenting, sharing and watching more of our videos This is Manish from RebellionRider.com
Views: 40590 Manish Sharma
SQL: Change User Password
 
02:38
In this tutorial, you'll learn how to change user password in sql plus PL/SQL (Procedural Language/Structured Query Language) is Oracle Corporation's procedural extension for SQL and the Oracle relational database. PL/SQL is available in Oracle Database (since version 7), TimesTen in-memory database (since version 11.2.1), and IBM DB2 (since version 9.7).[1] Oracle Corporation usually extends PL/SQL functionality with each successive release of the Oracle Database. PL/SQL includes procedural language elements such as conditions and loops. It allows declaration of constants and variables, procedures and functions, types and variables of those types, and triggers. It can handle exceptions (runtime errors). Arrays are supported involving the use of PL/SQL collections. Implementations from version 8 of Oracle Database onwards have included features associated with object-orientation. One can create PL/SQL units such as procedures, functions, packages, types, and triggers, which are stored in the database for reuse by applications that use any of the Oracle Database programmatic interfaces. PL/SQL works analogously to the embedded procedural languages associated with other relational databases. For example, Sybase ASE and Microsoft SQL Server have Transact-SQL, PostgreSQL has PL/pgSQL (which emulates PL/SQL to an extent), and IBM DB2 includes SQL Procedural Language,[2] which conforms to the ISO SQL’s SQL/PSM standard. The designers of PL/SQL modeled its syntax on that of Ada. Both Ada and PL/SQL have Pascal as a common ancestor, and so PL/SQL also resembles Pascal in several aspects. However, the structure of a PL/SQL package does not resemble the basic Object Pascal program structure as implemented by a Borland Delphi or Free Pascal unit. Programmers can define public and private global data-types, constants and static variables in a PL/SQL package.[3] PL/SQL also allows for the definition of classes and instantiating these as objects in PL/SQL code. This resembles usage in object-oriented programming languages like Object Pascal, C++ and Java. PL/SQL refers to a class as an "Abstract Data Type" (ADT) or "User Defined Type" (UDT), and defines it as an Oracle SQL data-type as opposed to a PL/SQL user-defined type, allowing its use in both the Oracle SQL Engine and the Oracle PL/SQL engine. The constructor and methods of an Abstract Data Type are written in PL/SQL. The resulting Abstract Data Type can operate as an object class in PL/SQL. Such objects can also persist as column values in Oracle database tables. PL/SQL is fundamentally distinct from Transact-SQL, despite superficial similarities. Porting code from one to the other usually involves non-trivial work, not only due to the differences in the feature sets of the two languages,[4] but also due to the very significant differences in the way Oracle and SQL Server deal with concurrency and locking. There are software tools available that claim to facilitate porting including Oracle Translation Scratch Editor,[5] CEITON MSSQL/Oracle Compiler [6] and SwisSQL.[7] The StepSqlite product is a PL/SQL compiler for the popular small database SQLite. PL/SQL Program Unit A PL/SQL program unit is one of the following: PL/SQL anonymous block, procedure, function, package specification, package body, trigger, type specification, type body, library. Program units are the PL/SQL source code that is compiled, developed and ultimately executed on the database. The basic unit of a PL/SQL source program is the block, which groups together related declarations and statements. A PL/SQL block is defined by the keywords DECLARE, BEGIN, EXCEPTION, and END. These keywords divide the block into a declarative part, an executable part, and an exception-handling part. The declaration section is optional and may be used to define and initialize constants and variables. If a variable is not initialized then it defaults to NULL value. The optional exception-handling part is used to handle run time errors. Only the executable part is required. A block can have a label. Package Packages are groups of conceptually linked functions, procedures, variables, PL/SQL table and record TYPE statements, constants, cursors etc. The use of packages promotes re-use of code. Packages are composed of the package specification and an optional package body. The specification is the interface to the application; it declares the types, variables, constants, exceptions, cursors, and subprograms available. The body fully defines cursors and subprograms, and so implements the specification. Two advantages of packages are: Modular approach, encapsulation/hiding of business logic, security, performance improvement, re-usability. They support object-oriented programming features like function overloading and encapsulation. Using package variables one can declare session level (scoped) variables, since variables declared in the package specification have a session scope.
Views: 8207 radhikaravikumar
How to setup basic SSRS security - SQL Server Reporting Services Security
 
04:51
The video shows the basics for setting up SSRS security. http://www.ReportingGuru.com Email us at [email protected] if you need reporting help, custom reports, or reporting architecture setup. Our phone number is 1-(800) 921-4759. YouTube Channel for Tips, Overviews, Tutorials: https://www.youtube.com/user/ReportingGurus Reporting Guru is a US based development company with all resources located in the US. We have many senior level developers with decades of development experience. Please let us know if you would like to discuss your requirements or issues free of charge. Our process is taking your requirements and suggesting the best architecture or approach without trying to sell you any specific software. We work as needed and only charge for the hours we work. We do not charge a retainer and there is no minimum charge. We offer the following services: Custom Report Writing | Consulting | Database Development & Integration. Some of our specialties are: -- SQL Server Reporting Services SSRS / SQL Server / SQL Server Integration -- Crystal Reports / Business Objects -- BIRT, Jasper, Pentaho, BIRT iHub -- Dashboards and Cloud Reporting Solutions -- Tableau -- Cognos -- Services SSIS / SQL Server Analysis Services SSAS -- Complex Database Queries -- Oracle, MySQL -- Access, Excel, and Pivot Tables -- Various ERPs such SAGE, Peachtree, Epicor, BOLO, SAP, Maximo, Fishbowl, Infor10, JD Edwards, PeopleSoft, QuickBooks, SalesForce, Timberline, UFIDA, Microsoft Dynamics, Yardi, Concur, PMWeb CUSTOM REPORT WRITING Our experienced data report writers take your report & business requirements to build the custom reports you need. We deliver reports on demand or on a timed schedule. CONSULTING When your data and reporting team needs guidance or whether you need to build new reports, convert reports, enhance existing reports or need advice on finding the right reporting solution for your business ReportingGuru is here to help. DATABASE DEVELOPMENT & INTEGRATION We create and develop the necessary structure to house business data in a clear and easily accessible manner, so you have the tools to pull the reports you need easily.
Views: 17637 Reporting Guru
Oracle SQL Developer Tutorial For Beginners  20   Schema vs User
 
00:46
Oracle SQL Developer Tutorial For Beginners Series. This course introduces Oracle SQL Development for its subscribers. Currently this is based on Oracle 12c. The test environment is in Windows 10.
Views: 2179 Sam Dhanasekaran
Oracle Apex 5.1(6)-Introduction to SQL Command Tool  in Oracle APEX (in hindi By JavaInHand)
 
06:52
SQL Command Tool comes with APEX under SQL Workshop. It helps us to make changes on the database directly using a graphical user interface. This helps us writing any SQL/ PLSQL queries and execute it on the database and we can create any database objects which can later be used in our application.
Views: 1171 JavaInHand
Grant/Deny Access to a Database for a user in SQL server
 
02:08
For more Details visit http://techchoco.com/grant-or-deny-access-database-for-a-user-sql-server/ Grant/Deny access to a Database for a particular user in SQL server 2008 R2, we can do this by using User Mapping option in SQL.
Views: 69154 Tech Choco
Learn Store Procedure in SQL in Hindi tutorial for beginners
 
08:45
Stored Procedure: Stored Procedure in SQL Server can be defined as the set of logical group of SQL statements which are grouped to perform a specific task. There are many benefits of using a stored procedure. The main benefit of using a stored procedure is that it increases the performance of the database.The other benefits of using the Stored Procedure are given below. Benefits of Using the Stored Procedure One of the main benefits of using the Stored procedure is that it reduces the amount of information sent to the database server. It can become a more important benefit when the bandwidth of the network is less. Since if we send the SQL query (statement) which is executing in a loop to the server through network and the network gets disconnected, then the execution of the SQL statement doesn't return the expected results, if the SQL query is not used between Transaction statement and rollback statement is not used. Compilation step is required only once when the stored procedure is created. Then after it does not require recompilation before executing unless it is modified and reutilizes the same execution plan whereas the SQL statements need to be compiled every time whenever it is sent for execution even if we send the same SQL statement every time. It helps in re usability of the SQL code because it can be used by multiple users and by multiple clients since we need to just call the stored procedure instead of writing the same SQL statement every time. It helps in reducing the development time. Stored procedure is helpful in enhancing the security since we can grant permission to the user for executing the Stored procedure instead of giving permission on the tables used in the Stored procedure. Sometimes, it is useful to use the database for storing the business logic in the form of stored procedure since it makes it secure and if any change is needed in the business logic, then we may only need to make changes in the stored procedure and not in the files contained on the web server.
Views: 28738 Learn Everything
Excel - Left Join Tables from Multiple Sheets Like in SQL - Power Query Tutorial
 
11:25
Learn how to SQL left join multiple tables from multiple sheets in Microsoft Excel using Power Query. This tutorial outlines differences between using VLOOKUP and SQL like join, shows how to choose join types, like left, right, inner and full, as well as how to concatenate columns in Power Query. Download Power Query for Excel 2010 & 2013. https://www.microsoft.com/en-us/download/details.aspx?id=39379 #excel #sql
Query Tuning 101 How to Run Autotrace in SQL Developer
 
02:21
This video shows how to run autotrace reports using Oracle SQL Developer to analyze query performance. It also discusses the privileges you need to enable database users to run autotrace. ============================ The Magic of SQL with Chris Saxon Copyright © 2015 Oracle and/or its affiliates. Oracle is a registered trademark of Oracle and/or its affiliates. All rights reserved. Other names may be registered trademarks of their respective owners. Oracle disclaims any warranties or representations as to the accuracy or completeness of this recording, demonstration, and/or written materials (the “Materials”). The Materials are provided “as is” without any warranty of any kind, either express or implied, including without limitation warranties or merchantability, fitness for a particular purpose, and non-infringement.
Views: 18554 The Magic of SQL
How to implement VPD in Oracle Database (Part 3)
 
12:04
How to implement VPD (Virtual Private Database) in Oracle Database(9i,10g,11g,12c) Enterprise Edition. PART 3 Video. Links: Part 1 https://youtu.be/JVvtvh3cN1I Part 2 https://youtu.be/xLcin_Wgbvs Part 3 https://youtu.be/mE1cSbmEwnQ Create Security Policies In order for the context package to have any effect on the users interaction with the database, we need to define a security_package for use with the security policy. This package will tell the database how to treat any interactions with the specified table. CREATE OR REPLACE PACKAGE security_package AS FUNCTION user_data_insert_security(owner VARCHAR2, objname VARCHAR2) RETURN VARCHAR2; FUNCTION user_data_select_security(owner VARCHAR2, objname VARCHAR2) RETURN VARCHAR2; END security_package; / Next we create the security_package body. CREATE OR REPLACE PACKAGE BODY Security_Package IS FUNCTION user_data_select_security(owner VARCHAR2, objname VARCHAR2) RETURN VARCHAR2 IS predicate VARCHAR2(2000); BEGIN predicate := '1=2'; IF (SYS_CONTEXT('USERENV','SESSION_USER') = 'SCHEMAOWNER') THEN predicate := NULL; ELSE predicate := 'USER_ID = SYS_CONTEXT(''SCHEMAOWNER'',''USER_ID'')'; END IF; RETURN predicate; END user_data_select_security; FUNCTION user_data_insert_security(owner VARCHAR2, objname VARCHAR2) RETURN VARCHAR2 IS predicate VARCHAR2(2000); BEGIN predicate := '1=2'; IF (SYS_CONTEXT('USERENV','SESSION_USER') = 'SCHEMAOWNER') THEN predicate := NULL; ELSE predicate := 'USER_ID = SYS_CONTEXT(''SCHEMAOWNER'',''USER_ID'')'; END IF; RETURN Predicate; END user_data_insert_security; END security_package; / SHOW ERRORS Next we make sure that all users have access to the Security_Package. GRANT EXECUTE ON security_package TO schemaowner,user1,user2; Apply Security Policies to Tables The DBMS_RlS package is used to apply the security policay, implemented by security_package, to the the relevant tables. BEGIN DBMS_RLS.add_policy('SCHEMAOWNER', 'USER_DATA', 'USER_DATA_INSERT_POLICY', 'SEC_ADM', 'SECURITY_PACKAGE.USER_DATA_INSERT_SECURITY', 'INSERT', TRUE); DBMS_RLS.add_policy('SCHEMAOWNER', 'USER_DATA', 'USER_DATA_SELECT_POLICY', 'SEC_ADM', 'SECURITY_PACKAGE.USER_DATA_SELECT_SECURITY', 'SELECT'); END; / Test VPD Finally, test that the VPD is working correctly. Now we will do the test CONNECT user1/user1 INSERT INTO schemaowner.user_data (column1, user_id) VALUES ('User 1', 'HR'); INSERT INTO schemaowner.user_data (column1, user_id) VALUES ('User 2', 'FINANCE'); COMMIT; CONNECT user2/user2 INSERT INTO schemaowner.user_data (column1, user_id) VALUES ('User 1', 'HR'); INSERT INTO schemaowner.user_data (column1, user_id) VALUES ('User 2', 'FINANCE'); COMMIT; CONNECT schemaowner/schemaowner SELECT * FROM schemaowner.user_data; Checking the select option: ------------------------ CONNECT user1/user1 SELECT * FROM schemaowner.user_data; CONNECT user2/user2 SELECT * FROM schemaowner.user_data; Thats all for now
Views: 180 OracleDBA
SQL Server 2017 Tutorial 21 - ALTER TABLE
 
04:58
ALTER TABLE in SQL Server 2017. Support YPN on Patreon! http://www.patreon.com/YPN Website and Forum: http://yourprogrammingnetwork.co.uk Join us on Facebook! https://www.facebook.com/pages/Your-Programming-Network/280950122022281 Chat on Discord https://discord.gg/br3ZB3f
How to Create SCOTT Schema and default tables in Oracle Database 11g
 
04:31
Looking for a best Webhosting Company at low and Best Service click this link:https://www.ipage.com/join/index.bml?AffID=739220 From Last Few Months I Was Looking For Best Webshosting Company Where I Can Host My 100 Of Website At Low Price And With Best Quality Service , And Then I Came To Know About https://www.ipage.com/join/index.bml?AffID=739220 A Hosting Company Where I Get Hosting For Unlimited Domains At Just 1.6$ Per Month With Control Panel , 24hrs Support And All In All A Best Platform To Host Any Website( one-click install wordpress option) .Dont Be Late Offer Valid Till 25th October 2014 , Host Your WebSite With Best Service Provider Today By Clicking The Link Above Or Here: https://www.ipage.com/join/index.bml?AffID=739220 To get a responsive and Modern design contact http://www.variabletips.com and get at just 20$ Now !!! Check my Website: http://variabletips.com for more details. If there is no Oracle default scott schema is available after the installation of Oracle 11g database in windows, Then how to create the scott schema and the default tables like emp , dept, bonus, salgrade in database. Here is a easy step by step tutorial to create it in your database. Open the sql plus in your system. Login as username : sys as sysdba and the password which is given at the time of installation. After connected to Oracle database you need to create the scott schema. Run this script: CREATE USER scott IDENTIFIED BY tiger; scott is the user tiger is the password. Grant all access to user scott,run this script: GRANT ALL PRIVILEGES TO scott; Download the Oracle default tables file: https://www.dropbox.com/s/m9lr8cnc00vqy3i/oracle.zip https://drive.google.com/file/d/0BxJYa0O21A_udlZqQmNZaFBvNTA/edit?usp=sharing Extract the downloaded file in your system. Then Connect to Scott user as: CONNECT scott Password: tiger Then type this in your sql command prompt: @(extract file path)\oracle.sql; for example: @C:\Users\ABC\oracle\oracle.sql; Now you done all the steps completely and you can work with scott schema and all the default tables. Check This in your system to show all the tables in scott user: Select * from tab; After that you can see all the default table in scott user. Just run it to show the default data inside the tables. Select * from emp; If 14 row selected....Then You sucessfully Created the scott schema and the default Oracle tables in your system. Like and subscribe this video: http://www.youtube.com/watch?v=vHcAs7k93AQ
Views: 17339 variabletips
SQL Injection: What is it?
 
04:37
Detailed explanation about SQL injection and its vulnerability. SQL injection uses malicious SQL code for server-side database manipulation to access information that was not intended to be displayed publicly. These types of attacks may result in the unauthorized viewing of user lists, the deletion of entire tables and, sometimes, the attacker gaining admin rights to a database, in other words, whole content access of your website. An attacker can use it to bypass a web site’s security, then retrieve the contents of an entire database and manipulate it as per their own wish. This could be a detrimental impact on your online reputation because your own website contents are no longer in your hand and now controlled by some unknown hackers. In this video, I will guide you how to point the insecure parts of your website and how to get your website protected from the SQL injection attacks. How SQL Injection Works It basically targets input fields like login form, account registration form, search box or any other forms of the website which directly execute database queries in the backend. The attacks can also happen through URL link of your website if it is using query string which is directly connected to your database. Example: Login Form Customer input: User_Id = Request_string("[email protected]"); User_Pass = Request_string("mypassword"); Database SQL Query: 'SELECT * FROM Users WHERE Name =" [email protected]" AND Pass =" mypassword "'; What hackers do: A hacker might get access to user ids and passwords in a database by simply inserting the statement like " OR ""=" into the user name or password text box: Database SQL Query: SELECT * FROM Users WHERE Name ="" or ""="" AND Pass ="" or ""="" The SQL above will return all rows from the "Users" table, since the statement like OR ""="" is always TRUE. This is just an example. There are lots of this type of input queries hackers are using to ruin your privacy and sometimes delete the database tables. How to Mitigate SQL Injection? Input Validation / Pattern Check SQL injection is mainly attacks through malicious external input. That’s why it is preferable to use strict input validation. The input fields of your website only accepts the characters which are only approved by the system and rejects all malicious inputs. Database Access Privilege The web application should be restricted to least privileged access. For example, if the information is for validation or viewing purpose only, then only grant read access to the table. This ensures that an attacker won’t have the rights to the database through the compromised web application. Parameterized Statements Instead of writing dynamic queries, use prepared statements with parameterized queries. A placeholder can only store a value of the given type. SQL injection would simply be treated as an invalid parameter value. There are many other techniques used to prevent the variety of SQL injections. Some of them are application specific. It is preferable to use 3rd party experts to test your website and take their advice to prevent SQL injection attacks. If you have any further queries, you can reach me anytime by Email or Skype. For more information, visit my website: https://www.tricksbysam.com/vlog/sql-injection.html
Views: 3332 Tricks By Sam
Infosys ssis interview questions
 
11:59
Video talks about Infosys ssis interview questions ssis interview questions Infosys ssis interview questions and answers Wipro ssis interview questions ssis interview questions and answers HCL ssis interview questions and answers Infosys ssis interview questions usa 1. What is SSIS? Is there any alternative tool for this? 2. How do you execute SSIS packages? 3. Have you automated the SSIS package any time? 4. Do you know debugging? 5. What are all the debugging techniques? 6. Can I deploy package in the PROD/UAT with break points? If No.. why? If Yes.. Why? 7. What is Data viewer? 8. Can you explain flow for a simple scenario.. Like load data from Oracle to Excel files.. 9. What is configuration in SSIS? 10. What are parameters in SSIS? 11. What is the difference between parameters and Variables in SSIS? 12. Can you tell one complex scenario in your current project? 13. How do you handle complex scenarios in the project? Step by step SQL Training videos Step by step SSIS Training videos SSIS Tutorial SSRS Tutorial More videos at https://www.youtube.com/channel/UCgWvQ6cBxZwABl_hL48ayXg
Views: 8509 Training2SQL MSBI
Oracle Database 12c Security - Oracle Virtual Private Database (VPD)
 
12:29
Learn how to use Oracle Virtual Private Database (VPD) to secure your data. See all lessons at http://skillbuilders.com/12c-TSDP-Tutorial First, Virtual Private Database. What is it? Answer: It's a declarative technique for enforcing security. Typically, it's based on user application context. That was the first limitation of 8i. Backed with 8i context were session-specific. The context variables were sort in the PGA. That means you simply couldn't use this in a web environment. However, global context, with use of 9i, Virtual Private Database became usable for web applications with connection pooling. But whether you're using it to client server or on a three tier environment, it's declarative technique rather than a programmatic technique. I can go behind the back of the application as a DBA and generate predicates to get appended to all SQLs. Select, insert, update, delete the end users. Issue the SQL and I will generate a predicate that filters the access. It's impossible to bypass. All users will have predicates appended to all their code. It doesn't matter whether they're using SQL Plus, Discoverer, Business Objects, Crystal Reports, eBusiness Suites, whatever they're using, I as DBA can filter their access to roles. The end result, different users see different data sets while running the same code and accessing the same tables, hence, the name Virtual Private Database. Different users will think they're seeing a totally different set of tables, but in fact it's one column database, one set of tables hosting a single application shared by all the users. The mechanism - you can apply VPD to tables, to views, to synonyms, and a declarative technique. Once the technique you write a function that generates the predicate, you associate the function with the table. From then on whenever the user issue SQL against that table the Cost-Based Optimizer rewrites the code. The Cost-Based Optimizer rewrites the user SQL to call the function to generate the predicate. The predicate is then appended to the SQL and it's the modified SQL that is parsed and executed. Let's see how this actually works. I'm working here by the way. This is just a perfectly normal 12.1 database. But what I'm going to demonstrate at this point will in fact work on 11g as well. I'm not going to be using any of the 12c enhancements to VPD for this little demonstration. I'll work in the scott schema. What do we have to do? We write a function to generate the predicate string. Create function. And I'll my function vpdf. The function must conform to a fixed specification. It must take two varchar arguments. One of the arguments is intended to be the schema to which the function will be applied. The other argument is the object within the schema to which the function will be applied. And it must return a varchar2, which is the generated predicate. Let's begin. Within this function you can do just about anything. There are some limitations. It's impossible for the function to query or update the table against which the VPD calls here is going to be applied or we violate the rules of purity that we come across so often with PL/SQL. But apart from that, it can do just about anything - including a number of dreadful side effects can be introduced by writing VPD functions. I'm going to do a very simple one on this one. I'll shall simple return immediately a predicate. What predicate? Ename, which is the ename column from this scott.emp table. Ename should equal sys_context. I'll go to the local context, my user end context, and just extract session user. We can see that John has tested this earlier today and therefore the object already was suggesting and he's just dropping it now and cleaning up the recreate. I hope you realize these really are live demonstrations. I'm not just running scripts. I've created a function. What's that function going to do? It's going to return this value here. Test it. Always test it and see what it's actually going to do. I'll select vpdf. I have to give it a couple of arguments. This one will do for now.
Views: 4484 SkillBuilders
How To Fix "Access Denied" Error In Command Prompt
 
09:29
In this video is show you how to fix the Access Denied error while executing commands through command prompt. This occurs because the user does not have permission on the cmd.exe file to allow changes to be made. Another problem we face is UAC (User access control) is turned on by default, which prevents the user from making changes that could harm a system. These occur even though you are running an administrator account. PLEASE NOTE: I AM NOT RESPONSIBLE FOR ANY DAMAGE OR ISSUES THAT MAY OCCUR, THIS IS FOR EDUCATIONAL PURPOSES ONLY Now onto the fix 1) we are going to turn off UAC. start, control panel, search bar at top right, type uac, and its the first option. click on it and drag the bar all the way to the bottom so it is off. 2)were going to change the owner of the file as you have to be the owner to make changes to permissions. to do this we are going to hold the start button (on your keyboard+r) and type c:\windows\system32 in the run dialog box. When system32 folder opens, type cmd and click the cmd.exe file at the top. now right click, properties, security, advanced, and at the top where it displays owner, click change and type in your username, and click Ok. 3)Next were going to set the permissions to allow you to make changes. right click cmd.exe again and click properties, security, edit, add (your username). Click full control box and click apply. 4) finally exit out of the cmd properties, right click the cmd.exe file and click run as administrator. In your command prompt, type you command that wasnt working originally, and BINGO thanks for watching dont forget to like comment and subscribe below for more great videos
Views: 334303 icanswim70
DML & TCL Statements in SQL Tutorial | SQL Online Training
 
48:11
Topics covered in this session : ALL DML commands,TCL commands,creating and managing tables. Click4learning is a leading online education provider with expertise in SQL and other Software Trainings. Reach out to [email protected] for any of your SQL Online Training needs. For more details visit our website www.click4learning.com.
Views: 84 Click4learning.com
Chapter 8 IBM DB2 Working with the Command line tool
 
05:11
IBM DB2 Database for Administrators Chapter 7 IBM DB2 Working with the Command line tool The IBM DB2 Database for Administrators training series will address future DBA who want to understand the aspects of DB2 ecosystem. Will train their administration skill and develop skill that will be used in the work enviroment. IBM DB2 is the database of choice for enterprise-wide solutions. Optimized to deliver industry-leading performance while lowering costs, IBM DB2 offers extreme performance, flexibility, scalability and reliability for any size organization. db2 database | ibm db2 express | db2 tutorial | db2 sql | db2 connect | what is db2 | db2 express | db2 sqlcode | sqlcode db2 | db2 express | Db2 Commands | db2 connect | db2 connect to database | db2 connection string | what is db2 | More Articles, Scripts and How-To Papers on http://www.aodba.com
Views: 6362 AO DBA
TOP SSIS Interview Questions Part 2
 
13:13
Video talks about top ssis interview questions top ssis questions ssis interview questions for experienced ssis interview questions for freshers Infosys ssis interview questions ssis interview questions Infosys ssis interview questions and answers Wipro ssis interview questions ssis interview questions and answers HCL ssis interview questions and answers Infosys ssis interview questions usa 1. What is SSIS? Is there any alternative tool for this? 2. Rate yourself in SSIS on the scale of 5 (1-Least , 5 – Best) 3. What are your responsibilities in this SSIS project? 4. How do you execute SSIS packages? 5. How to link SSIS package with SQL Job? 6. What is the incremental load? 7. What are the differences between full load and incremental load? 8. Do you know debugging? 9. What are all the debugging techniques? 10. What is Delay validation? 11. Can I deploy package in the PROD/UAT with break points? If No.. why? If Yes.. Why? 12. What is Data viewer? 13. Can you explain flow for a simple scenario.. Like load data from Oracle to Excel files.. 14. What is configuration in SSIS? 15. What is Sequence container? 16. What are parameters in SSIS? 17. What is the difference between parameters and Variables in SSIS? 18. Can you tell one complex scenario in your current project? 19. How do you handle complex scenarios in the project? 20. Do you use SCD1 or SCD2? 21. Have you used SCD in your project? Explain? 22. What is logging? Have you implemented logging in your project? 23. What is Environment variable in SSIS? 24. How do you secure your packages in SSIS? 25. What is Text Qualifier in SSIS? 26. What is staging in SSIS? 27. How do you call one package from another package in SSIS? 28. Have you used Script task in SSIS? 29. How to pass variable value from one package to another? Step by step SQL Training videos Step by step SSIS Training videos SSIS Tutorial SSRS Tutorial More videos at https://www.youtube.com/channel/UCgWvQ6cBxZwABl_hL48ayXg
Views: 3413 Training2SQL MSBI
How to Install Multiple MySQL Servers on Windows Machines - MySQL DBA Tutorial
 
13:06
How to Install Multiple MySQL Servers on Windows Machines - MySQL DBA Tutorial demo explains the limitations that we can't install the MySQL multiple Servers on same machine by using MySQL Installer. Below are the steps you have to perform to install another MySQL server on windows machine on which you already have installed MySQL. 1) Create a new folder on C drive, let's say MYSQLDEV 2) Copy all the folders from c:\programfile\MySQL to MYSQLDEV 3) Search for my.ini in %PROGRAMDATA%\MySQL and copy to MYSQLDEV and also copy Data directory 4) Change the port for [client] and [mysqlid] in mysqldev.ini file 5) change the basedir and datadir location to new location 6) execute mysqld --install MYSQLDEV --defaults-file="c:/MYSQLDEV/mysqldev.ini" 7) Start the services net start MYSQLDEV 8) Connect to MySQL mysql -u root --Port=3307 9) Run show variables where variable_name in ('hostname','port'); 10) Change the root password if you need to for newly installed MySQL service ALTER USER 'root'@'localhost' IDENTIFIED BY 'MyNewPass'; To follow step by step tutorial for MySQL DBA for beginner to Advance http://www.techbrothersit.com/2018/11/mysql-dba-tutorial-beginner-to-advance.html MySQL Workbench Tutorial MySQL DBA Certification Training MySQL DBA Tutorial Step by Step MySQL DBA Training online free MySQL Real Time DBA Tutorial MySQL Administration Course step by Step MySQL Tools for Development and Admin
Views: 224 TechBrothersIT
Learn SQL DDL Command with in 10 min with Example!!
 
13:13
In this session I tried to show you how to perform SQL DDL(Data Definition Language) command in SQL Command Line with full explanation. If you have any doubt or any question to ask regarding DDL you can ask in comment section. Kindly Follow us at Facebook: https://www.facebook.com/giga.edu0/?ref=aymt_homepage_panel Follow us on Twitter:https://twitter.com/Gedu4U
Views: 49 G-Edu 4U
طريقة تصطيب الديزاينر وعمل مشروع مصغر عليه
 
50:30
دي الصلاحيات المطلوبه لليوزر GRANT EXECUTE ON DBMS_LOCK TO &U; GRANT EXECUTE ON DBMS_PIPE TO &U; GRANT EXECUTE ON DBMS_RLS TO &U; GRANT SELECT ON dba_rollback_segs TO &U; GRANT SELECT ON dba_segments TO &U; GRANT SELECT ON sys.v_$nls_parameters TO &U WITH GRANT OPTION; GRANT SELECT on V_$PARAMETER TO &U; GRANT ALTER SESSION TO &U; GRANT CREATE ANY SYNONYM TO &U; GRANT CREATE SESSION TO &U; GRANT CREATE DATABASE LINK TO &U; GRANT CREATE PROCEDURE TO &U; GRANT CREATE ROLE TO &U; GRANT CREATE SEQUENCE TO &U; GRANT CREATE SESSION TO &U; GRANT CREATE TABLE TO &U; GRANT CREATE TRIGGER TO &U; GRANT CREATE TYPE TO &U; GRANT CREATE VIEW TO &U; GRANT DROP ANY SYNONYM TO &U; GRANT SELECT ANY SEQUENCE TO &U; GRANT CREATE PUBLIC SYNONYM TO &U; grant execute on dbms_lock to &U; grant execute on dbms_pipe to a&U; grant execute on dbms_rls to &U; grant select on dba_rollback_segs to &U; grant select on dba_segments to &u; grant select on v_$nls_parameters to &u; grant select on v_$parameter to &u; تم شرح طريقه التصطيب للديزانير وعمل مشورغ مصغر وكيفيه تصدير الى الداتا بيز
Views: 1202 Ahmed Tartour
DBMS|Database Language|What is Database Language?What is DDL,DML,DCL Statement in SQL |SQL Statement
 
01:53
Database Language three type 1. DDL 2. DML 3.DCL More videos.. https://youtu.be/tYS-4G1klvk https://youtu.be/bDxpLEmm-w0 https://youtu.be/GvWtd5EOFWw https://youtu.be/iAarosX8ees https://youtu.be/A8s7CLrgKY4 ......DATABASE LANGUAGE...... A DBMS must provide appropriate languages and interfaces for each category of users to express database queries and updates. Database Languages are used to create and maintain database on computer. There are large numbers of database languages like Oracle, MySQL, MS Access, dBase, FoxPro etc. SQL statements commonly used in Oracle and MS Access can be categorized as data definition language (DDL), data control language (DCL) and data manipulation language (DML). .......................................... . .... Data Definition Language (DDL) It is a language that allows the users to define data and their relationship to other types of data. It is mainly used to create files, databases, data dictionary and tables within databases. It is also used to specify the structure of each table, set of associated values with each attribute, integrity constraints, security and authorization information for each table and physical storage structure of each table on disk. The following table gives an overview about usage of DDL statements in SQL. ........................ Data Manipulation Language (DML) It is a language that provides a set of operations to support the basic data manipulation operations on the data held in the databases. It allows users to insert, update, delete and retrieve data from the database. The part of DML that involves data retrieval is called a query language. The following table gives an overview about the usage of DML statements in SQL. ......................... Data Control Language (DCL) DCL statements control access to data and the database using statements such as GRANT and REVOKE. A privilege can either be granted to a User with the help of GRANT statement. The privileges assigned can be SELECT, ALTER, DELETE, EXECUTE, INSERT, INDEX etc. In addition to granting of privileges, you can also revoke (taken back) it by using REVOKE command. The following table gives an overview about the usage of DCL statements in SQL: In practice, the data definition and data manipulation languages are not two separate languages. Instead they simply form parts of a single database language such as Structured Query Language (SQL). SQL represents combination of DDL and DML, as well as statements for constraints specification and schema evaluation. ........................... An example of output from an SQL database query. A database is an organized collection of data. [1] It is a collection of schemas , tables, queries, reports, views , and other objects. Database designers typically organize the data to model aspects of reality in a way that supports processes requiring information, such as (for example) modelling the availability of rooms in hotels in a way that supports finding a hotel with vacancies. A database-management system ( DBMS ) is a computer-software application that interacts with end-users , other applications, and the database itself to capture and analyze data. A general-purpose DBMS allows the definition, creation, querying, update, and administration of databases. Well-known DBMSs include MySQL, PostgreSQL , MongoDB , MariaDB , Microsoft SQL Server, Oracle, Sybase, SAP HANA , MemSQL , SQLite and IBM DB2 . A database is not generally portable across different DBMSs, but different DBMSs can interoperate by using standards such as SQL and ODBC or JDBC to allow a single application to work with more than one DBMS. Computer scientists may classify database- management systems according to the database models that they support; the most popular database systems since the 1980s have all supported the relational model - generally associated with the SQL language. [ disputed ] Sometimes a DBMS is loosely referred to as a "database". Terminology and overview Formally, a "database" refers to a set of related data and the way it is organized. Access to this data is usually provided by a "database management system" (DBMS) consisting of an integrated set of computer software that allows users to interact with one or more databases and provides access to all of the data contained in the database (although restrictions may exist that limit access to particular data). The DBMS provides various functions that allow entry, storage and retrieval of large quantities of information and provides ways to manage how that information is organized. Because of the close relationship between them, the term "database" is often used casually to refer to both a database and the DBMS used to manipulate it. Outside the world of professional information technology , the term database is often used to refer to any collection of related data (such as a spreadsheet or a card index). This article is concerned only with databases where the size and usage requirements necessitate
Views: 110 Bits Vids