Listings of System and Object Privileges
System Privilege Name | Operations Authorized |
---|---|
Advisor Framework Privileges: All of the advisor framework privileges are part of the DBA role. |
— |
|
Access the advisor framework through PL/SQL packages such as |
Create, drop, select (read), load (write), and delete SQL tuning sets owned by the grantee through the |
|
Create, drop, select (read), load (write), and delete SQL tuning sets owned by any user through the |
|
Accept a SQL Profile recommended by the SQL Tuning Advisor, which is accessed through Enterprise Manager or by the Note: This privilege has been deprecated in favor of |
|
Alter the attributes of an existing SQL Profile. Note: This privilege has been deprecated in favor of |
|
Drop existing SQL Profiles. Note: This privilege has been deprecated in favor of |
|
Create, alter, and drop SQL Profiles owned by any user through the |
|
ANALYTIC VIEWS |
— |
|
Create analytic views in the grantee's schema. |
|
Create analytic views in any schema except |
|
Rename analytic views in any schema except |
|
Drop analytic views in any schema except |
ATTRIBUTE DIMENSIONS |
— |
|
Create attribute dimensions in the grantee's schema. |
|
Create attribute dimensions in any schema except |
|
Rename attribute dimensions in any schema except |
|
Drop attribute dimensions in any schema except |
CLUSTERS: |
— |
|
Create clusters in the grantee's schema. |
|
Create clusters in any schema except |
|
Alter clusters in any schema except |
|
Drop clusters in any schema except |
CONTEXTS: |
— |
|
Create any context namespace. |
|
Drop any context namespace. |
DATA REDACTION: |
— |
|
Bypass any existing Oracle Data Redaction policies and view actual data from tables or views on which Data Redaction policies are defined. |
DATABASE: |
— |
|
Alter the database. |
|
Issue |
|
Issue |
DATABASE LINKS: |
— |
|
Create private database links in the grantee's schema. |
|
Create public database links. |
Modify a fixed-user database link when the password of the connection or authentication user changes. |
|
Modify a public fixed-user database link when the password of the connection or authentication user changes. |
|
|
Drop public database links. |
DEBUGGING: |
— |
|
Connect the current session to a debugger. |
|
Debug all PL/SQL and Java code in any database object. Display information on all SQL statements executed by the application. Note: Granting this privilege is equivalent to granting the |
— |
|
|
Analyze any data dictionary object. |
DIMENSIONS: |
— |
|
Create dimensions in the grantee's schema. |
|
Create dimensions in any schema except |
|
Alter dimensions in any schema except |
|
Drop dimensions in any schema except |
DIRECTORIES: |
— |
|
Create directory database objects. |
|
Drop directory database objects. |
EDITIONS: |
— |
|
Create editions. |
|
Drop editions. |
FLASHBACK DATA ARCHIVES: |
— |
|
Create, alter, or drop any flashback data archive. |
HIERARCHIES |
— |
|
Create hierarchies in the grantee's schema. |
|
Create hierarchies in any schema except |
ALTER ANY HIERARCHY |
Rename hierarchies in any schema except |
|
Drop hierarchies in any schema except |
INDEXES: |
— |
|
Create in any schema, except |
|
Alter indexes in any schema except |
|
Drop indexes in any schema except |
INDEXTYPES: |
— |
|
Create indextypes in the grantee's schema. |
|
Create indextypes in any schema except |
|
Modify indextypes in any schema except |
|
Drop indextypes in any schema except |
|
Reference indextypes in any schema except |
JOB SCHEDULER OBJECTS: |
The following privileges are needed to execute procedures in the |
|
Create, alter, or drop jobs, chains, schedules, programs, credentials, resource objects, or incompatibility resource objects in the grantee's schema. |
|
Create, alter, or drop jobs, chains, schedules, programs, credentials, resource objects, or incompatibility resource objects in any schema except Note: This extremely powerful privilege allows the grantee to execute code as any other user. It should be granted with caution. |
|
Create in the grantee's schema an executable scheduler job that runs on the operating system. |
|
Specify any job class in a job in the grantee's schema. |
|
Use any program in a job in the grantee's schema. |
|
Create, alter, or drop any job class, window, or window group. |
|
Associate any schedule resource object with any program or job in the grantee’s schema. |
KEY MANAGEMENT FRAMEWORK: |
— |
Manage keys and keystores. |
|
LIBRARIES: |
Caution: |
|
Create external procedure or function libraries in the grantee's schema. |
|
Create external procedure or function libraries in any schema except |
|
Alter external procedure or function libraries in any schema except |
|
Drop external procedure or function libraries in any schema except |
|
Use external procedure or function libraries in any schema except |
LOGMINER: |
— |
|
Execute procedures in the |
MATERIALIZED VIEWS: |
— |
|
Create materialized views in the grantee's schema. |
|
Create materialized views in any schema except |
|
Alter materialized views in any schema except |
|
Drop materialized views in any schema except |
|
This privilege has been deprecated. No privileges are needed for a user to enable rewrite for a materialized view that references tables or views in the user's own schema. |
|
Enable rewrite using a materialized view when that materialized view references tables or views in any schema except |
|
Create a refresh-on-commit materialized view on any table in the database. Alter a refresh-on-demand materialized view on any table in the database to refresh-on-commit. |
|
Issue a SQL Flashback Query on any table, view, or materialized view in any schema except |
MINING MODELS: |
— |
|
Create mining models in the grantee's schema using the |
|
Create mining models in any schema, except |
|
Change the mining model name or the associated cost matrix of a model in any schema, except |
|
Drop mining models in any schema, except |
|
Score or view mining models in any schema except |
|
Create comments on mining models in any schema, except |
OLAP CUBES: |
The following privileges are valid when you are using Oracle Database with the OLAP option. |
|
Create OLAP cubes in the grantee's schema. |
|
Create OLAP cubes in any schema except |
|
Alter OLAP cubes in any schema except |
|
Drop OLAP cubes in any schema except |
|
Query or view OLAP cubes in any schema except |
|
Update OLAP cubes in any schema except |
OLAP CUBE MEASURE FOLDERS: |
The following privileges are valid when you are using Oracle Database with the OLAP option. |
|
Create OLAP measure folders in the grantee's schema. |
|
Create OLAP measure folders in any schema except |
|
Delete a measure from an OLAP measure folder in any schema except |
|
Drop OLAP measure folders in any schema except |
|
Insert a measure into an OLAP measure folder in any schema except |
OLAP CUBE DIMENSIONS: |
The following privileges are valid when you are using Oracle Database with the OLAP option. |
|
Create OLAP cube dimension in the grantee's schema. |
|
Create OLAP cube dimensions in any schema except |
|
Alter OLAP cube dimensions in any schema except |
|
Delete from OLAP cube dimensions in any schema except |
|
Drop OLAP cube dimensions in any schema except |
|
Insert into OLAP cube dimensions in any schema except |
|
View or query OLAP cube dimensions in any schema except |
|
Update OLAP cube dimensions in any schema except |
OLAP CUBE BUILD PROCESSES: |
— |
|
Create OLAP cube build processes in the grantee's schema. |
|
Create OLAP cube build processes in any schema except |
|
Drop OLAP cube build processes in any schema except |
|
Update OLAP cube build processes in any schema except |
OPERATORS: |
— |
|
Create an operator and its bindings in the grantee's schema. |
|
Create an operator and its bindings in any schema and create a comment on an operator in any schema. |
|
Modify operators in any schema. |
|
Drop operators in any schema. |
|
Reference operators in any schema. |
OUTLINES: |
— |
|
Create public outlines that can be used in any schema that uses outlines. |
|
Modify outlines. |
|
Drop outlines. |
PDB LOCKDOWN PROFILES: |
— |
|
Create PDB lockdown profiles. |
|
Alter PDB lockdown profiles. |
|
Drop PDB lockdown profiles. |
PLAN MANAGEMENT: |
— |
|
Perform controlled manipulation of plan history and SQL plan baselines maintained for various SQL statements. |
PLUGGABLE DATABASES: |
— |
Create a PDB. Plug in a PDB that was previously unplugged from a CDB. Clone a PDB. |
|
Allow a common user to switch into the container for which this privilege was granted. This privilege can be granted only to a common user or common role. |
|
PROCEDURES: |
— |
|
Create stored procedures, functions, or packages in the grantee's schema. |
|
Create stored procedures, functions, or packages in any schema except |
|
Alter stored procedures, functions, or packages in any schema except |
|
Drop stored procedures, functions, or packages in any schema except |
|
Execute procedures or functions, either standalone or packaged. Reference public package variables in any schema except |
|
Execute definer's rights procedures or functions that contain current user database links. |
PROFILES: |
— |
|
Create profiles. |
|
Alter profiles. |
|
Drop profiles. |
ROLES: |
— |
|
Create roles. |
|
Alter any role in the database. |
|
Drop roles. |
|
Grant any role in the database. |
ROLLBACK SEGMENTS: |
— |
|
Create rollback segments. |
|
Alter rollback segments. |
|
Drop rollback segments. |
SEQUENCES: |
— |
|
Create sequences in the grantee's schema. |
|
Create sequences in any schema except |
|
Alter sequences in any schema except |
|
Drop sequences in any schema except |
|
Reference sequences in any schema except |
SESSIONS: |
— |
|
Connect to the database. |
|
Set costs for session resources. |
|
Enable and disable the SQL trace facility. |
|
Logon after the instance is started using the SQL*Plus |
SNAPSHOTS: |
See |
— |
|
|
Create SQL translation profiles in the grantee's schema. |
|
Create SQL translation profiles in any schema except |
|
Alter the translator, custom SQL statement translations, or custom error translations of a SQL translation profile in any schema except |
|
Use SQL translation profiles in any schema except |
|
Drop SQL translation profiles in any schema except |
|
Translate SQL through the grantee's SQL translation profile for any user. |
SYNONYMS: |
Caution: |
|
Create synonyms in the grantee's schema. |
|
Create private synonyms in any schema except |
|
Create public synonyms. |
|
Drop private synonyms in any schema except |
|
Drop public synonyms. |
TABLES: |
Note: For external tables, the only valid privileges are |
|
Create tables in the grantee's schema. |
|
Create a table in any schema except |
|
Alter a table or view in any schema except |
|
Use the Export utility to incrementally export objects from the schema of other users except |
|
Delete rows from tables, table partitions, or views in any schema except |
|
Drop or truncate tables or table partitions in any schema except |
|
Insert rows into tables and views in any schema except |
|
Lock tables and views in any schema except |
Query tables, views, or materialized views in any schema except |
|
|
Query tables, views, or materialized views in any schema except |
|
Issue a SQL Flashback Query on any table, view, or materialized view in any schema except |
|
Update rows in tables and views in any schema except |
|
Perform online redefinition without granting any of the privileges in |
TABLESPACES: |
— |
|
Create tablespaces. |
|
Alter tablespaces. |
|
Drop tablespaces. |
|
Take tablespaces offline and online and begin and end tablespace backups. |
|
Use an unlimited amount of any tablespace. This privilege overrides any specific quotas assigned. If you revoke this privilege from a user, then the user's schema objects remain but further tablespace allocation is denied unless authorized by specific tablespace quotas. You cannot grant this system privilege to roles. |
TRIGGERS: |
— |
|
Create database triggers in the grantee's schema. |
|
Create database triggers in any schema except |
|
Enable, disable, or compile database triggers in any schema except |
|
Drop database triggers in any schema except |
|
Create a trigger on |
TYPES: |
— |
|
Create object types and object type bodies in the grantee's schema. |
|
Create object types and object type bodies in any schema except |
|
Alter object types in any schema except |
|
Drop object types and object type bodies in any schema except |
|
Use and reference object types and collection types in any schema except |
|
Create subtypes under any nonfinal object types. |
USERS: |
— |
|
Create users. This privilege also allows the creator to:
|
|
Alter any user except
|
|
Drop users |
VIEWS: |
— |
|
Create views in the grantee's schema. |
|
Create views in any schema except |
|
Drop views in any schema except |
|
Create subviews under any object views. |
|
Issue a SQL Flashback Query on any table, view, or materialized view in any schema except |
If a user has been granted the |
|
MISCELLANEOUS: |
— |
|
Analyze a table, cluster, or index in any schema except |
|
Audit an object in any schema, except |
Allow users of the Data Pump Import utility (impdp) and the original Import utility (imp) to assume the identity of another user in order to perform operations that cannot be directly performed by a third party (for example, loading objects such as object privilege grants). Allow Streams administrators to create or alter capture users and apply users in a Streams environment. By default this privilege is part of the DBA role. Database Vault removes this privileges from the DBA role. Therefore, this privilege is needed by Streams only in an environment where Database Vault is installed. |
|
Create a registration on queries and receive database change notifications in response to DML or DDL changes to the objects associated with the registered queries. Refer to Oracle Database Development Guide for more information on database change notification. |
|
|
Comment on a table, view, or column in any schema except |
|
Bypass fine-grained access control. Caution: This is a very powerful system privilege, as it lets the grantee bypass application-driven security policies. Database administrators should use caution when granting this privilege. |
|
Force the commit or rollback of any in-doubt distributed transaction in the local database. Induce the failure of a distributed transaction. |
|
Force the commit or rollback of the grantee's in-doubt distributed transactions in the local database. |
|
Grant any object privilege that the object owner is permitted to grant. Revoke any object privilege that was granted by the object owner or by some other user with the |
|
Grant any system privilege. |
|
Execute invoker's rights procedures owned by the grantee with the privileges of the invoker. |
|
The Note: If this privilege is granted or revoked between runtime and failover of a request, then the original values are not returned during replay for Application Continuity for that request. |
|
The Note: If this privilege is granted or revoked between runtime and failover of a request, then the original value is not returned during replay for Application Continuity for that request. |
|
Remove all objects from the system-wide recycle bin. |
|
Enable resumable space allocation. |
|
Query any data dictionary object in the This privilege lets you selectively override the default |
|
Query the contents of the Caution: This is a very powerful system privilege, as it lets the grantee view all data in the database, including past data. This privilege should be granted only to users who need to use the Oracle Flashback Transaction Query feature. |
|
Perform the following backup and recovery operations:
Create, use, view, and drop restore points (including guaranteed restore points). Execute procedures in the
Includes the |
|
Includes the |
|
Perform the following Oracle Data Guard operations:
Create, use, view, and drop restore points (including guaranteed restore points).
Includes the |
|
Perform the following encryption key management operations: Connect to the database even if the database is not open.
Includes the |
|
Includes the |
Object Privileges
Object Privilege Name | Operations Authorized |
---|---|
ANALYTIC VIEW PRIVILEGES |
The following analytic view privileges authorize operations on analytic views. |
ALTER |
Rename the analytic view. |
READ |
Query the object with the |
SELECT |
Query the object with the SELECT statement. |
ATTRIBUTE DIMENSION PRIVILEGES |
The following attribute dimension privileges authorize operations on attribute dimensions.. |
ALTER |
Rename the attribute dimension. |
DIRECTORY PRIVILEGES |
The following directory privileges provide secured access to the files stored in the operating system directory to which the directory object serves as a pointer. The directory object contains the full path name of the operating system directory where the files reside. Because the files are actually stored outside the database, Oracle Database server processes also need to have appropriate file permissions on the file system server. Granting object privileges on the directory database object to individual database users, rather than on the operating system, allows the database to enforce security during file operations. |
|
Read files in the directory. |
|
Write files in the directory. This privilege is useful only in connection with external tables. It allows the grantee to determine whether the external table agent can write a log file or a bad file to the directory. Restriction: This privilege does not allow the grantee to write to a |
Execute a preprocessor program that resides in the directory. A preprocessor program converts data to a supported format when loading data records from an external table with the |
|
EDITION PRIVILEGE |
The following edition privilege authorizes the use of an edition. |
|
Use an edition. |
FLASHBACK DATA ARCHIVE PRIVILEGE |
The following flashback data archive privilege authorizes operations on flashback data archives. |
Enable or disable historical tracking for a table. |
|
HIERARCHY PRIVILEGES |
The following hierarchy privileges authorize operations on hierarchies. |
ALTER |
Rename the hierarchy. |
READ |
Query the object with the |
SELECT |
Query the object with the |
INDEXTYPE PRIVILEGE |
The following indextype privilege authorizes operations on indextypes. |
|
Reference an indextype. |
LIBRARY PRIVILEGE |
The following library privilege authorizes operations on a library. |
|
Use and reference the specified object and invoke its methods. Caution: This extremely powerful privilege should be granted only to trusted users. Refer to Oracle Database Security Guide before granting this privilege. |
MATERIALIZED VIEW PRIVILEGES |
The following materialized view privileges authorize operations on a materialized view. The |
|
Create a refresh-on-commit materialized view on the specified table. |
|
Create a materialized view for query rewrite using the specified table. |
Query the materialized view. |
|
|
Query the materialized view. Obtain row locks with the |
MINING MODEL PRIVILEGES |
The following mining model privileges authorize operations on a mining model. These privileges are not required for models within the users own schema. |
|
Change the mining model name or the associated cost matrix using the applicable |
|
Score or view the mining model. Scoring is done with the |
OBJECT TYPE PRIVILEGES |
The following object type privileges authorize operations on a database object type. |
|
Access, through a debugger, all public and nonpublic variables, methods, and types defined on the object type. Place a breakpoint or stop at a line or instruction boundary within the type body. |
|
Use and reference the specified object and invoke its methods. Access, through a debugger, public variables, types, and methods defined on the object type. |
|
Create a subtype under this type. You can grant this object privilege only if you have the |
OLAP PRIVILEGES |
The following object privileges are valid if you are using Oracle Database with the OLAP option. |
|
Insert members into the OLAP cube dimension or measures into the measures folder. |
|
Change the definition of the OLAP cube dimension or cube. |
|
Delete members from the OLAP cube dimension or measures from the measures folder. |
|
View or query the OLAP cube or cube dimension. |
|
Update measure values of the OLAP cube or attribute values of the cube dimension. |
OPERATOR PRIVILEGE |
The following operator privilege authorizes operations on user-defined operators. |
|
Reference an operator. |
PROCEDURE, FUNCTION, PACKAGE PRIVILEGES |
The following procedure, function, and package privileges authorize operations on procedures, functions, and packages. These privileges also apply to Java sources, classes, and resources, which Oracle Database treats as though they were procedures for purposes of granting object privileges. |
|
Access, through a debugger, all public and nonpublic variables, methods, and types defined on the object. Place a breakpoint or stop at a line or instruction boundary within the procedure, function, or package. This privilege grants access to the declarations in the method or package specification and body. |
|
Execute the procedure or function directly, or access any program object declared in the specification of a package, or compile the object implicitly during a call to a currently invalid or uncompiled function or procedure. This privilege does not allow the grantee to explicitly compile using Access, through a debugger, public variables, types, and methods defined on the procedure, function, or package. This privilege grants access to the declarations in the method or package specification only. Job scheduler objects are created using the Note: Users do not need this privilege to execute a procedure, function, or package indirectly. |
SCHEDULER PRIVILEGES |
Job scheduler objects are created using the |
|
Operations on job classes, programs, chains, and credentials. |
|
Modifications to jobs, programs, chains, credentials, and schedules. |
|
Associate the specified scheduler resource object with programs and jobs. |
SEQUENCE PRIVILEGES |
The following sequence privileges authorize operations on a sequence. |
|
Change the sequence definition with the |
The sequence pseudocolumn If this privilege is granted or revoked between runtime and failover of a request, then the original value of Note: This privilege is not granted by the Note: This privilege is part of the DBA role. |
|
|
Examine and increment values of the sequence with the |
The following SQL translation profile privileges authorize operations on a SQL translation profile. |
|
Alter the translator, custom SQL statement translations, or custom error translations of a SQL translation profile. |
|
Use a SQL translation profile. |
|
SYNONYM PRIVILEGES |
Synonym privileges are the same as the privileges for the target object. Granting a privilege on a synonym is equivalent to granting the privilege on the base object. Similarly, granting a privilege on a base object is equivalent to granting the privilege on all synonyms for the object. If you grant to a user a privilege on a synonym, then the user can use either the synonym name or the base object name in the SQL statement that exercises the privilege. |
TABLE PRIVILEGES |
The following table privileges authorize operations on a table. Any one of following object privileges, except the Note: For external tables, the only valid object privileges are |
|
Change the table definition with the |
|
Access, through a debugger:
|
|
Remove rows from the table with the Note: You must grant the |
|
Create an index on the table with the |
|
Add new rows to the table with the Note: You must grant the |
Query the table with the |
|
|
Create a constraint that refers to the table. You cannot grant this privilege to a role. |
|
Query the table with the |
|
Change data in the table with the Note: You must grant the |
USER PRIVILEGES |
The following privileges authorize operations on a user. |
Execute invoker's rights procedures or functions owned by the grantee with the privileges of the invoker when the invoker is the user on whom this privilege is granted. |
|
|
Allow the user on whom this privilege is granted to execute definer's rights procedures or functions that contain current user database links and are owned by the grantee. |
Translate SQL through the grantee's SQL translation profile for the user on whom this privilege is granted. |
|
VIEW PRIVILEGES |
The following view privileges authorize operations on a view. Any one of the following object privileges, except the To grant a privilege on a view, you must have that privilege with the |
|
Access, through a debugger:
|
|
Remove rows from the view with the |
|
Add new rows to the view with the |
This object privilege has the same behavior as the system privilege MERGE ANY VIEW, except that the privilege is limited to the views specified in the |
|
Query the view with the |
|
|
Define foreign key constraints on the view. |
|
Query the view with the See Also: object_privilege for additional information on granting this object privilege on a view |
Create a subview under this view. You can grant this object privilege only if you have the |
|
|
Change data in the view with the |
标签:AUDSYS,大全,except,any,SYS,oracle,权限,ANY,schema From: https://www.cnblogs.com/wonchaofan/p/16714084.html