Understanding role-based security
When our task is limited to granting permissions to a select few users, what we've learned this far using
REVOKE would likely suffice. However, a real-world security approach may require us to manage the grants of thousands of users for hundreds of database objects. Were we to use individual grants for each of these users, mistakes would likely be made. Certain users would not have the necessary permissions and, worse still, users may be granted higher access than they require. We need a way to ease this burden and make ma...
- Understanding role-based security
- from OCA Oracle Database 11g: Database Administration I: A Real-World Certification Guide
- Publisher: Packt Publishing
- Released: February 2013
Share this highlighthttp://www.safaribooksonline.com/a/oca-oracle-database/1312372/