Chapter Summary

This chapter explained the security features of Oracle XE that you can use to limit and monitor access to a database:

ImageOnly a registered database user can access a database once Oracle authenticates a connection request. You can create and manage users with the Database Home Page or the SQL commands CREATE USER and ALTER USER.

ImageOnce connected to a database, a user can perform only those operations that the user is privileged to execute. You can grant users individual system and object privileges or use roles to group related sets of ...

Get Hands-On Oracle Database 10g Express Edition for Windows now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.