Understanding TOAD’s Oracle-Based Security

Probably the most frequently asked question by DBAs new to TOAD is: “Will TOAD permit my developers to do things that they should not?” The simple answer is definitely not, because TOAD cannot override or supersede Oracle’s security. TOAD users have only whatever roles, system privileges, or object grants that exist for them within the database. Thus they can do no more in TOAD than they could in SQL*Plus (they just can do it more easily and faster). To reiterate, TOAD only permits users to do whatever the DBA has granted them—there are no loopholes or exceptions.

But this does require the DBAs managing the Oracle schemas (that is, users) to have a very firm grasp on all the privileges they are actually ...

Get TOAD® Handbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.