Oracle FAQ Your Portal to the Oracle Knowledge Grid
HOME | ASK QUESTION | ADD INFO | SEARCH | E-MAIL US
 

Home -> Community -> Usenet -> c.d.o.server -> Re: Logging into Oracle??

Re: Logging into Oracle??

From: DA Morgan <damorgan_at_exesolutions.com>
Date: Wed, 29 Jan 2003 14:05:07 -0800
Message-ID: <3E385013.E1A83661@exesolutions.com>


Brian Thomas wrote:

> Ok, so I understand this is way too broad a question to be answered in
> a posting, so what I'm looking for is a pointer to references
> somewhere that could help me.
>
> I've been tasked with maintaining both and 8.1.7 and 9.0.1 database
> installations, all inherited from an earlier sysadmin. I'll be the
> first to admit I'm not a DBA, and my understand of Oracle permissions
> is weak at best.
>
> The issue I'm having is one of vast amounts of confusion over how
> Oracle permissions work. I don't know what to change where so as to,
> for example, let root log in to sqlplus the same as the oracle user
> does, or what commands to use. I've seen everything from:
>
> (on 8.1.7)
> sqlplus system/manager_at_ORACLE_SID
> connect internal
>
> to
>
> (on 9.0.1)
> sqlplus /nolog
> connect / as sysdba
>
> The latter of which works as user oracle but not as user root. The
> former works either way, usually, although I can't run archive log
> commands when logged in as root.
>
> This isn't meant as a comprehensive explanation of the problems I'm
> having, but more an example of the sorts of questions I can't find the
> answer to. I've found amazingly little information doing google
> searches for 'oracle permissions' and the like, and I've wasted days
> scouring newsgroups trying to find hints. Anyone have any suggestions?
>
> Thanks,
> Brian
> wolfie_at_boldfish.com

There is no such thing as "Oracle permissions".

There is at the most basic level user ids and passwords.

Beyond that there are system privileges that may be granted independently to a user-id or to a role with the role being granted to a user-id or to another role ... thus nesting roles within roles before granting them to a user-id.

There are also object privileges that behave the same way but relate to objects rather than system privileges.

Then there are profiles and numerous other ways that a competent DBA and/or SysAdmin might choose to develop a system security model. While I or others might guess at the way someone implemented these things on your system the truth is that we would only be guessing. You really need to either know, know enough to find out, or bring in a consultant for a few days to help you ... even a remote consultant could do it.

Daniel Morgan Received on Wed Jan 29 2003 - 16:05:07 CST

Original text of this message

HOME | ASK QUESTION | ADD INFO | SEARCH | E-MAIL US