Oracle FAQ Your Portal to the Oracle Knowledge Grid
HOME | ASK QUESTION | ADD INFO | SEARCH | E-MAIL US
 

Home -> Community -> Usenet -> c.d.o.server -> Re: Using current_schema allows too much access

Re: Using current_schema allows too much access

From: Steve S <stevens_at_coloradocustomware.com>
Date: 19 Jun 2001 10:51:47 -0700
Message-ID: <bafba412.0106190951.10a5c26f@posting.google.com>

Thomas,
That sounds like it would work. The only issue I can see is hard coding the role password into the app. THis is an app we sell, so the site DBA would need the ability to initialize the password into the application, so it wouldnt be the same at all our sites.

Thanks, Thomas

"Thomas Olszewicki" <ThomasO_at_noSpm.cpas.com> wrote in message news:<aSyX6.87295$W02.1438093_at_news1.rdc2.on.home.com>...
> Steve,
> Simplest solution is to grant all privs to a role protected by password and
> activate this role within your app only.
> If you keep password for this role known only to selected group of DBAs and
> developers you may be safe.
> HTH
> Thomas
>
> "Steve S" <stevens_at_coloradocustomware.com> wrote in message
> news:bafba412.0106181126.1ddd6027_at_posting.google.com...
> > I am trying to change our application from a application sercurity
> > model, to indeividual database users using Oracle's security. I can
> > solve the problem of accessing the applications schema by using alter
> > session set current_schema = xxx. One side effect is users could
> > potentially access the application schema using an ad-hoc tool with
> > full rights to modify data.
> >
> > Does anyone have any ideas how to get around that?
Received on Tue Jun 19 2001 - 12:51:47 CDT

Original text of this message

HOME | ASK QUESTION | ADD INFO | SEARCH | E-MAIL US