Year: 2023

Understanding Table Types- Tables and Constraints

The Oracle database supports a vast and robust variety of table types. These various types are described in Table 7-1. Table 7-1. Oracle Table Type Descriptions This chapter focuses on the table types that are most often used: heap organized, index organized, and temporary tables. Partitioned tables are used extensively in data warehouse environments and […]

Assigning Database Object Privileges- Users and Basic Security

Database object privileges allow you to access and manipulate other users’ objects. The types of database objects to which you can grant privileges include tables, views, materialized views, sequences, packages, functions, procedures, user-defined types, directories, and now with 23c schemas. To be able to grant object privileges, one of the following must be true: •     […]

Assigning Default Permanent and Temporary Tablespaces- Users and Basic Security

Ensuring that users have a correct default permanent tablespace and temporary tablespace helps prevent issues of inadvertently filling up the SYSTEM or SYSAUX tablespaces, which could cause the database to become unavailable as well as create performance problems. The USERS tablespace is normally the default tablespace. When maintaining a database, you should verify the default […]

Understanding Schemas vs. Users- Users and Basic Security

A schema is a collection of database objects (such as tables and indexes). A user is an account to connect to the database with the username and password. Users can also own objects, which then the owner is the schema of the objects. Already discussed was how there are default schemas created to own database […]

Configuring a Centrally Managed User- Users and Basic Security

A centrally managed user is considered to be a user in one place, such as Active Directory or another LDAP service. The user can be managed for authentication and authorizations centrally, such that a user in Active Directory will have authentication managed via password or another type of key and, with the use of security […]