Category: Dropping Users

Making Read-Only Tables- Tables and Constraints

You can place individual tables in read-only mode. Doing so prevents any INSERT, UPDATE, or DELETE statements from running against a table. An alternate way to do this is to make the tablespace read-only and use this tablespace for the tables that are static for read-only.There are several reasons why you may require the read-only […]

Date/Time- Tables and Constraints

When capturing and reporting on date-related information, you should always use a DATE or TIMESTAMP data type and not VARCHAR2. Using the correct date-related data type allows you to perform accurate Oracle date calculations and aggregations and dependable sorting for reporting. If you use a VARCHAR2 for a field that contains date information, you are […]

Assigning Default Permanent and Temporary Tablespaces- Users and Basic Security

Ensuring that users have a correct default permanent tablespace and temporary tablespace helps prevent issues of inadvertently filling up the SYSTEM or SYSAUX tablespaces, which could cause the database to become unavailable as well as create performance problems. The USERS tablespace is normally the default tablespace. When maintaining a database, you should verify the default […]

Understanding Schemas vs. Users- Users and Basic Security

A schema is a collection of database objects (such as tables and indexes). A user is an account to connect to the database with the username and password. Users can also own objects, which then the owner is the schema of the objects. Already discussed was how there are default schemas created to own database […]

Configuring a Centrally Managed User- Users and Basic Security

A centrally managed user is considered to be a user in one place, such as Active Directory or another LDAP service. The user can be managed for authentication and authorizations centrally, such that a user in Active Directory will have authentication managed via password or another type of key and, with the use of security […]

Creating a User with Database Authentication- Users and Basic Security

Database authentication is established with the CREATE USER SQL statement. Creating users as a DBA, your account must have the CREATE USER system privilege. This example creates a user named HSOLO with the password W3lcomeHere123 and assigns the default permanent tablespace USERS, default temporary tablespace TEMP, and unlimited space quota on the USERS tablespace: This […]

Enabling Archivelog Mode- Managing Control Files, Online Redo Logs,and Archivelogs

After you have set the location for your archive redo log files, you can enable it as SYS with the following: You can confirm archivelog mode with this query: You can also confirm it as follows:  Disabling Archivelog Mode Usually, you don’t disable archivelog mode for a production database. However, there might be a reason […]

Setting the Archive Redo File Locations- Managing Control Files, Online Redo Logs,and Archivelogs

Before you set your database mode to archiving, you should specifically instruct Oracle where you want the archive redo logs to be placed. You can set the archive redo log file destination with the following techniques: •     Set the LOG_ARCHIVE_DEST_N database initialization parameter. •     Implement FRA. These two approaches are discussed in detail in the […]