grant access to all object/paintings in other patterns to a user

Y at - it no and a simple way to grant access to all object/paintings in other patterns (more than one) to a system/user?
Thank you.

Tarman.

KIM

grant SELECT ANY TABLE, delete any table, insert any table to user;

The gift of this deletion, insertion TABLE ALL privilege to the user can be dangerous and the use can be misleading. Its best to create a dynamic script and then grant him.

For example, suppose you want to give inert, select, delete, update user privileges has on the user of B object.

sql> spool grants.sql

sql> select 'grant select,insert,update,delete on '||owner||'.'||table_name||' to A;' from dba_tables where owner='B';

sql>@grants.sql

HTH
Anand

Tags: Database

Similar Questions

  • Restriction of dblink need access to all objects

    Hell of all;

    I can't stop hr user, this user can access all objects in scott.
    * I want to restrict the user hr. I want to settle hr user needs access only emp1 table and any other tables.
    How can I do this?

    the user is scott
    SQL > create mvemp1 view materialized in select * from emp1.

    the user is RH

    SQL > create link1 link database to connect to scott identified by Tiger using 'orclprod ';
    Database link created.
    SQL > select DB_LINK, username user_db_links;
    DB_LINK USERNAME
    LINK1. REGRESS. RDBMS. DEV. US. ORACLE.COM SCOTT
    SQL > select count (*) in the scott.emp@link1;
    COUNT (*)
    14
    SQL > select count (*) in the scott.samp@link1;
    COUNT (*)
    100
    SQL > select count (*) in the scott.salgrade@link1;
    COUNT (*)
    5
    thanks in advance...

    969352 wrote:
    SB... sorry I didn't.

    The ONLY way to "restrict" access is not given in the first place!

    Some documents about restrictions

    If/when you ever issue any GRANT, then access is not & cannot occur.
    If/when the user has access & you want to deny access, and then REVOKE the previous GRANT.

  • Petition for grant to display all objects in the DB in the data base and discovers the DOF for each.

    Dear administrators,

    I created the user but now I have a requirement for the granting of privileges to view all objects in the DB in the data base and discovers the DOF for each.

    Any help please

    Ritz

    Thanks to advise all the

  • grant, create and drop objects on the diagram to a role/user

    Generic question for Oracle RDBMS:

    As far as I know, there is no way for the owner of a schema privileges such as create objects, or drop objects in this schema to a user or a role.

    I know that a lot of people always asked if it is possible, and I hope Oracle will provide this capability, but as far as I know, it is not possible, even in 12.1.0.2.

    Does anyone have ideas on this?

    I considered to have developers to create programs to create tables, views, packages, etc. and then grant execute on them to the users/roles, but it would be a huge amount of work.

    Did someone come up with an easier way to do this?  Or know of a way that this can be done?

    Obviously, I can not grant create any table, index, package, view, etc., or to delete any table, view, etc., and of course we grant the DBA role.

    I thought that the 'become a user"was a solution, but it is apparently far from able to do such things.

    In our case, apparently, we have users log in with account of the owner of the schema and create objects, modify objects, etc.  (Change the objects is not a problem, because we can give everything on the object to someone.)   The problem is that we need to prevent people to connect to shared group accounts (or as the owner of the schema record) to create objects, drop objects, etc.).  We all have as their own user name and will not be able to create and delete objects in patterns of selection.

    Why must everyone CREATE and DROP of objects within the framework or the processing of information on the day the day?

    I feel a serious design flaw & conversion Orace DB.

  • Create a user who has a 'standard' access to the objects in a certain pattern

    Hello
    I need to create users that can perform standard operations on any object to a schema. I mean, standard operations by SELECTING all tables TABLE or VIEW, the EXECUTION of STORED_PROCEDURES, FEATURES, UPDATE, and DELETE. That's all. I know, you say I have these PRIVILEGES. But I wonder if there is no privilege else I give or anything else I need to do besides these privileges. Thanks in advance

    I can't seem to remember any role that you can grant to "standard". You must grant these privileges to a newly created role and manage for future users.

    Aman...

  • grant access to the schema

    Some may give me a script to do the following:

    I have a scheme name ABC and I want to give a user XYZ a read access to all objects in the schema of the CBA. IE (TABLES, VIEWS. SWQUENCES etc.)

    Just to emphasize a point that maybe isn't obvious, there are two general approaches that have been discussed - dynamic generation of scripts and SQL scripts.

    Build scripts of scripting occurs when you have one (or several) SQL statements that generate many SQL instructions you have here. It must be a two step process in this case. You spool the SQL statements that you build in a file (a SQL script), and then run the SQL script, that you just created. Simply to generate the script has no effect on the database. The SQL statement that you posted would be part of a script generating approach of scripts, then you must do something like

    SQL> spool my_script_file.sql
    SQL> <>
    SQL> spool off;
    SQL> @my_script_file.sql
    

    The other approach is to use dynamic SQL statements. This is the approach of using EXECUTE IMMEDIATE in a PL/SQL block, i.e.

    BEGIN
      FOR x IN (
          SELECT *
            FROM dba_objects
           WHERE object_type IN ('TABLE', 'VIEW', 'SEQUENCE' )
             AND owner IN ('XYZ', 'PQR' )
      )
      LOOP
        EXECUTE IMMEDIATE 'grant select on ' || x.owner || '.' || x.object_name || ' to ABC';
      END LOOP;
    END;
    

    Dynamic SQL will actually affect the database - you build and run the SQL statements in a single step. This eliminates the need of the coil of the output of the SQL statement in a file, and then run this script.

    Justin

  • Access to all the properties of all objects in a Subvi

    Dear all

    I need to change some properties of the objects on the front panel in an another Subvi, I don't want to do a 'reference' for each object, and then manipulate its properties in an another Subvi, I want to send some how a reference that contains information for all the subjects in the subVIand and then finally within the Subvi I decide about the objects and their properties that I'm about to manipulate.

    So far, I sent the reference to "ThisVI" in my Subvi and try to access "all objects []" on the Panel and then try to query all objects corresponding to my object to and then manipulate the properties I want (attached image). But the problem is that the properties are different from each specific objecton Panel and I am not as free asI was the main VI.

    For example in the attached picture, is it possible to change a Boolean value in this way?

    Thanks in advance!

    Best regards

    Afshin

    Afshin salvation,

    Yes it works also for other references like graphical waveform. If you use the constant class to more specific "strict refnum", then you get all properties for this purpose.

    Mike

  • Access grant select on all tables in a diagram to another diagram

    Hi all

    I can grant select access on the tables of a schema (SAY USER1) to another (SAY USER2) by giving him a role and in turn grant this role to another scheme as below:

    FOR x IN (SELECT * from user_tables)
    LOOP
    RUN IMMEDIATELY "SELECT WE GRANT | x.table_name | "To < < role1 > > ';
    END LOOP;

    Role1 Grant User2;

    but my question is that suppose I create another table say "TEMP_TAB" in the scheme of USER1 after the execution of the block above user2 will be able to access the table TEMP_TAB. My guess is certainly not. If I'm wrong, I want a way to grant select on a table in the schema of user1 immediately as and when it is created to User2.

    Please suggest a solution.

    Thank you and best regards,
    Vipin Kumar Rai

    993280 wrote:
    Knani,

    but in this case the User2 can choose any table in any schema. I want only USER2 for the right to select for only User1 tables.

    Thank you
    Vipin

    Oh sorry. Misinterpreted your post. What you did is the right way to do it. You must add the select role privilege whenever you create a new table. There is no "SELECT the TABLE all THE" specific to a type of data user privilege.

  • How to find all the views or other objects in the database that contains the specific table (table Employee of exodus) in the oracle database?

    I want to find all objects in the DB which contain a perticular table in a specific schema.

    If there is a question about SQL Developer functionality is simple - click on the table in the connection browser and find the "Dependencies" tab on the right

    Philippe

  • Grant access to the URI at the time of installation or execution

    Hello world

    I don't know if this is possible, but basically I want to grant access to a URI (URI Web service when executing).

    So, let said customers running our ERP system on the premise, our ERP system comes with the generic web services to access the data of the ERP.

    We want to develop a playbook application that will ask the URI of the Web Service the first time, launch the application. Now, by my understanding, without adding this URI to the access list, the app will not have permission to call any service using the XMLhttpRequest object, right?

    So, how can I add this in the file config.xml during execution? Or y at - it another way to do this?

    Thanks for your help.

    Phuong

    Hello Phuong,

    If all you want to do is to access data from an outside domain and does not allow API access to this area there is an easy trick.

    This gives access to any field.  What it won't let you do, is add WebWorks APIs in this area.  If you need to provide APIs for a domain, you must explicitly set in the config.xml file at

  • Screen reader accessibility for noninteractive objects

    I work at 8 Cp and try to do a course entirely compatible Section 508. I tested with the Window-Eyes screen reader. The screen reader can access the reading and fine TOC bar buttons, and it usually recognizes interactive elements on the screen. However, most of the time, the screen reader is not recognizing the legends or the intelligent forms with text on screen. Many slides are just text and a button transparent text to pause the screen, therefore, that I need the screen reader to read the content of the course. According to the documentation, I shouldn't copy the text in the name of accessibility for each object, although I tried in a few places without success. The accessibility feature looks so flaky. From time to time, I can get something to work, but not completely, or I can't repeat.

    I was able to get the screen reader to read the text if I remove all the interactive elements, including the reading and TOC bar. In other words, if I have a class 1-slide, Captivate accessibility works. As soon as I try to give people an option to move to the next slide with a control button or the play bar, it stops working.

    Yes, accessibility is enabled. I tried to hide the rectangle around the objects in HTML5. I tried editing both SWF and HTML5. I tried to text buttons transparent instead click on the boxes, which seemed to make a small difference. I tried different shortcuts and ensured that I never use the same shortcut twice on a single slide.

    How access a screen reader text within Captivate content? The documentation says you can access it with arrows, but it does not work. People do in the real world in order to make it accessible when the program does not work the way that the documentation says it should? I know from reading other threads that some organizations have given up and just went to provide text alternatives.

    I am open to any suggestion.

    My suggestion is that do you what others have already done.  Try to make Captivate content "fully Section 508 compliant" is not a realistic goal.

    As you noted, screen readers prefer to pay attention to the interactive objects.  If you must use interactive objects even for text objects that does not need to be buttons.  (You can set their action IT success to no Action so that they just sit and do nothing.)

    But you're still going to have problems at some point and these questions will be showstoppers.

    So, save yourself a lot of hassle and invoke the clause to exhaust all of the Section 508 and W3C accessibility documents which allows you to offer a "text alternative".  Create an accessible MS Word or PDF document that contains the same content.  You're going to do in a short time it would take you to try in VAIN to get e-learning content of Captivate to satisfy all the rules of Section 508.

    Probably NOT what you wanted to hear, but I really think someone needs to say this.

  • Grant privileges on schema objects

    Hi all

    I need all the privileges of a user on another user, any objects.
    I'm not findign exact command to do so.

    for example: x has y objects.
    z of the user should be able to select, update, delete all objects x.y.

    Any help/insight is appreciated. !

    You must grant privileges on an object-by-object basis.

    You can use a bit of dynamic SQL to automate the process (note that I'm only show the process of granting privileges on tables - you can write similar pieces of code to grant privileges on views and other types of objects as well).

    BEGIN
      FOR i IN (SELECT * FROM dba_tables where owner = 'X')
      LOOP
        EXECUTE IMMEDIATE 'grant select, update, delete on x.' || i.table_name || ' to z';
      END LOOP;
    END;
    

    If Z has no privileges granted directly, you'd probably better to create a role, granting privileges to the role and then the role to the Z. Which will facilitate in the future if you need to create another user that has the same privileges as Z.

    Justin

    Published by: Justin Cave on October 15, 2012 11:50

  • Configuration of e-mail reader XI with Gmail, 'grant access' page of Google crashes

    Hello, our company seeks to set up Adobe Reader XI (11.0.03) so that it can send PDF files directly from the application (player). On most computers, specifically: all Windows XP computers and about half of Windows 7 users, this process works very well and users are able to click on the envelope and send no problem. However, on the other half of the users of Windows 7, after being gone to Edit > Preferences > email accounts > new Gmail account > * adding the account *, e-mail is unable to be sent. After adding the account, if you go to file > Send, or on the icon of the envelope, a window for Google accounts is displayed, asking you the permissions allow Adobe to use Gmail. On Windows XP computers, it was not a problem - you could just enter the information, click on connect and then click on allow access. However, on these issues Windows 7 computers, the window that is supposed to allow you to connect by entering your user name and password for the Gmail account, simply crashes. There is not enough time to enter information, and to sign, because the window crashes almost immediately. Adobe Reader XI then arrives with a message that says "check failed...". "We have tried to solve this problem by opening a session on the accounts for users on a Windows XP computer works, but, despite the granting of access, Adobe still did not want to send all the files. In addition, we ran all programs as an administrator, as well as making the user a local administrator on the domain. None of these things worked. We have also tried to change the default browser for Internet Explorer (instead of Chrome, which has been entirely refreshed by the way), just in case where the window to connect to Gmail using Chrome, and which was somehow a problem. Switching browsers did not help. For the moment, we have told users to simply save the PDF file and then attach it manually to the emails they want, but she is very inconvienient for them to do and affects about 1/4 of the staff.

    Edit > Preferences > trust manager > change settings > custom > add host name https://mail.google.com > allow

    also works for me - although acrobat reader XI and acrobat pro

  • selection of multiple grants on the same object

    Hello

    (The following SQl code will be run on 9i, 10g and 11g database versions)

    Im trying to produce a list of the directory of the subsidies that are the same from 2 different users (but only display the details of a user grants)

    to clarify...

    lets say we have 100 directories and 2 users who have granted permissions on them, user A and user B.

    Permissions can be granted on a directory by just A user, to any user B or the same permission granted on the same directory by users A and B.

    I want to make a list that displays the details of the directories where user A and user B are granted this permission (but in the list only display the details of A user grants)

    If the following SQL code will give me all the directory permissions that are granted by user A

    Select p.table_name, p.grantee, p.owner, p.grantor, p.privilege, o.object_type
    of dba_tab_privs p
    dba_objects o inner join
    on o.object_name = p.table_name
    where o.object_type = 'DIRECTORY '.
    and p.grantor = 'USER ';

    so I want to make the same list of grants by USERA just, but only if these directories have also been granted the same permission by USERB

    any ideas on the best way to do it?

    Thank you

    882817 wrote:
    What's the advantage I have this solution on the previous?

    Well, I just introduced two solutions. Depending on the particular case compare you execution plans and choose a better. Here we have quite complex views, but I would say the analytical solution is a little bit faster:

    SQL> explain plan for
      2  select  p.table_name,
      3          p.grantee,
      4          p.owner,
      5          p.grantor,
      6          p.privilege,
      7          o.object_type
      8    from      dba_tab_privs p
      9          inner join
     10              dba_objects o
     11            on (
     12                    o.object_type = 'DIRECTORY'
     13                and
     14                    o.owner = p.owner
     15                and
     16                    o.object_name = p.table_name
     17                and
     18                    p.grantor != 'U2'
     19               )
     20    where not exists (
     21                      select  1
     22                        from  dba_tab_privs p1
     23                        where p.owner = p1.owner
     24                          and p.table_name = p1.table_name
     25                          and p.grantee = p1.grantee
     26                          and p.privilege = p1.privilege
     27                          and p1.grantor = 'U2'
     28*                    )
    SQL> /
    
    Explained.
    
    SQL> @?\rdbms\admin\utlxpls
    
    PLAN_TABLE_OUTPUT
    ------------------------------------------------------------------------------------------------------------------------------------
    Plan hash value: 1557554763
    
    ----------------------------------------------------------------------------------------------------------------------
    | Id  | Operation                            | Name                  | Rows  | Bytes |TempSpc| Cost (%CPU)| Time     |
    ----------------------------------------------------------------------------------------------------------------------
    |   0 | SELECT STATEMENT                     |                       |   494 |   131K|       |   864   (5)| 00:00:11 |
    |*  1 |  HASH JOIN                           |                       |   494 |   131K|       |   864   (5)| 00:00:11 |
    |*  2 |   TABLE ACCESS FULL                  | USER$                 |    73 |  1095 |       |     3   (0)| 00:00:01 |
    |*  3 |   HASH JOIN ANTI                     |                       |   494 |   124K|       |   861   (5)| 00:00:11 |
    |*  4 |    HASH JOIN                         |                       |   522 | 96570 |       |   681   (5)| 00:00:09 |
    |   5 |     TABLE ACCESS FULL                | USER$                 |    74 |  1110 |       |     3   (0)| 00:00:01 |
    
    PLAN_TABLE_OUTPUT
    ------------------------------------------------------------------------------------------------------------------------------------
    |*  6 |     HASH JOIN                        |                       |   522 | 88740 |       |   678   (5)| 00:00:09 |
    |   7 |      TABLE ACCESS FULL               | USER$                 |    74 |  1110 |       |     3   (0)| 00:00:01 |
    |*  8 |      HASH JOIN                       |                       | 38597 |  5842K|  1752K|   674   (5)| 00:00:09 |
    |*  9 |       HASH JOIN                      |                       | 24484 |  1458K|       |   172   (5)| 00:00:03 |
    |* 10 |        HASH JOIN                     |                       | 24221 |   685K|       |    23   (9)| 00:00:01 |
    |  11 |         INDEX FULL SCAN              | I_TABLE_PRIVILEGE_MAP |    24 |   240 |       |     1   (0)| 00:00:01 |
    |* 12 |         TABLE ACCESS FULL            | OBJAUTH$              | 24221 |   449K|       |    21   (5)| 00:00:01 |
    |  13 |        TABLE ACCESS FULL             | OBJ$                  | 52647 |  1645K|       |   147   (3)| 00:00:02 |
    |  14 |       VIEW                           | DBA_OBJECTS           | 49670 |  4559K|       |   164  (10)| 00:00:02 |
    |  15 |        UNION-ALL                     |                       |       |       |       |            |          |
    |* 16 |         FILTER                       |                       |       |       |       |            |          |
    
    PLAN_TABLE_OUTPUT
    ------------------------------------------------------------------------------------------------------------------------------------
    |* 17 |          HASH JOIN                   |                       | 52627 |  2826K|       |   162  (10)| 00:00:02 |
    |  18 |           TABLE ACCESS FULL          | USER$                 |    74 |  1110 |       |     3   (0)| 00:00:01 |
    |* 19 |           TABLE ACCESS FULL          | OBJ$                  | 52627 |  2055K|       |   158   (9)| 00:00:02 |
    |* 20 |          TABLE ACCESS BY INDEX ROWID | IND$                  |     1 |     8 |       |     2   (0)| 00:00:01 |
    |* 21 |           INDEX UNIQUE SCAN          | I_IND1                |     1 |       |       |     1   (0)| 00:00:01 |
    |* 22 |           TABLE ACCESS BY INDEX ROWID| SUM$                  |     1 |     8 |       |     1   (0)| 00:00:01 |
    |* 23 |            INDEX UNIQUE SCAN         | I_SUM$_1              |     1 |       |       |     0   (0)| 00:00:01 |
    |* 24 |         FILTER                       |                       |       |       |       |            |          |
    |* 25 |          HASH JOIN                   |                       |     9 |   513 |       |     5  (20)| 00:00:01 |
    |  26 |           INDEX FULL SCAN            | I_LINK1               |     9 |   378 |       |     1   (0)| 00:00:01 |
    |  27 |           TABLE ACCESS FULL          | USER$                 |    74 |  1110 |       |     3   (0)| 00:00:01 |
    
    PLAN_TABLE_OUTPUT
    ------------------------------------------------------------------------------------------------------------------------------------
    |  28 |    VIEW                              | VW_SQ_1               |  1530 |   109K|       |   179   (4)| 00:00:03 |
    |* 29 |     HASH JOIN                        |                       |  1530 |   158K|       |   179   (4)| 00:00:03 |
    |  30 |      TABLE ACCESS FULL               | USER$                 |    74 |  1110 |       |     3   (0)| 00:00:01 |
    |* 31 |      HASH JOIN                       |                       |  1530 |   135K|       |   176   (4)| 00:00:03 |
    |* 32 |       HASH JOIN                      |                       |  1514 | 89326 |       |    27   (8)| 00:00:01 |
    |  33 |        TABLE ACCESS FULL             | USER$                 |    74 |  1110 |       |     3   (0)| 00:00:01 |
    |* 34 |        HASH JOIN                     |                       |  1514 | 66616 |       |    24   (9)| 00:00:01 |
    |  35 |         INDEX FULL SCAN              | I_TABLE_PRIVILEGE_MAP |    24 |   240 |       |     1   (0)| 00:00:01 |
    |  36 |         NESTED LOOPS                 |                       |  1514 | 51476 |       |    22   (5)| 00:00:01 |
    |  37 |          TABLE ACCESS BY INDEX ROWID | USER$                 |     1 |    15 |       |     1   (0)| 00:00:01 |
    |* 38 |           INDEX UNIQUE SCAN          | I_USER1               |     1 |       |       |     0   (0)| 00:00:01 |
    
    PLAN_TABLE_OUTPUT
    ------------------------------------------------------------------------------------------------------------------------------------
    |* 39 |          TABLE ACCESS FULL           | OBJAUTH$              |  1514 | 28766 |       |    21   (5)| 00:00:01 |
    |  40 |       TABLE ACCESS FULL              | OBJ$                  | 52647 |  1645K|       |   147   (3)| 00:00:02 |
    ----------------------------------------------------------------------------------------------------------------------
    
    Predicate Information (identified by operation id):
    ---------------------------------------------------
    
       1 - access("OA"."GRANTOR#"="UR"."USER#")
       2 - filter("UR"."NAME"<>'U2')
       3 - access("U"."NAME"="NAME" AND "O"."NAME"="NAME" AND "UE"."NAME"="NAME" AND "TPM"."NAME"="NAME")
       4 - access("OA"."GRANTEE#"="UE"."USER#")
    
    PLAN_TABLE_OUTPUT
    ------------------------------------------------------------------------------------------------------------------------------------
       6 - access("O"."OWNER"="U"."NAME" AND "U"."USER#"="O"."OWNER#")
       8 - access("O"."OBJECT_NAME"="O"."NAME")
       9 - access("OA"."OBJ#"="O"."OBJ#")
      10 - access("OA"."PRIVILEGE#"="TPM"."PRIVILEGE")
      12 - filter("OA"."COL#" IS NULL)
      16 - filter(("O"."TYPE#"<>1 AND "O"."TYPE#"<>10 OR "O"."TYPE#"=1 AND  (SELECT 1 FROM "SYS"."IND$" "I" WHERE
                  "I"."OBJ#"=:B1 AND ("I"."TYPE#"=1 OR "I"."TYPE#"=2 OR "I"."TYPE#"=3 OR "I"."TYPE#"=4 OR "I"."TYPE#"=6 OR
                  "I"."TYPE#"=7 OR "I"."TYPE#"=9))=1) AND DECODE("O"."TYPE#",0,'NEXT
                  OBJECT',1,'INDEX',2,'TABLE',3,'CLUSTER',4,'VIEW',5,'SYNONYM',6,'SEQUENCE',7,'PROCEDURE',8,'FUNCTION',9,'PACKAG
                  E',11,'PACKAGE BODY',12,'TRIGGER',13,'TYPE',14,'TYPE BODY',19,'TABLE PARTITION',20,'INDEX
                  PARTITION',21,'LOB',22,'LIBRARY',23,'DIRECTORY',24,'QUEUE',28,'JAVA SOURCE',29,'JAVA CLASS',30,'JAVA
    
    PLAN_TABLE_OUTPUT
    ------------------------------------------------------------------------------------------------------------------------------------
                  RESOURCE',32,'INDEXTYPE',33,'OPERATOR',34,'TABLE SUBPARTITION',35,'INDEX SUBPARTITION',40,'LOB
                  PARTITION',41,'LOB SUBPARTITION',42,NVL( (SELECT DISTINCT 'REWRITE EQUIVALENCE' FROM SYS."SUM$" "S" WHERE
                  "S"."OBJ#"=:B2 AND BITAND("S"."XPFLAGS",8388608)=8388608),'MATERIALIZED
                  VIEW'),43,'DIMENSION',44,'CONTEXT',46,'RULE SET',47,'RESOURCE PLAN',48,'CONSUMER
                  GROUP',51,'SUBSCRIPTION',52,'LOCATION',55,'XML SCHEMA',56,'JAVA DATA',57,'SECURITY
                  PROFILE',59,'RULE',60,'CAPTURE',61,'APPLY',62,'EVALUATION CONTEXT',66,'JOB',67,'PROGRAM',68,'JOB
                  CLASS',69,'WINDOW',72,'WINDOW GROUP',74,'SCHEDULE',79,'CHAIN',81,'FILE GROUP','UNDEFINED')='DIRECTORY')
      17 - access("O"."OWNER#"="U"."USER#")
      19 - filter("O"."LINKNAME" IS NULL AND "O"."NAME"<>'_NEXT_OBJECT' AND
                  "O"."NAME"<>'_default_auditing_options_' AND BITAND("O"."FLAGS",128)=0)
      20 - filter("I"."TYPE#"=1 OR "I"."TYPE#"=2 OR "I"."TYPE#"=3 OR "I"."TYPE#"=4 OR "I"."TYPE#"=6 OR
    
    PLAN_TABLE_OUTPUT
    ------------------------------------------------------------------------------------------------------------------------------------
                  "I"."TYPE#"=7 OR "I"."TYPE#"=9)
      21 - access("I"."OBJ#"=:B1)
      22 - filter(BITAND("S"."XPFLAGS",8388608)=8388608)
      23 - access("S"."OBJ#"=:B1)
      24 - filter(NULL IS NOT NULL)
      25 - access("L"."OWNER#"="U"."USER#")
      29 - access("U"."USER#"="O"."OWNER#")
      31 - access("OA"."OBJ#"="O"."OBJ#")
      32 - access("OA"."GRANTEE#"="UE"."USER#")
      34 - access("OA"."PRIVILEGE#"="TPM"."PRIVILEGE")
      38 - access("UR"."NAME"='U2')
    
    PLAN_TABLE_OUTPUT
    ------------------------------------------------------------------------------------------------------------------------------------
      39 - filter("OA"."COL#" IS NULL AND "OA"."GRANTOR#"="UR"."USER#")
    
    89 rows selected.
    
    SQL> explain plan for
      2  select  table_name,
      3          grantee,
      4          owner,
      5          grantor,
      6          privilege,
      7          object_type
      8    from  (
      9           select  p.table_name,
     10                   p.grantee,
     11                   p.owner,
     12                   p.grantor,
     13                   p.privilege,
     14                   o.object_type,
     15                   count(case when p.grantor != 'U2' then 1 end) over(partition by p.table_name,p.grantee,p.owner,p.privilege) u2_indicator
     16             from      dba_tab_privs p
     17                   inner join
     18                       dba_objects o
     19                     on (
     20                             o.object_type = 'DIRECTORY'
     21                         and
     22                             o.owner = p.owner
     23                         and
     24                             o.object_name = p.table_name
     25                        )
     26          )
     27    where u2_indicator = 1
     28  / 
    
    Explained.
    
    SQL>
    SQL>
    SQL> @?\rdbms\admin\utlxpls
    
    PLAN_TABLE_OUTPUT
    ------------------------------------------------------------------------------------------------------------------------------------
    Plan hash value: 1974693759
    
    ------------------------------------------------------------------------------------------------------------------------
    | Id  | Operation                              | Name                  | Rows  | Bytes |TempSpc| Cost (%CPU)| Time     |
    ------------------------------------------------------------------------------------------------------------------------
    |   0 | SELECT STATEMENT                       |                       |   522 | 59508 |       |   674   (5)| 00:00:09 |
    |*  1 |  VIEW                                  |                       |   522 | 59508 |       |   674   (5)| 00:00:09 |
    |   2 |   WINDOW SORT                          |                       |   522 |   101K|       |   674   (5)| 00:00:09 |
    |*  3 |    HASH JOIN                           |                       |   522 |   101K|       |   673   (5)| 00:00:09 |
    |   4 |     TABLE ACCESS FULL                  | USER$                 |    74 |  1110 |       |     3   (0)| 00:00:01 |
    |*  5 |     HASH JOIN                          |                       |   522 | 96570 |       |   670   (5)| 00:00:09 |
    
    PLAN_TABLE_OUTPUT
    ------------------------------------------------------------------------------------------------------------------------------------
    |   6 |      TABLE ACCESS FULL                 | USER$                 |    74 |  1110 |       |     3   (0)| 00:00:01 |
    |*  7 |      HASH JOIN                         |                       |   522 | 88740 |       |   666   (5)| 00:00:08 |
    |   8 |       INDEX FULL SCAN                  | I_TABLE_PRIVILEGE_MAP |    24 |   240 |       |     1   (0)| 00:00:01 |
    |*  9 |       HASH JOIN                        |                       |   522 | 83520 |       |   665   (5)| 00:00:08 |
    |  10 |        TABLE ACCESS FULL               | USER$                 |    74 |  1110 |       |     3   (0)| 00:00:01 |
    |* 11 |        HASH JOIN                       |                       | 38597 |  5465K|  1512K|   661   (4)| 00:00:08 |
    |* 12 |         HASH JOIN                      |                       | 24484 |  1219K|       |   170   (4)| 00:00:03 |
    |* 13 |          TABLE ACCESS FULL             | OBJAUTH$              | 24221 |   449K|       |    21   (5)| 00:00:01 |
    |  14 |          TABLE ACCESS FULL             | OBJ$                  | 52647 |  1645K|       |   147   (3)| 00:00:02 |
    |  15 |         VIEW                           | DBA_OBJECTS           | 49670 |  4559K|       |   164  (10)| 00:00:02 |
    |  16 |          UNION-ALL                     |                       |       |       |       |            |          |
    
    PLAN_TABLE_OUTPUT
    ------------------------------------------------------------------------------------------------------------------------------------
    |* 17 |           FILTER                       |                       |       |       |       |            |          |
    |* 18 |            HASH JOIN                   |                       | 52627 |  2826K|       |   162  (10)| 00:00:02 |
    |  19 |             TABLE ACCESS FULL          | USER$                 |    74 |  1110 |       |     3   (0)| 00:00:01 |
    |* 20 |             TABLE ACCESS FULL          | OBJ$                  | 52627 |  2055K|       |   158   (9)| 00:00:02 |
    |* 21 |            TABLE ACCESS BY INDEX ROWID | IND$                  |     1 |     8 |       |     2   (0)| 00:00:01 |
    |* 22 |             INDEX UNIQUE SCAN          | I_IND1                |     1 |       |       |     1   (0)| 00:00:01 |
    |* 23 |             TABLE ACCESS BY INDEX ROWID| SUM$                  |     1 |     8 |       |     1   (0)| 00:00:01 |
    |* 24 |              INDEX UNIQUE SCAN         | I_SUM$_1              |     1 |       |       |     0   (0)| 00:00:01 |
    |* 25 |           FILTER                       |                       |       |       |       |            |          |
    |* 26 |            HASH JOIN                   |                       |     9 |   513 |       |     5  (20)| 00:00:01 |
    |  27 |             INDEX FULL SCAN            | I_LINK1               |     9 |   378 |       |     1   (0)| 00:00:01 |
    
    PLAN_TABLE_OUTPUT
    ------------------------------------------------------------------------------------------------------------------------------------
    |  28 |             TABLE ACCESS FULL          | USER$                 |    74 |  1110 |       |     3   (0)| 00:00:01 |
    ------------------------------------------------------------------------------------------------------------------------
    
    Predicate Information (identified by operation id):
    ---------------------------------------------------
    
       1 - filter("U2_INDICATOR"=1)
       3 - access("OA"."GRANTEE#"="UE"."USER#")
       5 - access("OA"."GRANTOR#"="UR"."USER#")
       7 - access("OA"."PRIVILEGE#"="TPM"."PRIVILEGE")
       9 - access("O"."OWNER"="U"."NAME" AND "U"."USER#"="O"."OWNER#")
    
    PLAN_TABLE_OUTPUT
    ------------------------------------------------------------------------------------------------------------------------------------
      11 - access("O"."OBJECT_NAME"="O"."NAME")
      12 - access("OA"."OBJ#"="O"."OBJ#")
      13 - filter("OA"."COL#" IS NULL)
      17 - filter(("O"."TYPE#"<>1 AND "O"."TYPE#"<>10 OR "O"."TYPE#"=1 AND  (SELECT 1 FROM "SYS"."IND$" "I" WHERE
                  "I"."OBJ#"=:B1 AND ("I"."TYPE#"=1 OR "I"."TYPE#"=2 OR "I"."TYPE#"=3 OR "I"."TYPE#"=4 OR "I"."TYPE#"=6 OR
                  "I"."TYPE#"=7 OR "I"."TYPE#"=9))=1) AND DECODE("O"."TYPE#",0,'NEXT
                  OBJECT',1,'INDEX',2,'TABLE',3,'CLUSTER',4,'VIEW',5,'SYNONYM',6,'SEQUENCE',7,'PROCEDURE',8,'FUNCTION',9,'PACKAGE'
                  ,11,'PACKAGE BODY',12,'TRIGGER',13,'TYPE',14,'TYPE BODY',19,'TABLE PARTITION',20,'INDEX
                  PARTITION',21,'LOB',22,'LIBRARY',23,'DIRECTORY',24,'QUEUE',28,'JAVA SOURCE',29,'JAVA CLASS',30,'JAVA
                  RESOURCE',32,'INDEXTYPE',33,'OPERATOR',34,'TABLE SUBPARTITION',35,'INDEX SUBPARTITION',40,'LOB
                  PARTITION',41,'LOB SUBPARTITION',42,NVL( (SELECT DISTINCT 'REWRITE EQUIVALENCE' FROM SYS."SUM$" "S" WHERE
    
    PLAN_TABLE_OUTPUT
    ------------------------------------------------------------------------------------------------------------------------------------
                  "S"."OBJ#"=:B2 AND BITAND("S"."XPFLAGS",8388608)=8388608),'MATERIALIZED
                  VIEW'),43,'DIMENSION',44,'CONTEXT',46,'RULE SET',47,'RESOURCE PLAN',48,'CONSUMER
                  GROUP',51,'SUBSCRIPTION',52,'LOCATION',55,'XML SCHEMA',56,'JAVA DATA',57,'SECURITY
                  PROFILE',59,'RULE',60,'CAPTURE',61,'APPLY',62,'EVALUATION CONTEXT',66,'JOB',67,'PROGRAM',68,'JOB
                  CLASS',69,'WINDOW',72,'WINDOW GROUP',74,'SCHEDULE',79,'CHAIN',81,'FILE GROUP','UNDEFINED')='DIRECTORY')
      18 - access("O"."OWNER#"="U"."USER#")
      20 - filter("O"."LINKNAME" IS NULL AND "O"."NAME"<>'_NEXT_OBJECT' AND
                  "O"."NAME"<>'_default_auditing_options_' AND BITAND("O"."FLAGS",128)=0)
      21 - filter("I"."TYPE#"=1 OR "I"."TYPE#"=2 OR "I"."TYPE#"=3 OR "I"."TYPE#"=4 OR "I"."TYPE#"=6 OR
                  "I"."TYPE#"=7 OR "I"."TYPE#"=9)
      22 - access("I"."OBJ#"=:B1)
    
    PLAN_TABLE_OUTPUT
    ------------------------------------------------------------------------------------------------------------------------------------
      23 - filter(BITAND("S"."XPFLAGS",8388608)=8388608)
      24 - access("S"."OBJ#"=:B1)
      25 - filter(NULL IS NOT NULL)
      26 - access("L"."OWNER#"="U"."USER#")
    
    70 rows selected.
    
    SQL> 
    

    SY.

  • How to give the right to select for all objects of schema?

    Hello

    We have a lot of users and schemas.
    A user wants to execute 'select' for all tables in the other schema.

    For example: TEST user wishes to select the objects to TEST2. Test2 have hundreds of tables, TEST user cannot select other schema objects, so I don't want to give SELECT ANY TABLE privileges.

    How can do this at once? is it possible to give all the objects schema once subsidies?
    DB versin. 9.2.0.8

    greetings and thanks

    No, there are no subsidies. You must use hundreds of statements of grant.

    However, you can use dynamic SQL to do this automatically, i.e.

    CREATE ROLE test2_select;
    
    BEGIN
      FOR x IN (SELECT * FROM dba_tables WHERE owner='TEST2')
      LOOP
        EXECUTE IMMEDIATE 'GRANT SELECT ON test2.' || x.table_name || ' TO test2_select';
      END LOOP;
    END:
    /
    
    GRANT test2_select TO test;
    

    Justin

Maybe you are looking for

  • iMac continues to be frozen as claimed by other users

    I saw that many users have the same problem with my friends, the computer crashes randomly and the only thing that works is the arrow on the pointer on the screen, but I'm not able to do nothing to restart the system. In the past, it was a victim, fo

  • all my mail is dumping and not even saveing

    I don't know why but with yahoo, my mail is draining how to stop it?

  • Can not burn cd or dvd on

    I have xp with cd and dvd, I can play, but cannot burn. It dosnt recognize my disk in the drive. He said: "Please insert a disc into drive D or E's Word accessible-incorrect function."

  • Problem while listening to Radio FM

    Hello I can't listen to the radio while I work with it, but when I turn it on "stand by mode" begin to hear. I already read the settings and I can't change it. The radio worked well, I Don t know what is happening. Thanks for the help!

  • Dell Inspiron 15 n5040 drivers

    Hello. I need a driver for Dell Inspiron 15 N5040 Bluetooth. I can't find one to the Dell Web site, drivers and downloads section leads to the manuals and technical information to laptop. Am I missing something?