Security Roles   «Prev  Next»

Simplify Security using Roles Conclusion

Roles are a powerful feature of the Oracle database that make implementing security schemes much easier. In this module, you learned to:
  1. Define a role
  2. Create a role
  3. Grant privileges to a role and a role to a user
  4. Grant default and non-default roles
  5. Create password-protected roles
  6. Allow users to administer a role
  7. Examine why roles don’t affect stored code
  8. List privileges granted to a role
  9. List roles granted to a user
  10. Drop a role from the database
Through the use of roles, and a good security scheme design, you can properly limit access to database objects and system privileges.


In this module, you learned the following glossary terms:
  1. Early-Bound: When a value is resolved at compile time, it is called early-bound.
  2. Late-Bound','When a value is resolved at runtime, it is called late-bound.
  3. 'Role: A collection of privileges that can be assigned together.
The next module is about creating and managing stored code.

Role Information Deletion - Quiz

Click the Quiz link below to answer a few questions about role information and deletion. Role Information Deletion - Quiz