SlideShare une entreprise Scribd logo
1  sur  20
Controlling User Access  http://ecomputernotes.com
Objectives  After completing this lesson, you should be able to  do the following:  "  Create users  "C reate roles to ease setup and maintenance of the  security model  "  Use the   GRANT   and   REVOKE   statements to grant and revoke object privileges  "C reate and access database links  http://ecomputernotes.com
Controlling User Access  Database  administrator  Username and password  Privileges  Users  http://ecomputernotes.com
Privileges  "  Database security:  System security  Data security  "  System privileges: Gaining access to the database  "  Object privileges: Manipulating the content of the  database objects  "S chemas: Collections of objects, such as tables,  views, and sequences  http://ecomputernotes.com
System Privileges  "  More than 100 privileges are available.  "  The database administrator has high-level system  privileges for tasks such as:  Creating new users  Removing users Removing tables Backing up tables  http://ecomputernotes.com
Creating Users  The DBA creates users by using the   CREATE USER  statement.  CREATE USER   user  IDENTIFIED BY  password ;  CREATE USER  scott  IDENTIFIED BY  tiger;  User created.  http://ecomputernotes.com
User System Privileges  "  Once a user is created, the DBA can grant specific  system privileges to a user.  GRANT   privilege  [,  privilege ...]  TO   user  [,  user| role, PUBLIC ...];  "  An application developer, for example, may have  the following system privileges:  ±  CREATE SESSION  ±  CREATE TABLE  ±  CREATE SEQUENCE  ±  CREATE VIEW  ±  CREATE PROCEDURE  http://ecomputernotes.com
Granting System Privileges  The DBA can grant a user specific system privileges.  GRANT  create session, create table,  create sequence, create view TO  scott;  Grant succeeded.  http://ecomputernotes.com
What is a Role?  Users  Manager  Privileges  Allocating privileges  Allocating privileges  without a role  with a role  http://ecomputernotes.com
Creating and Granting Privileges to a Role  "  Create a role  CREATE ROLE manager;  Role created.  "G rant privileges to a role  GRANT create table, create view  TO manager;  Grant succeeded.  "G rant a role to users  GRANT manager TO DEHAAN, KOCHHAR;  GrantGrant succeeded.  http://ecomputernotes.com
Changing Your Password  "T he DBA creates your user account and initializes  your password.  "Y ou can change your password by using the  ALTER USER   statement.  ALTER USER scott  IDENTIFIED BY lion; User altered.  http://ecomputernotes.com
Object Privileges  Object  Privilege  Table  View  Sequence Procedure  ALTER         DELETE          EXECUTE         INDEX          INSERT         REFERENCES        SELECT       UPDATE    http://ecomputernotes.com
Object Privileges  "  Object privileges vary from object to object.  "  An owner has all the privileges on the object.  "  An owner can give specific privileges on that  owner¶s object.  GRANT  object_priv  [( columns )]  ON  objec t  TO  { user | role |PUBLIC}  http://ecomputernotes.com
Granting Object Privileges  "  Grant query privileges on the   EMPLOYEES   table.  GRANT  select  ON  employees  TO  sue, rich;  Grant succeeded.  "G rant privileges to update specific columns to  users and roles.  GRANT  update (department_name, location_id) ON  departments  TO  scott, manager; Grant succeeded.  http://ecomputernotes.com
Using the   WITH GRANT OPTION   and   PUBLIC Keywords  "G ive a user authority to pass along privileges.  GRANT  select, insert  ON  departments TO  scott  WITH  GRANT OPTION;  Grant succeeded.  "A llow all users on the system to query data from  Alice¶s   DEPARTMENTS   table.  GRANT  select  ON  alice.departments  TO  PUBLIC;  Grant succeeded.  http://ecomputernotes.com
Confirming Privileges Granted  ata Dictionary View  Description  OLE_SYS_PRIVS  System privileges granted to roles  OLE_TAB_PRIVS  Table privileges granted to roles  SER_ROLE_PRIVS  Roles accessible by the user  SER_TAB_PRIVS_MADE  Object privileges granted on the  user¶s objects  SER_TAB_PRIVS_RECD  Object privileges granted to the  user  SER_COL_PRIVS_MADE  Object privileges granted on the  columns of the user¶s objects  SER_COL_PRIVS_RECD  Object privileges granted to the  user on specific columns  SER_SYS_PRIVS  Lists system privileges granted to  the user  http://ecomputernotes.com
How to Revoke Object Privileges  "  You use the   REVOKE   statement to revoke privileges granted to other users.  "P rivileges granted to others through the  W ITH  GRANT OPTION   clause are also revoked.  REVOKE {privilege [, privilege...]|ALL}  ON  object  FROM  {user[, user...]|role|PUBLIC} [CASCADE CONSTRAINTS];  http://ecomputernotes.com
Revoking Object Privileges  As user Alice, revoke the   SELECT   and   INSERT privileges given to user Scott on the   DEPARTMENTS  table.  REVOKE  select, insert  ON  departments  FROM  scott;  Revoke succeeded.  http://ecomputernotes.com
Database Links  A database link connection allows local users to  access data on a remote database.  Local  Remote  EMP   Table  SELECT * FROM  HQ _ACME.COM  emp@HQ_ACME.COM;  database
Database Links  "C reate the database link.  CREATE PUBLIC DATABASE LINK hq.acme.com USING 'sales';  Database link created.  "W rite SQL statements that use the database link.  SELECT *  FROM emp@HQ.ACME.COM;

Contenu connexe

Similaire à e computer notes - Controlling user access

Clase 18 privilegios modificada
Clase 18 privilegios   modificadaClase 18 privilegios   modificada
Clase 18 privilegios modificada
Titiushko Jazz
 
Clase 18 privilegios modificada
Clase 18 privilegios   modificadaClase 18 privilegios   modificada
Clase 18 privilegios modificada
Titiushko Jazz
 
Security in Relational model
Security in Relational modelSecurity in Relational model
Security in Relational model
Slideshare
 
Wellrailed - Be9's Acl9
Wellrailed - Be9's Acl9Wellrailed - Be9's Acl9
Wellrailed - Be9's Acl9
breccan
 
Cis407 a ilab 6 web application development devry university
Cis407 a ilab 6 web application development devry universityCis407 a ilab 6 web application development devry university
Cis407 a ilab 6 web application development devry university
lhkslkdh89009
 

Similaire à e computer notes - Controlling user access (20)

Les13
Les13Les13
Les13
 
Les01
Les01Les01
Les01
 
Les14
Les14Les14
Les14
 
Controlling User Access -Data base
Controlling User Access -Data baseControlling User Access -Data base
Controlling User Access -Data base
 
Less07 Users
Less07 UsersLess07 Users
Less07 Users
 
Clase 18 privilegios modificada
Clase 18 privilegios   modificadaClase 18 privilegios   modificada
Clase 18 privilegios modificada
 
Clase 18 privilegios modificada
Clase 18 privilegios   modificadaClase 18 privilegios   modificada
Clase 18 privilegios modificada
 
Security in Relational model
Security in Relational modelSecurity in Relational model
Security in Relational model
 
Security in ORACLE RDBMS
Security in ORACLE RDBMSSecurity in ORACLE RDBMS
Security in ORACLE RDBMS
 
Oracle Database
Oracle DatabaseOracle Database
Oracle Database
 
Db pre
Db preDb pre
Db pre
 
Chapter 6 Database Security and Authorization (4).pdf
Chapter 6 Database Security and Authorization (4).pdfChapter 6 Database Security and Authorization (4).pdf
Chapter 6 Database Security and Authorization (4).pdf
 
Global Azure Bootcamp 2018 - Oh no my organization went Azure
Global Azure Bootcamp 2018 - Oh no my organization went AzureGlobal Azure Bootcamp 2018 - Oh no my organization went Azure
Global Azure Bootcamp 2018 - Oh no my organization went Azure
 
Mysqldbatrainingsession12privilegesinmysql 170302152348
Mysqldbatrainingsession12privilegesinmysql 170302152348Mysqldbatrainingsession12privilegesinmysql 170302152348
Mysqldbatrainingsession12privilegesinmysql 170302152348
 
Write the query for creating the users exp 11
Write the query for creating the users exp 11Write the query for creating the users exp 11
Write the query for creating the users exp 11
 
Wellrailed - Be9's Acl9
Wellrailed - Be9's Acl9Wellrailed - Be9's Acl9
Wellrailed - Be9's Acl9
 
Cis407 a ilab 6 web application development devry university
Cis407 a ilab 6 web application development devry universityCis407 a ilab 6 web application development devry university
Cis407 a ilab 6 web application development devry university
 
359555069 aae-control room-usermanual
359555069 aae-control room-usermanual359555069 aae-control room-usermanual
359555069 aae-control room-usermanual
 
Tableau powerpoint
Tableau powerpointTableau powerpoint
Tableau powerpoint
 
Database administration commands
Database administration commands Database administration commands
Database administration commands
 

Plus de ecomputernotes

computer notes - Data Structures - 30
computer notes - Data Structures - 30computer notes - Data Structures - 30
computer notes - Data Structures - 30
ecomputernotes
 
computer notes - Data Structures - 39
computer notes - Data Structures - 39computer notes - Data Structures - 39
computer notes - Data Structures - 39
ecomputernotes
 
computer notes - Data Structures - 11
computer notes - Data Structures - 11computer notes - Data Structures - 11
computer notes - Data Structures - 11
ecomputernotes
 
computer notes - Data Structures - 20
computer notes - Data Structures - 20computer notes - Data Structures - 20
computer notes - Data Structures - 20
ecomputernotes
 
computer notes - Data Structures - 15
computer notes - Data Structures - 15computer notes - Data Structures - 15
computer notes - Data Structures - 15
ecomputernotes
 
Computer notes - Date time Functions
Computer notes - Date time FunctionsComputer notes - Date time Functions
Computer notes - Date time Functions
ecomputernotes
 
Computer notes - Subqueries
Computer notes - SubqueriesComputer notes - Subqueries
Computer notes - Subqueries
ecomputernotes
 
Computer notes - Other Database Objects
Computer notes - Other Database ObjectsComputer notes - Other Database Objects
Computer notes - Other Database Objects
ecomputernotes
 
computer notes - Data Structures - 28
computer notes - Data Structures - 28computer notes - Data Structures - 28
computer notes - Data Structures - 28
ecomputernotes
 
computer notes - Data Structures - 19
computer notes - Data Structures - 19computer notes - Data Structures - 19
computer notes - Data Structures - 19
ecomputernotes
 
computer notes - Data Structures - 31
computer notes - Data Structures - 31computer notes - Data Structures - 31
computer notes - Data Structures - 31
ecomputernotes
 
computer notes - Data Structures - 4
computer notes - Data Structures - 4computer notes - Data Structures - 4
computer notes - Data Structures - 4
ecomputernotes
 
computer notes - Data Structures - 13
computer notes - Data Structures - 13computer notes - Data Structures - 13
computer notes - Data Structures - 13
ecomputernotes
 
Computer notes - Advanced Subqueries
Computer notes -   Advanced SubqueriesComputer notes -   Advanced Subqueries
Computer notes - Advanced Subqueries
ecomputernotes
 
Computer notes - Aggregating Data Using Group Functions
Computer notes - Aggregating Data Using Group FunctionsComputer notes - Aggregating Data Using Group Functions
Computer notes - Aggregating Data Using Group Functions
ecomputernotes
 
computer notes - Data Structures - 16
computer notes - Data Structures - 16computer notes - Data Structures - 16
computer notes - Data Structures - 16
ecomputernotes
 
computer notes - Data Structures - 22
computer notes - Data Structures - 22computer notes - Data Structures - 22
computer notes - Data Structures - 22
ecomputernotes
 
computer notes - Data Structures - 35
computer notes - Data Structures - 35computer notes - Data Structures - 35
computer notes - Data Structures - 35
ecomputernotes
 
computer notes - Data Structures - 36
computer notes - Data Structures - 36computer notes - Data Structures - 36
computer notes - Data Structures - 36
ecomputernotes
 
Computer notes - Enhancements to the GROUP BY Clause
Computer notes - Enhancements to the GROUP BY ClauseComputer notes - Enhancements to the GROUP BY Clause
Computer notes - Enhancements to the GROUP BY Clause
ecomputernotes
 

Plus de ecomputernotes (20)

computer notes - Data Structures - 30
computer notes - Data Structures - 30computer notes - Data Structures - 30
computer notes - Data Structures - 30
 
computer notes - Data Structures - 39
computer notes - Data Structures - 39computer notes - Data Structures - 39
computer notes - Data Structures - 39
 
computer notes - Data Structures - 11
computer notes - Data Structures - 11computer notes - Data Structures - 11
computer notes - Data Structures - 11
 
computer notes - Data Structures - 20
computer notes - Data Structures - 20computer notes - Data Structures - 20
computer notes - Data Structures - 20
 
computer notes - Data Structures - 15
computer notes - Data Structures - 15computer notes - Data Structures - 15
computer notes - Data Structures - 15
 
Computer notes - Date time Functions
Computer notes - Date time FunctionsComputer notes - Date time Functions
Computer notes - Date time Functions
 
Computer notes - Subqueries
Computer notes - SubqueriesComputer notes - Subqueries
Computer notes - Subqueries
 
Computer notes - Other Database Objects
Computer notes - Other Database ObjectsComputer notes - Other Database Objects
Computer notes - Other Database Objects
 
computer notes - Data Structures - 28
computer notes - Data Structures - 28computer notes - Data Structures - 28
computer notes - Data Structures - 28
 
computer notes - Data Structures - 19
computer notes - Data Structures - 19computer notes - Data Structures - 19
computer notes - Data Structures - 19
 
computer notes - Data Structures - 31
computer notes - Data Structures - 31computer notes - Data Structures - 31
computer notes - Data Structures - 31
 
computer notes - Data Structures - 4
computer notes - Data Structures - 4computer notes - Data Structures - 4
computer notes - Data Structures - 4
 
computer notes - Data Structures - 13
computer notes - Data Structures - 13computer notes - Data Structures - 13
computer notes - Data Structures - 13
 
Computer notes - Advanced Subqueries
Computer notes -   Advanced SubqueriesComputer notes -   Advanced Subqueries
Computer notes - Advanced Subqueries
 
Computer notes - Aggregating Data Using Group Functions
Computer notes - Aggregating Data Using Group FunctionsComputer notes - Aggregating Data Using Group Functions
Computer notes - Aggregating Data Using Group Functions
 
computer notes - Data Structures - 16
computer notes - Data Structures - 16computer notes - Data Structures - 16
computer notes - Data Structures - 16
 
computer notes - Data Structures - 22
computer notes - Data Structures - 22computer notes - Data Structures - 22
computer notes - Data Structures - 22
 
computer notes - Data Structures - 35
computer notes - Data Structures - 35computer notes - Data Structures - 35
computer notes - Data Structures - 35
 
computer notes - Data Structures - 36
computer notes - Data Structures - 36computer notes - Data Structures - 36
computer notes - Data Structures - 36
 
Computer notes - Enhancements to the GROUP BY Clause
Computer notes - Enhancements to the GROUP BY ClauseComputer notes - Enhancements to the GROUP BY Clause
Computer notes - Enhancements to the GROUP BY Clause
 

Dernier

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Dernier (20)

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 

e computer notes - Controlling user access

  • 1. Controlling User Access http://ecomputernotes.com
  • 2. Objectives After completing this lesson, you should be able to do the following: " Create users "C reate roles to ease setup and maintenance of the security model " Use the GRANT and REVOKE statements to grant and revoke object privileges "C reate and access database links http://ecomputernotes.com
  • 3. Controlling User Access Database administrator Username and password Privileges Users http://ecomputernotes.com
  • 4. Privileges " Database security: System security Data security " System privileges: Gaining access to the database " Object privileges: Manipulating the content of the database objects "S chemas: Collections of objects, such as tables, views, and sequences http://ecomputernotes.com
  • 5. System Privileges " More than 100 privileges are available. " The database administrator has high-level system privileges for tasks such as: Creating new users Removing users Removing tables Backing up tables http://ecomputernotes.com
  • 6. Creating Users The DBA creates users by using the CREATE USER statement. CREATE USER user IDENTIFIED BY password ; CREATE USER scott IDENTIFIED BY tiger; User created. http://ecomputernotes.com
  • 7. User System Privileges " Once a user is created, the DBA can grant specific system privileges to a user. GRANT privilege [, privilege ...] TO user [, user| role, PUBLIC ...]; " An application developer, for example, may have the following system privileges: ± CREATE SESSION ± CREATE TABLE ± CREATE SEQUENCE ± CREATE VIEW ± CREATE PROCEDURE http://ecomputernotes.com
  • 8. Granting System Privileges The DBA can grant a user specific system privileges. GRANT create session, create table, create sequence, create view TO scott; Grant succeeded. http://ecomputernotes.com
  • 9. What is a Role? Users Manager Privileges Allocating privileges Allocating privileges without a role with a role http://ecomputernotes.com
  • 10. Creating and Granting Privileges to a Role " Create a role CREATE ROLE manager; Role created. "G rant privileges to a role GRANT create table, create view TO manager; Grant succeeded. "G rant a role to users GRANT manager TO DEHAAN, KOCHHAR; GrantGrant succeeded. http://ecomputernotes.com
  • 11. Changing Your Password "T he DBA creates your user account and initializes your password. "Y ou can change your password by using the ALTER USER statement. ALTER USER scott IDENTIFIED BY lion; User altered. http://ecomputernotes.com
  • 12. Object Privileges Object Privilege Table View Sequence Procedure ALTER        DELETE          EXECUTE        INDEX         INSERT        REFERENCES       SELECT      UPDATE   http://ecomputernotes.com
  • 13. Object Privileges " Object privileges vary from object to object. " An owner has all the privileges on the object. " An owner can give specific privileges on that owner¶s object. GRANT object_priv [( columns )] ON objec t TO { user | role |PUBLIC} http://ecomputernotes.com
  • 14. Granting Object Privileges " Grant query privileges on the EMPLOYEES table. GRANT select ON employees TO sue, rich; Grant succeeded. "G rant privileges to update specific columns to users and roles. GRANT update (department_name, location_id) ON departments TO scott, manager; Grant succeeded. http://ecomputernotes.com
  • 15. Using the WITH GRANT OPTION and PUBLIC Keywords "G ive a user authority to pass along privileges. GRANT select, insert ON departments TO scott WITH GRANT OPTION; Grant succeeded. "A llow all users on the system to query data from Alice¶s DEPARTMENTS table. GRANT select ON alice.departments TO PUBLIC; Grant succeeded. http://ecomputernotes.com
  • 16. Confirming Privileges Granted ata Dictionary View Description OLE_SYS_PRIVS System privileges granted to roles OLE_TAB_PRIVS Table privileges granted to roles SER_ROLE_PRIVS Roles accessible by the user SER_TAB_PRIVS_MADE Object privileges granted on the user¶s objects SER_TAB_PRIVS_RECD Object privileges granted to the user SER_COL_PRIVS_MADE Object privileges granted on the columns of the user¶s objects SER_COL_PRIVS_RECD Object privileges granted to the user on specific columns SER_SYS_PRIVS Lists system privileges granted to the user http://ecomputernotes.com
  • 17. How to Revoke Object Privileges " You use the REVOKE statement to revoke privileges granted to other users. "P rivileges granted to others through the W ITH GRANT OPTION clause are also revoked. REVOKE {privilege [, privilege...]|ALL} ON object FROM {user[, user...]|role|PUBLIC} [CASCADE CONSTRAINTS]; http://ecomputernotes.com
  • 18. Revoking Object Privileges As user Alice, revoke the SELECT and INSERT privileges given to user Scott on the DEPARTMENTS table. REVOKE select, insert ON departments FROM scott; Revoke succeeded. http://ecomputernotes.com
  • 19. Database Links A database link connection allows local users to access data on a remote database. Local Remote EMP Table SELECT * FROM HQ _ACME.COM emp@HQ_ACME.COM; database
  • 20. Database Links "C reate the database link. CREATE PUBLIC DATABASE LINK hq.acme.com USING 'sales'; Database link created. "W rite SQL statements that use the database link. SELECT * FROM emp@HQ.ACME.COM;