{"id":13970,"date":"2020-01-09T06:35:55","date_gmt":"2020-01-09T06:35:55","guid":{"rendered":"https:\/\/dbtut.com\/?p=13970"},"modified":"2020-01-09T06:35:57","modified_gmt":"2020-01-09T06:35:57","slug":"principle-of-least-privilege-in-oracle-databases","status":"publish","type":"post","link":"https:\/\/dbtut.com\/index.php\/2020\/01\/09\/principle-of-least-privilege-in-oracle-databases\/","title":{"rendered":"Principle of Least Privilege in Oracle Databases"},"content":{"rendered":"<p>The principle of least privilege (POLP) is an important concept in computer security, is to restrict users&#8217; privileges to the minimum level they need to do their jobs.<\/p>\n<p>According to the Principle of Least Privilege, permission must be granted as much as a user needs. In this way, whatever the user has to do, he will only have the authority to do so.<\/p>\n<p>By applying this principle in databases, you can maximize security.<\/p>\n<h2>To apply the minimum principle of least privilege in Oracle databases:<\/h2>\n<ul>\n<li>Protect the data dictionary. When parameter 07_DICTIONARY_ACCESSIBILITY is FALSE, people who has ANY TABLE privileges are restricted from accessing data dictionary-based tables. The default value of the parameter is FALSE and should not be changed.<\/li>\n<li>Revoke unnecessary privileges from the PUBLIC schema. The PUBLIC schema has execute privilege in packages such as UTL_SMTP, UTL_TCP, UTL_HTTP, and UTL_FILE. You should revoke if these privileges not required.<\/li>\n<li>Use the Access Control List (ACL) to control Network access. As of version 11g, it is necessary to create a Network Access Control List and authorize the user to access the network. I recommend you read the article &#8220;<a href=\"https:\/\/dbtut.com\/index.php\/2018\/12\/07\/what-is-network-access-control-list-and-how-to-use-it\/\" target=\"_blank\" rel=\"noopener noreferrer\">What is Network Access Control List and How To Use It<\/a>&#8220;.<\/li>\n<li>Restrict access to operating system directories.<\/li>\n<li>Restrict administrator privileges on users. Do not grant DBA permission to a normal user.<\/li>\n<li>Restrict remote database authentication. REMOTE_OS_AUTHENT specifies whether remote clients will be authenticated with the value of the OS_AUTHENT_PREFIX parameter. The default value is FALSE and should be like this. If set to TRUE, users created as &#8220;CREATE USER\u2026 IDENTIFIED EXTERNALLY&#8221; will be able to log in to the system.<\/li>\n<li>Define and follow audit policies for users&#8217; critical operations. Follow SYS operations in your databases. To do so, the value of the AUDIT_SYS_OPERATIONS parameter must be TRUE. If the &#8220;unified auditing&#8221; feature announced in version 12.2 is used for monitoring, you can access monitoring records in the SYS.UNIFIED_AUDIT_TRAIL view.<\/li>\n<\/ul>\n\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_13970\" class=\"pvc_stats all  \" data-element-id=\"13970\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/dbtut.com\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The principle of least privilege (POLP) is an important concept in computer security, is to restrict users&#8217; privileges to the minimum level they need to do their jobs. According to the Principle of Least Privilege, permission must be granted as much as a user needs. In this way, whatever the user has to do, he &hellip;<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_13970\" class=\"pvc_stats all  \" data-element-id=\"13970\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/dbtut.com\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":13972,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[6140,6145,6144,6139,6138,6137,6141,6143,6142,6146],"class_list":["post-13970","post","type-post","status-publish","format-standard","has-post-thumbnail","","category-oracle","tag-07_dictionary_accessibility","tag-audit_sys_operations","tag-os_authent_prefix","tag-principle-of-least-privilege","tag-principle-of-least-privilege-in-oracle","tag-principle-of-least-privilege-in-oracle-databases","tag-remote-database-authentication","tag-remote_os_authent","tag-restrict-remote-database-authentication","tag-sys-unified_audit_trail"],"aioseo_notices":[],"a3_pvc":{"activated":true,"total_views":816,"today_views":0},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Principle of Least Privilege in Oracle Databases - Database Tutorials<\/title>\n<meta name=\"description\" content=\"Principle of Least Privilege in Oracle Databases\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dbtut.com\/index.php\/2020\/01\/09\/principle-of-least-privilege-in-oracle-databases\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Principle of Least Privilege in Oracle Databases - Database Tutorials\" \/>\n<meta property=\"og:description\" content=\"Principle of Least Privilege in Oracle Databases\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dbtut.com\/index.php\/2020\/01\/09\/principle-of-least-privilege-in-oracle-databases\/\" \/>\n<meta property=\"og:site_name\" content=\"Database Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-09T06:35:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-09T06:35:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dbtut.com\/wp-content\/uploads\/2019\/11\/Ads\u0131z-71.png\" \/>\n\t<meta property=\"og:image:width\" content=\"562\" \/>\n\t<meta property=\"og:image:height\" content=\"355\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"dbtut\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dbtut\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2020\/01\/09\/principle-of-least-privilege-in-oracle-databases\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2020\/01\/09\/principle-of-least-privilege-in-oracle-databases\/\"},\"author\":{\"name\":\"dbtut\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/person\/fc047c39e1e53dce28fc4253529ea408\"},\"headline\":\"Principle of Least Privilege in Oracle Databases\",\"datePublished\":\"2020-01-09T06:35:55+00:00\",\"dateModified\":\"2020-01-09T06:35:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2020\/01\/09\/principle-of-least-privilege-in-oracle-databases\/\"},\"wordCount\":339,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/dbtut.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2020\/01\/09\/principle-of-least-privilege-in-oracle-databases\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2019\/11\/Ads\u0131z-71.png\",\"keywords\":[\"07_DICTIONARY_ACCESSIBILITY\",\"AUDIT_SYS_OPERATIONS\",\"OS_AUTHENT_PREFIX\",\"Principle of Least Privilege\",\"principle of least privilege in Oracle\",\"principle of least privilege in Oracle databases\",\"remote database authentication\",\"REMOTE_OS_AUTHENT\",\"restrict remote database authentication\",\"SYS.UNIFIED_AUDIT_TRAIL\"],\"articleSection\":[\"ORACLE\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/dbtut.com\/index.php\/2020\/01\/09\/principle-of-least-privilege-in-oracle-databases\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2020\/01\/09\/principle-of-least-privilege-in-oracle-databases\/\",\"url\":\"https:\/\/dbtut.com\/index.php\/2020\/01\/09\/principle-of-least-privilege-in-oracle-databases\/\",\"name\":\"Principle of Least Privilege in Oracle Databases - Database Tutorials\",\"isPartOf\":{\"@id\":\"https:\/\/dbtut.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2020\/01\/09\/principle-of-least-privilege-in-oracle-databases\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2020\/01\/09\/principle-of-least-privilege-in-oracle-databases\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2019\/11\/Ads\u0131z-71.png\",\"datePublished\":\"2020-01-09T06:35:55+00:00\",\"dateModified\":\"2020-01-09T06:35:57+00:00\",\"description\":\"Principle of Least Privilege in Oracle Databases\",\"breadcrumb\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2020\/01\/09\/principle-of-least-privilege-in-oracle-databases\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dbtut.com\/index.php\/2020\/01\/09\/principle-of-least-privilege-in-oracle-databases\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2020\/01\/09\/principle-of-least-privilege-in-oracle-databases\/#primaryimage\",\"url\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2019\/11\/Ads\u0131z-71.png\",\"contentUrl\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2019\/11\/Ads\u0131z-71.png\",\"width\":562,\"height\":355},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2020\/01\/09\/principle-of-least-privilege-in-oracle-databases\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dbtut.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Principle of Least Privilege in Oracle Databases\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dbtut.com\/#website\",\"url\":\"https:\/\/dbtut.com\/\",\"name\":\"Database Tutorials\",\"description\":\"MSSQL, Oracle, PostgreSQL, MySQL, MariaDB, DB2, Sybase, Teradata, Big Data, NOSQL, MongoDB, Couchbase, Cassandra, Windows, Linux\",\"publisher\":{\"@id\":\"https:\/\/dbtut.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dbtut.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dbtut.com\/#organization\",\"name\":\"dbtut\",\"url\":\"https:\/\/dbtut.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg\",\"contentUrl\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg\",\"width\":223,\"height\":36,\"caption\":\"dbtut\"},\"image\":{\"@id\":\"https:\/\/dbtut.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/person\/fc047c39e1e53dce28fc4253529ea408\",\"name\":\"dbtut\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c322c32021bf651d9e103b183963c479a9c9791ead0715f4348203496c39aa54?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c322c32021bf651d9e103b183963c479a9c9791ead0715f4348203496c39aa54?s=96&d=mm&r=g\",\"caption\":\"dbtut\"},\"description\":\"We are a team with over 10 years of database management and BI experience. Our Expertises: Oracle, SQL Server, PostgreSQL, MySQL, MongoDB, Elasticsearch, Kibana, Grafana.\",\"sameAs\":[\"http:\/\/NurullahCAKIR\"],\"url\":\"https:\/\/dbtut.com\/index.php\/author\/dbtut\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Principle of Least Privilege in Oracle Databases - Database Tutorials","description":"Principle of Least Privilege in Oracle Databases","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dbtut.com\/index.php\/2020\/01\/09\/principle-of-least-privilege-in-oracle-databases\/","og_locale":"en_US","og_type":"article","og_title":"Principle of Least Privilege in Oracle Databases - Database Tutorials","og_description":"Principle of Least Privilege in Oracle Databases","og_url":"https:\/\/dbtut.com\/index.php\/2020\/01\/09\/principle-of-least-privilege-in-oracle-databases\/","og_site_name":"Database Tutorials","article_published_time":"2020-01-09T06:35:55+00:00","article_modified_time":"2020-01-09T06:35:57+00:00","og_image":[{"width":562,"height":355,"url":"https:\/\/dbtut.com\/wp-content\/uploads\/2019\/11\/Ads\u0131z-71.png","type":"image\/png"}],"author":"dbtut","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dbtut","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dbtut.com\/index.php\/2020\/01\/09\/principle-of-least-privilege-in-oracle-databases\/#article","isPartOf":{"@id":"https:\/\/dbtut.com\/index.php\/2020\/01\/09\/principle-of-least-privilege-in-oracle-databases\/"},"author":{"name":"dbtut","@id":"https:\/\/dbtut.com\/#\/schema\/person\/fc047c39e1e53dce28fc4253529ea408"},"headline":"Principle of Least Privilege in Oracle Databases","datePublished":"2020-01-09T06:35:55+00:00","dateModified":"2020-01-09T06:35:57+00:00","mainEntityOfPage":{"@id":"https:\/\/dbtut.com\/index.php\/2020\/01\/09\/principle-of-least-privilege-in-oracle-databases\/"},"wordCount":339,"commentCount":0,"publisher":{"@id":"https:\/\/dbtut.com\/#organization"},"image":{"@id":"https:\/\/dbtut.com\/index.php\/2020\/01\/09\/principle-of-least-privilege-in-oracle-databases\/#primaryimage"},"thumbnailUrl":"https:\/\/dbtut.com\/wp-content\/uploads\/2019\/11\/Ads\u0131z-71.png","keywords":["07_DICTIONARY_ACCESSIBILITY","AUDIT_SYS_OPERATIONS","OS_AUTHENT_PREFIX","Principle of Least Privilege","principle of least privilege in Oracle","principle of least privilege in Oracle databases","remote database authentication","REMOTE_OS_AUTHENT","restrict remote database authentication","SYS.UNIFIED_AUDIT_TRAIL"],"articleSection":["ORACLE"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/dbtut.com\/index.php\/2020\/01\/09\/principle-of-least-privilege-in-oracle-databases\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/dbtut.com\/index.php\/2020\/01\/09\/principle-of-least-privilege-in-oracle-databases\/","url":"https:\/\/dbtut.com\/index.php\/2020\/01\/09\/principle-of-least-privilege-in-oracle-databases\/","name":"Principle of Least Privilege in Oracle Databases - Database Tutorials","isPartOf":{"@id":"https:\/\/dbtut.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dbtut.com\/index.php\/2020\/01\/09\/principle-of-least-privilege-in-oracle-databases\/#primaryimage"},"image":{"@id":"https:\/\/dbtut.com\/index.php\/2020\/01\/09\/principle-of-least-privilege-in-oracle-databases\/#primaryimage"},"thumbnailUrl":"https:\/\/dbtut.com\/wp-content\/uploads\/2019\/11\/Ads\u0131z-71.png","datePublished":"2020-01-09T06:35:55+00:00","dateModified":"2020-01-09T06:35:57+00:00","description":"Principle of Least Privilege in Oracle Databases","breadcrumb":{"@id":"https:\/\/dbtut.com\/index.php\/2020\/01\/09\/principle-of-least-privilege-in-oracle-databases\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dbtut.com\/index.php\/2020\/01\/09\/principle-of-least-privilege-in-oracle-databases\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dbtut.com\/index.php\/2020\/01\/09\/principle-of-least-privilege-in-oracle-databases\/#primaryimage","url":"https:\/\/dbtut.com\/wp-content\/uploads\/2019\/11\/Ads\u0131z-71.png","contentUrl":"https:\/\/dbtut.com\/wp-content\/uploads\/2019\/11\/Ads\u0131z-71.png","width":562,"height":355},{"@type":"BreadcrumbList","@id":"https:\/\/dbtut.com\/index.php\/2020\/01\/09\/principle-of-least-privilege-in-oracle-databases\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dbtut.com\/"},{"@type":"ListItem","position":2,"name":"Principle of Least Privilege in Oracle Databases"}]},{"@type":"WebSite","@id":"https:\/\/dbtut.com\/#website","url":"https:\/\/dbtut.com\/","name":"Database Tutorials","description":"MSSQL, Oracle, PostgreSQL, MySQL, MariaDB, DB2, Sybase, Teradata, Big Data, NOSQL, MongoDB, Couchbase, Cassandra, Windows, Linux","publisher":{"@id":"https:\/\/dbtut.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dbtut.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/dbtut.com\/#organization","name":"dbtut","url":"https:\/\/dbtut.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dbtut.com\/#\/schema\/logo\/image\/","url":"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg","contentUrl":"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg","width":223,"height":36,"caption":"dbtut"},"image":{"@id":"https:\/\/dbtut.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/dbtut.com\/#\/schema\/person\/fc047c39e1e53dce28fc4253529ea408","name":"dbtut","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dbtut.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c322c32021bf651d9e103b183963c479a9c9791ead0715f4348203496c39aa54?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c322c32021bf651d9e103b183963c479a9c9791ead0715f4348203496c39aa54?s=96&d=mm&r=g","caption":"dbtut"},"description":"We are a team with over 10 years of database management and BI experience. Our Expertises: Oracle, SQL Server, PostgreSQL, MySQL, MongoDB, Elasticsearch, Kibana, Grafana.","sameAs":["http:\/\/NurullahCAKIR"],"url":"https:\/\/dbtut.com\/index.php\/author\/dbtut\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/posts\/13970","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/comments?post=13970"}],"version-history":[{"count":0,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/posts\/13970\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/media\/13972"}],"wp:attachment":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/media?parent=13970"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/categories?post=13970"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/tags?post=13970"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}