{"id":54922,"date":"2023-08-23T13:28:35","date_gmt":"2023-08-23T13:28:35","guid":{"rendered":"https:\/\/dbtut.com\/?p=54922"},"modified":"2023-08-23T13:30:22","modified_gmt":"2023-08-23T13:30:22","slug":"critical-authority-in-oracle-database","status":"publish","type":"post","link":"https:\/\/dbtut.com\/index.php\/2023\/08\/23\/critical-authority-in-oracle-database\/","title":{"rendered":"Critical Authority In Oracle Database"},"content":{"rendered":"<p>In today&#8217;s article, we will examine what we need to pay attention to when performing Critical Authority Controls in Oracle Database.<\/p>\n<p>The most critical authorizations for database users are &#8220;ALTER&#8221; and &#8220;ANY&#8221; privileges.<\/p>\n<p>Users who receive this authorization can also dominate over other users.<\/p>\n<p>It can delete, recreate and edit all tables on the database.<\/p>\n<p>This type of authorization is strongly discouraged. What is required is authorization according to need.<\/p>\n<p>Oracle Database default users, for example \u201d SYS \u201d or \u201d SYSTEM, need these privileges.<\/p>\n<p>The SQL query is given below, where you can find the people with critical privileges mentioned above, excluding such users.<\/p>\n<pre class=\"lang:default decode:true \">\/* Checking critical Authorities *\/\r\nSELECT\r\n\tA.*,\r\n\t'GRANTED TO USER' TYPE\r\nFROM\r\n\tDBA_SYS_PRIVS A,\r\n\tDBA_USERS B\r\nWHERE\r\n\tA.GRANTEE = B.USERNAME\r\n\tAND PRIVILEGE IN(\r\n\t\t'BECOME USER',\r\n\t\t'ALTER USER',\r\n\t\t'DROP USER',\r\n\t\t'CREATE ROLE',\r\n\t\t'ALTER ANY ROLE',\r\n\t\t'DROP ANY ROLE',\r\n\t\t'GRANT ANY ROLE',\r\n\t\t'CREATE PROFILE',\r\n\t\t'ALTER PROFILE',\r\n\t\t'DROP PROFILE',\r\n\t\t'CREATE ANY TABLE',\r\n\t\t'ALTER ANY TABLE',\r\n\t\t'DROP ANY TABLE',\r\n\t\t'INSERT ANY TABLE',\r\n\t\t'UPDATE ANY TABLE',\r\n\t\t'DELETE ANY TABLE',\r\n\t\t'SELECT ANY TABLE',\r\n\t\t'CREATE ANY PROCEDURE',\r\n\t\t'ALTER ANY PROCEDURE',\r\n\t\t'DROP ANY PROCEDURE',\r\n\t\t'EXECUTE ANY PROCEDURE',\r\n\t\t'CREATE ANY TRIGGER',\r\n\t\t'ALTER ANY TRIGGER',\r\n\t\t'DROP ANY TRIGGER',\r\n\t\t'CREATE TABLESPACE',\r\n\t\t'ALTER TABLESPACE',\r\n\t\t'DROP TABLESPACES',\r\n\t\t'ALTER DATABASE',\r\n\t\t'ALTER SYSTEM',\r\n\t\t'SELECT ANY DICTIONARY',\r\n\t\t'EXEMPT ACCESS POLICY',\r\n\t\t'CREATE ANY LIBRARY',\r\n\t\t'GRANT ANY OBJECT PRIVILEGE',\r\n\t\t'GRANT ANY PRIVILEGE',\r\n\t\t'AUDIT ANY'\r\n\t)\r\n\tAND GRANTEE NOT IN(\r\n\t\t'ANONYMOUS',\r\n\t\t'CTXSYS',\r\n\t\t'DBSNMP',\r\n\t\t'EXFSYS',\r\n\t\t'LBACSYS',\r\n\t\t'MDSYS',\r\n\t\t'MGMT_VIEW',\r\n\t\t'OLAPSYS',\r\n\t\t'OWBSYS',\r\n\t\t'ORDPLUGINS',\r\n\t\t'ORDSYS',\r\n\t\t'OUTLN',\r\n\t\t'SI_INFORMTN_SCHEMA',\r\n\t\t'SYS',\r\n\t\t'SYSMAN',\r\n\t\t'SYSTEM',\r\n\t\t'TSMSYS',\r\n\t\t'WK_TEST',\r\n\t\t'WKSYS',\r\n\t\t'WKPROXY',\r\n\t\t'WMSYS',\r\n\t\t'XDB',\r\n\t\t'APEX_PUBLIC_USER',\r\n\t\t'DIP',\r\n\t\t'FLOWS_30000',\r\n\t\t'FLOWS_FILES',\r\n\t\t'MDDATA',\r\n\t\t'ORACLE_OCM',\r\n\t\t'SPATIAL_CSW_ADMIN_USR',\r\n\t\t'SPATIAL_WFS_ADMIN_USR',\r\n\t\t'XS$NULL',\r\n\t\t'OWBSYS_AUDIT',\r\n\t\t'ORDDATA',\r\n\t\t'APEX_030200',\r\n\t\t'APPQOSSYS',\r\n\t\t'DVSYS',\r\n\t\t'DVF'\r\n\t)\r\nUNION ALL \r\nSELECT\r\n\tA.*,\r\n\t'GRANTED TO ROLE' TYPE\r\nFROM\r\n\tDBA_SYS_PRIVS A,\r\n\tDBA_ROLES B\r\nWHERE\r\n\tA.GRANTEE = B.ROLE\r\n\tAND PRIVILEGE IN(\r\n\t\t'BECOME USER',\r\n\t\t'ALTER USER',\r\n\t\t'DROP USER',\r\n\t\t'CREATE ROLE',\r\n\t\t'ALTER ANY ROLE',\r\n\t\t'DROP ANY ROLE',\r\n\t\t'GRANT ANY ROLE',\r\n\t\t'CREATE PROFILE',\r\n\t\t'ALTER PROFILE',\r\n\t\t'DROP PROFILE',\r\n\t\t'CREATE ANY TABLE',\r\n\t\t'ALTER ANY TABLE',\r\n\t\t'DROP ANY TABLE',\r\n\t\t'INSERT ANY TABLE',\r\n\t\t'UPDATE ANY TABLE',\r\n\t\t'DELETE ANY TABLE',\r\n\t\t'SELECT ANY TABLE',\r\n\t\t'CREATE ANY PROCEDURE',\r\n\t\t'ALTER ANY PROCEDURE',\r\n\t\t'DROP ANY PROCEDURE',\r\n\t\t'EXECUTE ANY PROCEDURE',\r\n\t\t'CREATE ANY TRIGGER',\r\n\t\t'ALTER ANY TRIGGER',\r\n\t\t'DROP ANY TRIGGER',\r\n\t\t'CREATE TABLESPACE',\r\n\t\t'ALTER TABLESPACE',\r\n\t\t'DROP TABLESPACES',\r\n\t\t'ALTER DATABASE',\r\n\t\t'ALTER SYSTEM',\r\n\t\t'SELECT ANY DICTIONARY',\r\n\t\t'EXEMPT ACCESS POLICY',\r\n\t\t'CREATE ANY LIBRARY',\r\n\t\t'GRANT ANY OBJECT PRIVILEGE',\r\n\t\t'GRANT ANY PRIVILEGE',\r\n\t\t'AUDIT ANY'\r\n\t)\r\n\tAND GRANTEE NOT IN(\r\n\t\t'DBA',\r\n\t\t'IMP_FULL_DATABASE',\r\n\t\t'DATAPUMP_IMP_FULL_DATABASE',\r\n\t\t'OLAP_DBA',\r\n\t\t'EXP_FULL_DATABASE',\r\n\t\t'OEM_MONITOR'\r\n\t);<\/pre>\n<p>When you run the above code block, you will get a dump like below.<\/p>\n<p>To be clear, I have authorized the user &#8220;HR&#8221;.<\/p>\n<p>We see it below. You should examine the users you come across in detail and get their authorization if necessary.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/www.cozumpark.com\/wp-content\/uploads\/2020\/10\/image-54.png\" \/><\/p>\n<p>So how do you get these powers?<\/p>\n<p>Syntax : REVOKE {system_privilege | object_privilege } FROM user;<\/p>\n<p>Example ;<\/p>\n<pre class=\"lang:default decode:true \">REVOKE ALTER ANY TRIGGER FROM HR;\r\nREVOKE ALTER ANY TABLE FROM HR;<\/pre>\n<p>They may have received these authorizations with the additional feature we call &#8220;ADMIN OPTION&#8221;.<\/p>\n<p>ADMIN OPTION is a feature that you can give to someone else the privileges given to you.<\/p>\n<p>In other words, if you have been given the &#8220;CREATE ANY TABLE&#8221; authority with &#8220;ADMIN OPTION&#8221;, you can give this authority to someone else.<\/p>\n<p>Clearly, this authority should not belong to anyone other than DBA managers.<\/p>\n<p>To see the ADMIN OPTION privilege assigned to users:<\/p>\n<pre class=\"lang:default decode:true \">\/* Users with ADMIN OPTION authority *\/\r\nSELECT A.GRANTEE, A.PRIVILEGE, A.ADMIN_OPTION\r\n  FROM DBA_SYS_PRIVS A, DBA_USERS B\r\n WHERE     A.ADMIN_OPTION = 'YES'\r\n       AND A.GRANTEE NOT IN ('ANONYMOUS',\r\n                             'CTXSYS',\r\n                             'DBSNMP',\r\n                             'EXFSYS',\r\n                             'LBACSYS',\r\n                             'MDSYS',\r\n                             'MGMT_VIEW',\r\n                             'OLAPSYS',\r\n                             'OWBSYS',\r\n                             'ORDPLUGINS',\r\n                             'ORDSYS',\r\n                             'OUTLN',\r\n                             'SI_INFORMTN_SCHEMA',\r\n                             'SYS',\r\n                             'SYSMAN',\r\n                             'SYSTEM',\r\n                             'TSMSYS',\r\n                             'WK_TEST',\r\n                             'WKSYS',\r\n                             'WKPROXY',\r\n                             'WMSYS',\r\n                             'XDB',\r\n                             'APEX_PUBLIC_USER',\r\n                             'DIP',\r\n                             'FLOWS_30000',\r\n                             'FLOWS_FILES',\r\n                             'MDDATA',\r\n                             'ORACLE_OCM',\r\n                             'SPATIAL_CSW_ADMIN_USR',\r\n                             'SPATIAL_WFS_ADMIN_USR',\r\n                             'XS$NULL',\r\n                             'OWBSYS_AUDIT',\r\n                             'ORDDATA',\r\n                             'APEX_030200',\r\n                             'APPQOSSYS',\r\n                             'DVSYS',\r\n                             'DVF')\r\n       AND A.GRANTEE = B.USERNAME;<\/pre>\n<p>When I run the code block, I see that the user &#8220;HR&#8221; has this privilege.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/www.cozumpark.com\/wp-content\/uploads\/2020\/10\/image-56.png\" \/><\/p>\n<p>The command for authorization is the same.<\/p>\n<pre class=\"lang:default decode:true \">REVOKE ALTER ANY TABLE FROM HR;\r\n<\/pre>\n<p>However, users with SYSDBA authorization should be examined.<\/p>\n<pre class=\"lang:default decode:true \">\/* Users with SYSDBA Authorization *\/\r\nSELECT *\r\n   FROM v$pwfile_users\r\n  WHERE SYSDBA = 'TRUE';<\/pre>\n<p>The sample output is as follows, I only see SYS.<\/p>\n<p>If there are different users, it should be investigated.<\/p>\n<pre class=\"lang:default decode:true \">REVOKE SYSDBA FROM HR \r\n<\/pre>\n<p>However, users with the &#8220;DBA&#8221; role should be examined.<\/p>\n<p>If you want to see the users with this authority;<\/p>\n<pre class=\"lang:default decode:true \">\/* Formatted on 10\/18\/2020 12:53:38 PM (QP5 v5.300) *\/\r\n\r\nSELECT DISTINCT A.GRANTEE, A.GRANTED_ROLE, 'DBA' GRANTED_CRITIC_ROLE\r\n  FROM (    SELECT DISTINCT LEVEL LEVEL_DEEP, GRANTEE, GRANTED_ROLE\r\n              FROM DBA_ROLE_PRIVS\r\n        START WITH GRANTED_ROLE = 'DBA'\r\n        CONNECT BY PRIOR GRANTEE = GRANTED_ROLE) A,\r\n       DBA_USERS  B\r\n WHERE     A.GRANTEE = B.USERNAME\r\n       AND B.USERNAME NOT IN ('SYSTEM', 'SYS')\r\n       AND B.ACCOUNT_STATUS = 'OPEN';<\/pre>\n<p>When I run the above code block, I see that the user &#8220;HR&#8221; has this privilege.<\/p>\n<p>If you see different users, you should research it.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/www.cozumpark.com\/wp-content\/uploads\/2020\/10\/image-58.png\" \/><\/p>\n<p>If we want to get the authority;<\/p>\n<pre class=\"lang:default decode:true \">REVOKE DBA FROM HR \r\n<\/pre>\n<p>Finally, let&#8217;s take a look at the CATALOG privileges. Catalog authorizations are examined in three different sections.<\/p>\n<p>DELETE_CATALOG_ROLE; Audit trails are kept here in the database.<\/p>\n<p>For example, this permission is needed to delete the AUD$ table.<\/p>\n<p>If a user has this authority, he can delete the audit log records in the database.<\/p>\n<p>You can request users with this authority with the following query.<\/p>\n<pre class=\"lang:default decode:true \">\/* Delete Catalog Role control *\/\r\n\r\nSELECT DISTINCT\r\n        A.GRANTEE, GRANTED_ROLE, 'DELETE_CATALOG_ROLE' GRANTED_CRITIC_ROLE\r\n   FROM ( SELECT DISTINCT LEVEL LEVEL_DEEP, GRANTEE, GRANTED_ROLE\r\n               FROM DBA_ROLE_PRIVS\r\n         START WITH GRANTED_ROLE = 'DELETE_CATALOG_ROLE'\r\n         CONNECT BY PRIOR GRANTEE = GRANTED_ROLE) A,\r\n        DBA_USERS B\r\n  WHERE A.GRANTEE = B.USERNAME\r\n        AND B.USERNAME NOT IN ('SYSTEM', 'SYS', 'SYSMAN')\r\n        AND B.ACCOUNT_STATUS = 'OPEN';<\/pre>\n<p>To get authorization<\/p>\n<pre class=\"lang:default decode:true \">REVOKE DELETE_CATALOG_ROLE FROM HR \r\n<\/pre>\n<p>SELECT_CATALOG_ROLE; It is the role where other users can list and query the tables in the SYS user.<\/p>\n<pre class=\"lang:default decode:true \">\/* Select Catalog Role control *\/\r\nSELECT DISTINCT\r\n        A.GRANTEE, GRANTED_ROLE, 'SELECT_CATALOG_ROLE' GRANTED_CRITIC_ROLE\r\n   FROM ( SELECT DISTINCT LEVEL LEVEL_DEEP, GRANTEE, GRANTED_ROLE\r\n               FROM DBA_ROLE_PRIVS\r\n         START WITH GRANTED_ROLE = 'SELECT_CATALOG_ROLE'\r\n         CONNECT BY PRIOR GRANTEE = GRANTED_ROLE) A,\r\n        DBA_USERS B\r\n  WHERE A.GRANTEE = B.USERNAME\r\n        AND B.USERNAME NOT IN ('SYSTEM', 'SYS', 'SYSMAN')\r\n        AND B.ACCOUNT_STATUS = 'OPEN';<\/pre>\n<p>To get authorization<\/p>\n<pre class=\"lang:default decode:true \">REVOKE SELECT_CATALOG_ROLE FROM HR \r\n<\/pre>\n<p>EXECUTE_CATALOG_ROLE; It gives the user the right to run procedures and functions on the SYS user.<\/p>\n<pre class=\"lang:default decode:true \">\/* Execute Catalog Role control *\/\r\nSELECT DISTINCT\r\n        A.GRANTEE, GRANTED_ROLE, 'EXECUTE_CATALOG_ROLE' GRANTED_CRITIC_ROLE\r\n   FROM ( SELECT DISTINCT LEVEL LEVEL_DEEP, GRANTEE, GRANTED_ROLE\r\n               FROM DBA_ROLE_PRIVS\r\n         START WITH GRANTED_ROLE = 'EXECUTE_CATALOG_ROLE'\r\n         CONNECT BY PRIOR GRANTEE = GRANTED_ROLE) A,\r\n        DBA_USERS B\r\n  WHERE A.GRANTEE = B.USERNAME\r\n        AND B.USERNAME NOT IN ('SYSTEM', 'SYS', 'SYSMAN')\r\n        AND B.ACCOUNT_STATUS = 'OPEN';<\/pre>\n<pre class=\"lang:default decode:true \">REVOKE EXECUTE_CATALOG_ROLE FROM HR<\/pre>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_54922\" class=\"pvc_stats all  \" data-element-id=\"54922\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/dbtut.com\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In today&#8217;s article, we will examine what we need to pay attention to when performing Critical Authority Controls in Oracle Database. The most critical authorizations for database users are &#8220;ALTER&#8221; and &#8220;ANY&#8221; privileges. Users who receive this authorization can also dominate over other users. It can delete, recreate and edit all tables on the database. &hellip;<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_54922\" class=\"pvc_stats all  \" data-element-id=\"54922\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/dbtut.com\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":574,"featured_media":54926,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-54922","post","type-post","status-publish","format-standard","has-post-thumbnail","","category-oracle"],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Critical Authority In Oracle Database - Database Tutorials<\/title>\n<meta name=\"description\" content=\"In today&#039;s article, we will examine what we need to pay attention to when performing Critical Authority Controls in Oracle Database.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dbtut.com\/index.php\/2023\/08\/23\/critical-authority-in-oracle-database\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Critical Authority In Oracle Database - Database Tutorials\" \/>\n<meta property=\"og:description\" content=\"In today&#039;s article, we will examine what we need to pay attention to when performing Critical Authority Controls in Oracle Database.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dbtut.com\/index.php\/2023\/08\/23\/critical-authority-in-oracle-database\/\" \/>\n<meta property=\"og:site_name\" content=\"Database Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-23T13:28:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-23T13:30:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dbtut.com\/wp-content\/uploads\/2023\/08\/Ekran-goruntusu-2023-08-23-162144.png\" \/>\n\t<meta property=\"og:image:width\" content=\"707\" \/>\n\t<meta property=\"og:image:height\" content=\"302\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Bu\u011fra PARLAYAN\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bu\u011fra PARLAYAN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2023\/08\/23\/critical-authority-in-oracle-database\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2023\/08\/23\/critical-authority-in-oracle-database\/\"},\"author\":{\"name\":\"Bu\u011fra PARLAYAN\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/person\/f07abb2de370d35d6c93e90d8eb2b9f2\"},\"headline\":\"Critical Authority In Oracle Database\",\"datePublished\":\"2023-08-23T13:28:35+00:00\",\"dateModified\":\"2023-08-23T13:30:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2023\/08\/23\/critical-authority-in-oracle-database\/\"},\"wordCount\":452,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/dbtut.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2023\/08\/23\/critical-authority-in-oracle-database\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2023\/08\/Ekran-goruntusu-2023-08-23-162144.png\",\"articleSection\":[\"ORACLE\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/dbtut.com\/index.php\/2023\/08\/23\/critical-authority-in-oracle-database\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2023\/08\/23\/critical-authority-in-oracle-database\/\",\"url\":\"https:\/\/dbtut.com\/index.php\/2023\/08\/23\/critical-authority-in-oracle-database\/\",\"name\":\"Critical Authority In Oracle Database - Database Tutorials\",\"isPartOf\":{\"@id\":\"https:\/\/dbtut.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2023\/08\/23\/critical-authority-in-oracle-database\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2023\/08\/23\/critical-authority-in-oracle-database\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2023\/08\/Ekran-goruntusu-2023-08-23-162144.png\",\"datePublished\":\"2023-08-23T13:28:35+00:00\",\"dateModified\":\"2023-08-23T13:30:22+00:00\",\"description\":\"In today's article, we will examine what we need to pay attention to when performing Critical Authority Controls in Oracle Database.\",\"breadcrumb\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2023\/08\/23\/critical-authority-in-oracle-database\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dbtut.com\/index.php\/2023\/08\/23\/critical-authority-in-oracle-database\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2023\/08\/23\/critical-authority-in-oracle-database\/#primaryimage\",\"url\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2023\/08\/Ekran-goruntusu-2023-08-23-162144.png\",\"contentUrl\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2023\/08\/Ekran-goruntusu-2023-08-23-162144.png\",\"width\":707,\"height\":302},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2023\/08\/23\/critical-authority-in-oracle-database\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dbtut.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Critical Authority In Oracle Database\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dbtut.com\/#website\",\"url\":\"https:\/\/dbtut.com\/\",\"name\":\"Database Tutorials\",\"description\":\"MSSQL, Oracle, PostgreSQL, MySQL, MariaDB, DB2, Sybase, Teradata, Big Data, NOSQL, MongoDB, Couchbase, Cassandra, Windows, Linux\",\"publisher\":{\"@id\":\"https:\/\/dbtut.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dbtut.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dbtut.com\/#organization\",\"name\":\"dbtut\",\"url\":\"https:\/\/dbtut.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg\",\"contentUrl\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg\",\"width\":223,\"height\":36,\"caption\":\"dbtut\"},\"image\":{\"@id\":\"https:\/\/dbtut.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/person\/f07abb2de370d35d6c93e90d8eb2b9f2\",\"name\":\"Bu\u011fra PARLAYAN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8fe63334d745f00f79f9f47b870aa143dd0f7615580c741a3b078aa4d09fa071?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8fe63334d745f00f79f9f47b870aa143dd0f7615580c741a3b078aa4d09fa071?s=96&d=mm&r=g\",\"caption\":\"Bu\u011fra PARLAYAN\"},\"description\":\"Burgra Parlayan is an experienced Database and Weblogic Administrator. After completing his technical \/ relevant training he has got involved with a serious amount of projects. He successfully managed database upgrade, database migration, database performance tuning projects for various public institutions.Currently he has been employed by one of the leading financial institutions called Turkiye Hayat &amp; Emeklilik as responsible administrator for Oracle Database and Oracle Middleware. He has been sharing his experience and knowledge by face to face training, personal blog and various social networking accounts to support the Oracle ecosystem continuously since 2010.\",\"sameAs\":[\"http:\/\/www.bugraparlayan.com.tr\/\"],\"url\":\"https:\/\/dbtut.com\/index.php\/author\/bugraparlayan\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Critical Authority In Oracle Database - Database Tutorials","description":"In today's article, we will examine what we need to pay attention to when performing Critical Authority Controls in Oracle Database.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dbtut.com\/index.php\/2023\/08\/23\/critical-authority-in-oracle-database\/","og_locale":"en_US","og_type":"article","og_title":"Critical Authority In Oracle Database - Database Tutorials","og_description":"In today's article, we will examine what we need to pay attention to when performing Critical Authority Controls in Oracle Database.","og_url":"https:\/\/dbtut.com\/index.php\/2023\/08\/23\/critical-authority-in-oracle-database\/","og_site_name":"Database Tutorials","article_published_time":"2023-08-23T13:28:35+00:00","article_modified_time":"2023-08-23T13:30:22+00:00","og_image":[{"width":707,"height":302,"url":"https:\/\/dbtut.com\/wp-content\/uploads\/2023\/08\/Ekran-goruntusu-2023-08-23-162144.png","type":"image\/png"}],"author":"Bu\u011fra PARLAYAN","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bu\u011fra PARLAYAN","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dbtut.com\/index.php\/2023\/08\/23\/critical-authority-in-oracle-database\/#article","isPartOf":{"@id":"https:\/\/dbtut.com\/index.php\/2023\/08\/23\/critical-authority-in-oracle-database\/"},"author":{"name":"Bu\u011fra PARLAYAN","@id":"https:\/\/dbtut.com\/#\/schema\/person\/f07abb2de370d35d6c93e90d8eb2b9f2"},"headline":"Critical Authority In Oracle Database","datePublished":"2023-08-23T13:28:35+00:00","dateModified":"2023-08-23T13:30:22+00:00","mainEntityOfPage":{"@id":"https:\/\/dbtut.com\/index.php\/2023\/08\/23\/critical-authority-in-oracle-database\/"},"wordCount":452,"commentCount":0,"publisher":{"@id":"https:\/\/dbtut.com\/#organization"},"image":{"@id":"https:\/\/dbtut.com\/index.php\/2023\/08\/23\/critical-authority-in-oracle-database\/#primaryimage"},"thumbnailUrl":"https:\/\/dbtut.com\/wp-content\/uploads\/2023\/08\/Ekran-goruntusu-2023-08-23-162144.png","articleSection":["ORACLE"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/dbtut.com\/index.php\/2023\/08\/23\/critical-authority-in-oracle-database\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/dbtut.com\/index.php\/2023\/08\/23\/critical-authority-in-oracle-database\/","url":"https:\/\/dbtut.com\/index.php\/2023\/08\/23\/critical-authority-in-oracle-database\/","name":"Critical Authority In Oracle Database - Database Tutorials","isPartOf":{"@id":"https:\/\/dbtut.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dbtut.com\/index.php\/2023\/08\/23\/critical-authority-in-oracle-database\/#primaryimage"},"image":{"@id":"https:\/\/dbtut.com\/index.php\/2023\/08\/23\/critical-authority-in-oracle-database\/#primaryimage"},"thumbnailUrl":"https:\/\/dbtut.com\/wp-content\/uploads\/2023\/08\/Ekran-goruntusu-2023-08-23-162144.png","datePublished":"2023-08-23T13:28:35+00:00","dateModified":"2023-08-23T13:30:22+00:00","description":"In today's article, we will examine what we need to pay attention to when performing Critical Authority Controls in Oracle Database.","breadcrumb":{"@id":"https:\/\/dbtut.com\/index.php\/2023\/08\/23\/critical-authority-in-oracle-database\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dbtut.com\/index.php\/2023\/08\/23\/critical-authority-in-oracle-database\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dbtut.com\/index.php\/2023\/08\/23\/critical-authority-in-oracle-database\/#primaryimage","url":"https:\/\/dbtut.com\/wp-content\/uploads\/2023\/08\/Ekran-goruntusu-2023-08-23-162144.png","contentUrl":"https:\/\/dbtut.com\/wp-content\/uploads\/2023\/08\/Ekran-goruntusu-2023-08-23-162144.png","width":707,"height":302},{"@type":"BreadcrumbList","@id":"https:\/\/dbtut.com\/index.php\/2023\/08\/23\/critical-authority-in-oracle-database\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dbtut.com\/"},{"@type":"ListItem","position":2,"name":"Critical Authority In Oracle Database"}]},{"@type":"WebSite","@id":"https:\/\/dbtut.com\/#website","url":"https:\/\/dbtut.com\/","name":"Database Tutorials","description":"MSSQL, Oracle, PostgreSQL, MySQL, MariaDB, DB2, Sybase, Teradata, Big Data, NOSQL, MongoDB, Couchbase, Cassandra, Windows, Linux","publisher":{"@id":"https:\/\/dbtut.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dbtut.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/dbtut.com\/#organization","name":"dbtut","url":"https:\/\/dbtut.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dbtut.com\/#\/schema\/logo\/image\/","url":"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg","contentUrl":"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg","width":223,"height":36,"caption":"dbtut"},"image":{"@id":"https:\/\/dbtut.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/dbtut.com\/#\/schema\/person\/f07abb2de370d35d6c93e90d8eb2b9f2","name":"Bu\u011fra PARLAYAN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dbtut.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8fe63334d745f00f79f9f47b870aa143dd0f7615580c741a3b078aa4d09fa071?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8fe63334d745f00f79f9f47b870aa143dd0f7615580c741a3b078aa4d09fa071?s=96&d=mm&r=g","caption":"Bu\u011fra PARLAYAN"},"description":"Burgra Parlayan is an experienced Database and Weblogic Administrator. After completing his technical \/ relevant training he has got involved with a serious amount of projects. He successfully managed database upgrade, database migration, database performance tuning projects for various public institutions.Currently he has been employed by one of the leading financial institutions called Turkiye Hayat &amp; Emeklilik as responsible administrator for Oracle Database and Oracle Middleware. He has been sharing his experience and knowledge by face to face training, personal blog and various social networking accounts to support the Oracle ecosystem continuously since 2010.","sameAs":["http:\/\/www.bugraparlayan.com.tr\/"],"url":"https:\/\/dbtut.com\/index.php\/author\/bugraparlayan\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/posts\/54922","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/users\/574"}],"replies":[{"embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/comments?post=54922"}],"version-history":[{"count":1,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/posts\/54922\/revisions"}],"predecessor-version":[{"id":54927,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/posts\/54922\/revisions\/54927"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/media\/54926"}],"wp:attachment":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/media?parent=54922"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/categories?post=54922"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/tags?post=54922"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}