Authorisations - privileges, PL-SQL Programming

Authorisations - Privileges

As relational theory is silent on the issue of authorisation, it offers nothing with which SQL's vast edifice in support of what it calls privileges can be compared.Example is a very simple case showing how the corresponding example could be done in SQL.

 Example: Granting privileges GRANT SELECT, INSERT, DELETE, UPDATE ON ENROLMENT TO User9 ;

Explanation:

  1. GRANT is the key word indicating that privileges are being granted.
  2. SELECT, INSERT, DELETE, UPDATE identify operators that can be applied to a base table. The first, SELECT, is used here to indicate that permission to access the current value is being granted. The others are all update operators with very much the same effects as their counterparts in Tutorial D. If DELETE were omitted, for example, then User9 would not be allowed to use DELETE commands on ENROLMENT.
  3.  ON ENROLMENT identifies the base table on which those privileges are being granted.
  4. TO is the key word required to precede the commalist of user names, officially termed authorization identifiers, denoting the users on whom the specified privileges are to be conferred.

So, the example actually grants four distinct privileges.

Posted Date: 1/18/2013 1:26:49 AM | Location : United States







Related Discussions:- Authorisations - privileges, Assignment Help, Ask Question on Authorisations - privileges, Get Answer, Expert's Help, Authorisations - privileges Discussions

Write discussion on Authorisations - privileges
Your posts are moderated
Related Questions
PRIMARY KEY: PRIMARY KEY  indicates that the table is subject to a key constraint, in this case declaring that no two rows in the table assigned to ENROLMENT can ever have the

Effect of Anonymous Columns Now, recall that a VALUES expression denotes a table with undefined column names. If an initial value is to be specified when a base table is creat

Project Description: This is stage 1 of a larger conversion project. We are converting a traditional Server/Client application written in Access 2007 into a web interface with S

The accuracy of product table data is critical and the Brwebean's. owner wants to have an audit file that contains information regarding all DML activity on the BB_PRODUCT table. T

Control Structures The Control structures are the most important PL/SQL extension to the SQL. Not only does PL/SQL let you manipulate Oracle data, it lets you process the data

Use External Routines The PL/SQL is particular for the SQL transaction processing. Therefore, several tasks are more quickly completed in a lower-level language like C that is

Need Azure CRM Web Application with two-factor authentication We presently have a CRM-like database stored on MS Azure that we presently access over an MS Access application. It

Declaring Subprograms   You can declare subprograms in any PL/SQL subprogram, block, or package. But, you should declare subprograms at the end of the declarative part after a

Cursors The Oracle uses work areas to execute the SQL statements and to store process information. A PL/SQL construct known as the cursor. Let's you assume name a work area and

Why Use Cursor Variables ? Primarily, you use the cursor variables to pass the query result sets between the PL/SQL stored subprograms and different clients. Neither PL/SQL nor