Oracle DBMS_MACADM
Version 21c

General Information
Library Note Morgan's Library Page Header
Which has the higher priority in your organization: Deploying a new database or securing the ones you already have? Looking for a website, and resources, dedicated solely to securing Oracle databases? Check out DBSecWorx.
Purpose Database Vault Administration Utilities
AUTHID DEFINER
Constants
Name Data Type Value
 Global
MANDATORY_REALM BINARY_INTEGER 1
ACTOR_TYPE_CREATION_AUDIT PLS_INTEGER 20032
FACTOR_TYPE_DELETION_AUDIT PLS_INTEGER 20033
FACTOR_TYPE_UPDATE_AUDIT PLS_INTEGER 20034
FACTOR_TYPE_RENAME_AUDIT PLS_INTEGER 20035
FACTOR_CREATION_AUDIT PLS_INTEGER 20036
FACTOR_DELETION_AUDIT PLS_INTEGER 20037
FACTOR_UPDATE_AUDIT PLS_INTEGER 20038
FACTOR_RENAME_AUDIT PLS_INTEGER 20039
ADD_FACTOR_LINK_AUDIT PLS_INTEGER 20040
DELETE_FACTOR_LINK_AUDIT PLS_INTEGER 20041
ADD_POLICY_FACTOR_AUDIT PLS_INTEGER 20042
DELETE_POLICY_FACTOR_AUDIT PLS_INTEGER 20043
IDENTITY_CREATION_AUDIT PLS_INTEGER 20044
IDENTITY_DELETION_AUDIT PLS_INTEGER 20045
IDENTITY_UPDATE_AUDIT PLS_INTEGER 20046
CHANGE_IDENTITY_FACTOR_AUDIT PLS_INTEGER 20047
CHANGE_IDENTITY_VALUE_AUDIT PLS_INTEGER 20048
IDENTITY_MAP_CREATION_AUDIT PLS_INTEGER 20049
IDENTITY_MAP_DELETION_AUDIT PLS_INTEGER 20050
POLICY_LABEL_CREATION_AUDIT PLS_INTEGER 20051
POLICY_LABEL_DELETION_AUDIT PLS_INTEGER 20052
MAC_POLICY_CREATION_AUDIT PLS_INTEGER 20053
MAC_POLICY_UPDATE_AUDIT PLS_INTEGER 20054
MAC_POLICY_DELETION_AUDIT PLS_INTEGER 20055
ROLE_CREATION_AUDIT PLS_INTEGER 20056
ROLE_DELETION_AUDIT PLS_INTEGER 20057
ROLE_UPDATE_AUDIT PLS_INTEGER 20058
ROLE_RENAME_AUDIT PLS_INTEGER 20059
DOMAIN_IDENTITY_CREATION_AUDIT PLS_INTEGER 20060
DOMAIN_IDENTITY_DROP_AUDIT PLS_INTEGER 20061
 DV Policy States
G_DISABLED NUMBER 0
G_ENABLED NUMBER 1
G_SIMULATION NUMBER 2
G_PARTIAL NUMBER 3
 DV Object Types
G_REALM NUMBER 1
G_COMMAND_RULE NUMBER 2
Dependencies
DBMS_ASSERT DV_ADMIN_GRANTEES KZV$ADM_LIBT
DBMS_MACUTL DV_DICT_OBJ_NAME REALM_T$
DBMS_STANDARD DV_OWNER_GRANTEES ROLE$
DUAL DV_SQL_TEXT RULE$
DV$FACTOR DV_SYSEVENT REALM_T$
DV$FACTOR_TYPE FACTOR$ ROLE$
DV$MAC_POLICY FACTOR_T$ RULE$
DV$REALM FACTOR_TYPE$ RULE_SET$
DV$RULE FACTOR_TYPE_T$ RULE_SET_T$
DV$RULE_SET GET_REQUIRED_SCOPE RULE_T$
DV$RULE_SET_RULE IDENTITY$  
Documented Database Vault Administrator's Guide
Exceptions
Error Code Reason
ORA-20081 Command not found
ORA-20100 Command rule already defined
ORA-20102 Error creating Command Rule
ORA-47503 Database Vault is not enabled in CDB$ROOT or application root.
First Available 12.1
Security Model Owned by DVSYS with EXECUTE granted to DV_ADMIN and DV_POLICY_OWNER

Direct access to some subprograms in this package is prevented by an ACCESSIBLE BY clause.
Source {ORACLE_HOME}/rdbms/admin/catmacp.sql
{ORACLE_HOME}/rdbms/admin/prvtmacp.sql
Subprograms
ADD_APP_EXCEPTION CREATE_POLICY ENABLE_EVENT
ADD_AUTH_TO_REALM CREATE_POLICY_LABEL ENABLE_ORADEBUG
ADD_CMD_RULE_TO_POLICY CREATE_REALM GET_DB_CHARSET
ADD_FACTOR_LINK CREATE_ROLE GET_INSTANCE_INFO
ADD_INDEX_FUNCTION CREATE_RULE GET_ORA_LANG
ADD_NLS_DATA CREATE_RULE_SET GET_SESSION_INFO
ADD_OBJECT_TO_REALM CREATE_SESSION_EVENT_CMD_RULE IS_ALTER_USER_ALLOW_VARCHAR
ADD_OWNER_TO_POLICY CREATE_SYSTEM_EVENT_CMD_RULE IS_DROP_USER_ALLOW_VARCHAR
ADD_POLICY_FACTOR DELETE_APP_EXCEPTION RENAME_FACTOR
ADD_REALM_TO_POLICY DELETE_AUTH_FROM_REALM RENAME_FACTOR_TYPE
ADD_RULE_TO_RULE_SET DELETE_CMD_RULE_FROM_POLICY RENAME_POLICY
ALLOW_COMMON_OPERATION DELETE_COMMAND_RULE RENAME_REALM
AUTHORIZE_DATAPUMP_USER DELETE_CONNECT_COMMAND_RULE RENAME_ROLE
AUTHORIZE_DBCAPTURE DELETE_FACTOR RENAME_RULE
AUTHORIZE_DBREPLAY DELETE_FACTOR_LINK RENAME_RULE_SET
AUTHORIZE_DDL DELETE_FACTOR_TYPE SET_PRESERVE_CASE
AUTHORIZE_DEBUG_CONNECT DELETE_IDENTITY UNAUTHORIZE_DATAPUMP_USER
AUTHORIZE_DIAGNOSTIC_ADMIN DELETE_IDENTITY_MAP UNAUTHORIZE_DBCAPTURE
AUTHORIZE_MAINTENANCE_USER DELETE_INDEX_FUNCTION UNAUTHORIZE_DBREPLAY
AUTHORIZE_PREPROCESSOR DELETE_MAC_POLICY_CASCADE UNAUTHORIZE_DDL
AUTHORIZE_PROXY_USER DELETE_OBJECT_FROM_REALM UNAUTHORIZE_DEBUG_CONNECT
AUTHORIZE_SCHEDULER_USER DELETE_OWNER_FROM_POLICY UNAUTHORIZE_DIAGNOSTIC_ADMIN
AUTHORIZE_TTS_USER DELETE_POLICY_FACTOR UNAUTHORIZE_MAINTENANCE_USER
AUTH_DATAPUMP_CREATE_USER DELETE_POLICY_LABEL UNAUTHORIZE_PREPROCESSOR
AUTH_DATAPUMP_GRANT DELETE_REALM UNAUTHORIZE_PROXY_USER
AUTH_DATAPUMP_GRANT_ROLE DELETE_REALM_CASCADE UNAUTHORIZE_SCHEDULER_USER
AUTH_DATAPUMP_GRANT_SYSPRIV DELETE_REALM_FROM_POLICY UNAUTHORIZE_TTS_USER
CHANGE_IDENTITY_FACTOR DELETE_ROLE UNAUTH_DATAPUMP_CREATE_USER
CHANGE_IDENTITY_VALUE DELETE_RULE UNAUTH_DATAPUMP_GRANT
CHECK_BACKUP_PARM_VARCHAR DELETE_RULE_FROM_RULE_SET UNAUTH_DATAPUMP_GRANT_ROLE
CHECK_DB_FILE_PARM_VARCHAR DELETE_RULE_SET UNAUTH_DATAPUMP_GRANT_SYSPRIV
CHECK_DUMP_DEST_PARM_VARCHAR DELETE_SESSION_EVENT_CMD_RULE UPDATE_COMMAND_RULE
CHECK_DYNRLS_PARM_VARCHAR DELETE_SYSTEM_EVENT_CMD_RULE UPDATE_CONNECT_COMMAND_RULE
CHECK_O7_PARM_VARCHAR DISABLE_APP_PROTECTION UPDATE_FACTOR
CHECK_OPTIMIZER_PARM_VARCHAR DISABLE_DV UPDATE_FACTOR_TYPE
CHECK_PLSQL_PARM_VARCHAR DISABLE_DV_DICTIONARY_ACCTS UPDATE_IDENTITY
CHECK_SECURITY_PARM_VARCHAR DISABLE_DV_PATCH_ADMIN_AUDIT UPDATE_MAC_POLICY
CHECK_SYS_SEC_PARM_VARCHAR DISABLE_EVENT UPDATE_POLICY_DESCRIPTION
CHECK_TRIG_PARM_VARCHAR DISABLE_ORADEBUG UPDATE_POLICY_STATE
CREATE_COMMAND_RULE DROP_DOMAIN_IDENTITY UPDATE_REALM
CREATE_CONNECT_COMMAND_RULE DROP_POLICY UPDATE_REALM_AUTH
CREATE_DOMAIN_IDENTITY DV_SANITY_CHECK UPDATE_ROLE
CREATE_FACTOR ENABLE_APP_PROTECTION UPDATE_RULE
CREATE_FACTOR_TYPE ENABLE_DV UPDATE_RULE_SET
CREATE_IDENTITY ENABLE_DV_DICTIONARY_ACCTS UPDATE_SESSION_EVENT_CMD_RULE
CREATE_IDENTITY_MAP ENABLE_DV_PATCH_ADMIN_AUDIT UPDATE_SYSTEM_EVENT_CMD_RULE
CREATE_MAC_POLICY    
 
ADD_APP_EXCEPTION
Add a package to exception list dbms_macadm.add_app_exception(
owner        IN VARCHAR2,
package_name IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(add_app_exception, AUTO_WITH_COMMIT);
exec dvsys.dbms_macadm.add_app_exception('C##UWCLASS','COMMON_UTILS');
BEGIN dvsys.dbms_macadm.add_app_exception('C##UWCLASS','COMMON_UTILS'); END;
*
ERROR at line 1:
ORA-47503: Database Vault is not enabled in CDB$ROOT or application root.
ORA-06512: at "DVSYS.DBMS_MACADM", line 1403
ORA-06512: at "DVSYS.DBMS_MACADM", line 1741
ORA-06512: at line 1
 
ADD_AUTH_TO_REALM
Authorize a user or role to access a Realm as a participant or owner

Overload 1
dbms_macadm.add_auth_to_realm(
realm_name    IN VARCHAR2,
grantee       IN VARCHAR2,
rule_set_name IN VARCHAR2,
auth_options  IN NUMBER,
auth_scope    IN NUMBER := dvsys.dbms_macutl.g_scope_local);
PRAGMA SUPPLEMENTAL_LOG_DATA(add_auth_to_realm, AUTO_WITH_COMMIT);
TBD
Authorize a user or role to access a Realm as a participant

Overload 2
dbms_macadm.add_auth_to_realm(
realm_name IN VARCHAR2,
grantee    IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(add_auth_to_realm, AUTO_WITH_COMMIT);
TBD
Authorize a user or role to access a Realm as an owner or participant (no Rule Set)

Overload 3
dbms_macadm.add_auth_to_realm(
realm_name   IN VARCHAR2,
grantee      IN VARCHAR2,
auth_options IN NUMBER);
PRAGMA SUPPLEMENTAL_LOG_DATA(add_auth_to_realm, AUTO_WITH_COMMIT);
TBD
Authorize a user or role to access a Realm as a participant (optional)

Overload 4
dbms_macadm.add_auth_to_realm(
realm_name    IN VARCHAR2,
grantee       IN VARCHAR2,
rule_set_name IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(add_auth_to_realm, AUTO_WITH_COMMIT);
TBD
 
ADD_CMD_RULE_TO_POLICY
Add a command rule to a Database Vault policy dbms_macadm.add_cmd_rule_to_policy(
policy_name    IN VARCHAR2,
command        IN VARCHAR2,
object_owner   IN VARCHAR2,
object_name    IN VARCHAR2,
clause_name    IN VARCHAR2 := '%',
parameter_name IN VARCHAR2 := '%',
event_name     IN VARCHAR2 := '%',
component_name IN VARCHAR2 := '%',
action_name    IN VARCHAR2 := '%',
scope          IN NUMBER   := dvsys.dbms_macutl.g_scope_local);
PRAGMA SUPPLEMENTAL_LOG_DATA(add_cmd_rule_to_policy, AUTO_WITH_COMMIT);
TBD
 
ADD_FACTOR_LINK
Specify a parent-child relationship for two factors. The relationship may be used to compute the Factor's identity or label dbms_macadm.add_factor_link(
parent_factor_name IN VARCHAR2,
child_factor_name  IN VARCHAR2,
label_indicator    IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(add_factor_link, AUTO_WITH_COMMIT);
TBD
 
ADD_INDEX_FUNCTION
Add a function to the index functions list for function based index dbms_macadm.add_index_function(objname IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(add_index_function, AUTO_WITH_COMMIT);
TBD
 
ADD_NLS_DATA
BUG FIX 10225918 - Procedure to insert DV metadata in supported languages dbms_macadm.add_nls_data(ang IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(add_nls_data, AUTO_WITH_COMMIT);
exec dvsys.dbms_macadm.add_nls_data('TRADITIONAL CHINESE');

PL/SQL procedure successfully completed.
 
ADD_OBJECT_TO_REALM
Register a set of objects for Realm protection dbms_macadm.add_object_to_realm(
realm_name   IN VARCHAR2,
object_owner IN VARCHAR2,
object_name  IN VARCHAR2,
object_type  IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(add_object_to_realm, AUTO_WITH_COMMIT);
TBD
 
ADD_OWNER_TO_POLICY
Add an owner to Database Vault policy dbms_macadm.add_owner_to_policy(
policy_name IN VARCHAR2,
owner_name  IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(add_owner_to_policy, AUTO_WITH_COMMIT);
TBD
 
ADD_POLICY_FACTOR
Specifies that the label for a Factor contributes to the MAC OLS Label for a policy dbms_macadm.add_policy_factor(
policy_name IN VARCHAR2,
factor_name IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(add_policy_factor, AUTO_WITH_COMMIT);
TBD
 
ADD_REALM_TO_POLICY
Add a realm to a Database Vault policy dbms_macadm.add_realm_to_policy(
policy_name IN VARCHAR2,
realm_name  IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(add_realm_to_policy, AUTO_WITH_COMMIT);
TBD
 
ADD_RULE_TO_RULE_SET
Add a Rule to a Rule Set

Overload 1
dbms_macadm.add_rule_to_rule_set(
rule_set_name IN VARCHAR2,
rule_name     IN VARCHAR2,
rule_order    IN NUMBER,
enabled       IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(add_rule_to_rule_set, AUTO_WITH_COMMIT);
TBD
Add an enabled Rule to a Rule Set

Overload 2
dbms_macadm.add_rule_to_rule_set(
rule_set_name IN VARCHAR2,
rule_name     IN VARCHAR2,
rule_order    IN NUMBER);
PRAGMA SUPPLEMENTAL_LOG_DATA(add_rule_to_rule_set, AUTO_WITH_COMMIT);
TBD
Add an enabled Rule to the end of Rule Set (i.e. evaluated last)

Overload 3
dbms_macadm.add_rule_to_rule_set(
rule_set_name IN VARCHAR2,
rule_name     IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(add_rule_to_rule_set, AUTO_WITH_COMMIT);
TBD
 
ALLOW_COMMON_OPERATION (new 21c)
set allow common operation status to TRUE or FALSE for the whole CDB dbms_macadm.allow_common_operation(status IN BOOLEAN DEFAULT TRUE);
PRAGMA SUPPLEMENTAL_LOG_DATA(allow_common_operation, AUTO_WITH_COMMIT);
exec dvsys.dbms_macadm.allow_common_operation(TRUE);

PL/SQL procedure successfully completed.
 
AUTHORIZE_DATAPUMP_USER
Undocumented dbms_macadm.authorize_datapump_user(
uname   IN VARCHAR2,
sname   IN VARCHAR2 DEFAULT NULL,
objname IN VARCHAR2 DEFAULT NULL,
action  IN VARCHAR2 DEFAULT NULL);
PRAGMA SUPPLEMENTAL_LOG_DATA(authorize_datapump_user, AUTO_WITH_COMMIT);
TBD
 
AUTHORIZE_DBCAPTURE
Authorize a user as Database Replay admin to run capture dbms_macadm.authorize_dbcapture(uname IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(authorize_dbcapture, AUTO_WITH_COMMIT);
exec dvsys.dbms_macadm.authorize_dbcapture('C##UWCLASS');
BEGIN dvsys.dbms_macadm.authorize_dbcapture('C##UWCLASS'); END;
*
ERROR at line 1:
ORA-01031: insufficient privileges
ORA-06512: at "DVSYS.DBMS_MACADM", line 1403
ORA-06512: at "DVSYS.DBMS_MACADM", line 1604
ORA-06512: at line 1
 
AUTHORIZE_DBREPLAY
Authorize a user as Database Replay admin to run replay dbms_macadm.authorize_dbreplay(uname IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(authorize_dbcapture, AUTO_WITH_COMMIT);
exec dvsys.dbms_macadm.authorize_dbreplay('C##UWCLASS');
BEGIN dvsys.dbms_macadm.authorize_dbreplay('C##UWCLASS'); END;
*
ERROR at line 1:
ORA-01031: insufficient privileges
ORA-06512: at "DVSYS.DBMS_MACADM", line 1403
ORA-06512: at "DVSYS.DBMS_MACADM", line 1615
ORA-06512: at line 1
 
AUTHORIZE_DDL
Authorize a user to execute DDLs on another user's schema dbms_macadm.authorize_ddl(
uname IN VARCHAR2,
sname IN VARCHAR2 DEFAULT NULL);
PRAGMA SUPPLEMENTAL_LOG_DATA(authorize_ddl, AUTO_WITH_COMMIT);
TBD
 
AUTHORIZE_DEBUG_CONNECT
Authorize a user to connect to  another user's session to a PL/SQL debugger dbms_macadm.authorize_debug_connect(
uname IN VARCHAR2,
sname IN VARCHAR2 DEFAULT NULL);
PRAGMA SUPPLEMENTAL_LOG_DATA(authorize_debug_connect, AUTO_WITH_COMMIT);
TBD
 
AUTHORIZE_DIAGNOSTIC_ADMIN
Authorize a user to access a list of diagnostic fixed tables/views dbms_macadm.authorize_diagnostic_admin(uname IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(authorize_diagnostic_admin, AUTO_WITH_COMMIT);
TBD
 
AUTHORIZE_MAINTENANCE_USER
Authorize a user to execute maintenance related DDL dbms_macadm.authorize_maintenance_user(
uname   IN VARCHAR2,
sname   IN VARCHAR2 DEFAULT NULL,
objname IN VARCHAR2 DEFAULT NULL,
objtype IN VARCHAR2 DEFAULT '%',
action  IN VARCHAR2 DEFAULT NULL);
PRAGMA SUPPLEMENTAL_LOG_DATA(authorize_maintenance_user, AUTO_WITH_COMMIT);
TBD
 
AUTHORIZE_PREPROCESSOR
Authorize a user to execute PREPROCESSOR directive in external tables dbms_macadm.authorize_preprocessor(uname IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(authorize_preprocessor, AUTO_WITH_COMMIT);
exec dvsys.dbms_macadm.authorize_preprocessor('C##UWCLASS');
BEGIN dvsys.dbms_macadm.authorize_preprocessor('C##UWCLASS'); END;
*
ERROR at line 1:
ORA-01031: insufficient privileges
ORA-06512: at "DVSYS.DBMS_MACADM", line 1403
ORA-06512: at "DVSYS.DBMS_MACADM", line 1578
ORA-06512: at line 1
 
AUTHORIZE_PROXY_USER
Authorize a user to proxy as another user dbms_macadm.authorize_proxy_user(
uname IN VARCHAR2,
sname IN VARCHAR2 DEFAULT NULL);
PRAGMA SUPPLEMENTAL_LOG_DATA(authorize_proxy_user, AUTO_WITH_COMMIT);
-- found in $ORACLE_HOME/rdbms/admin/catmacpost.sql
BEGIN
  dbms_macadm.authorize_scheduler_user('SYS', 'EXFSYS');
  EXCEPTION
    WHEN OTHERS THEN
      -- ignore the error if EXFSYS is not created
      IF SQLCODE IN (-47324, -47951) THEN
        NULL;
  ELSE
    RAISE;
  END IF;
END;
/
 
AUTHORIZE_SCHEDULER_USER
Authorize a user to run jobs in the schema of other users dbms_macadm.authorize_scheduler_user(
uname IN VARCHAR2,
sname IN VARCHAR2 DEFAULT NULL);
PRAGMA SUPPLEMENTAL_LOG_DATA(authorize_scheduler_user, AUTO_WITH_COMMIT);
TBD
 
AUTHORIZE_TTS_USER
Undocumented dbms_macadm.authorize_tts_user(
uname  IN VARCHAR2,
tsname IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(authorize_tts_user, AUTO_WITH_COMMIT);
TBD
 
AUTH_DATAPUMP_CREATE_USER
Undocumented dbms_macadm.auth_datapump_create_user(uname IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(auth_datapump_create_user, AUTO_WITH_COMMIT);
TBD
 
AUTH_DATAPUMP_GRANT
Undocumented dbms_macadm.auth_datapump_grant(uname IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(auth_datapump_grant, AUTO_WITH_COMMIT);
TBD
 
AUTH_DATAPUMP_GRANT_ROLE
Undocumented dbms_macadm.auth_datapump_grant_role(
uname IN VARCHAR2,
role  IN VARCHAR2 DEFAULT '%');
PRAGMA SUPPLEMENTAL_LOG_DATA(auth_datapump_grant_role, AUTO_WITH_COMMIT);
TBD
 
AUTH_DATAPUMP_GRANT_SYSPRIV
Undocumented dbms_macadm.auth_datapump_grant_syspriv(uname IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(auth_datapump_grant_syspriv, AUTO_WITH_COMMIT);
TBD
 
CHANGE_IDENTITY_FACTOR
Associate an identity with a different Factor dbms_macadm.change_identity_factor(
factor_name     IN VARCHAR2,
value           IN VARCHAR2,
new_factor_name IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(change_identity_factor, AUTO_WITH_COMMIT);
TBD
 
CHANGE_IDENTITY_VALUE
Alters the value of an Identity dbms_macadm.change_identity_value(
factor_name IN VARCHAR2,
value       IN VARCHAR2,
new_value   IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(change_identity_value, AUTO_WITH_COMMIT);
TBD
 
CHECK_BACKUP_PARM_VARCHAR
Undocumented dbms_macadm.check_backup_parm_varchar(
TBD
 
CHECK_DB_FILE_PARM_VARCHAR
Check if the ALTER SYSTEM CONTROL_FILES parameter is allowed dbms_macadm.check_db_file_parm_varchar RETURN VARCHAR2;
PRAGMA SUPPLEMENTAL_LOG_DATA(check_db_file_parm_varchar, NONE);
SELECT dvsys.dbms_macadm.check_db_file_parm_varchar
FROM dual;

CHECK_DB_FILE_PARM_VARCHAR
---------------------------
Y
 
CHECK_DUMP_DEST_PARM_VARCHAR
Determine if the ALTER SYSTEM RECYCLEBIN backup restore parameter is allowed dbms_macadm.check_dump_dest_parm_varchar RETURN VARCHAR2;
PRAGMA SUPPLEMENTAL_LOG_DATA(check_dump_dest_parm_varchar, NONE);
SELECT dvsys.dbms_macadm.check_dump_dest_parm_varchar
FROM dual;

CHECK_DUMP_DEST_PARM_VARCHAR
-----------------------------
Y
 
CHECK_DYNRLS_PARM_VARCHAR
Determine if 3 ALTER SYSTEM _dynamic_rls_policies parameters are allowed dbms_macadm.check_dynrls_parm_varchar RETURN VARCHAR2;
PRAGMA SUPPLEMENTAL_LOG_DATA(check_dynrls_parm_varchar, NONE);
SELECT dvsys.dbms_macadm.check_dynrls_parm_varchar
FROM dual;

CHECK_DYNRLS_PARM_VARCHAR
--------------------------
Y
 
CHECK_O7_PARM_VARCHAR
Determine if the ALTER SYSTEM O7_DICTIONARY _ACCESSIBILITY parameter is allowed dbms_macadm.check_o7_parm_varchar RETURN VARCHAR2;
PRAGMA SUPPLEMENTAL_LOG_DATA(check_o7_parm_varchar, NONE);
SELECT dvsys.dbms_macadm.check_o7_parm_varchar
FROM dual;

CHECK_O7_PARM_VARCHAR
----------------------
Y
 
CHECK_OPTIMIZER_PARM_VARCHAR
Check if the ALTER SYSTEM  OPTIMIZER_SECURE_VIEW _MERGING parameter is allowed dbms_macadm.check_optimizer_parm_varchar RETURN VARCHAR2;
PRAGMA SUPPLEMENTAL_LOG_DATA(check_optimizer_parm_varchar, NONE);
SELECT dvsys.dbms_macadm.check_optimizer_parm_varchar
FROM dual;

CHECK_OPTIMIZER_PARM_VARCHAR
-----------------------------
Y
 
CHECK_PLSQL_PARM_VARCHAR
Check if the ALTER SYSTEM PLSQL_DEBUG and UTL_FILE_DIR parameters are allowed dbms_macadm.check_plsql_parm_varchar RETURN VARCHAR2;
PRAGMA SUPPLEMENTAL_LOG_DATA(check_optimizer_parm_varchar, NONE);
SELECT dvsys.dbms_macadm.check_plsql_parm_varchar
FROM dual;

CHECK_PLSQL_PARM_VARCHAR
-------------------------
Y
 
CHECK_SECURITY_PARM_VARCHAR
Check if X ALTER SYSTEM parameters are allowed dbms_macadm.check_security_parm_varchar RETURN VARCHAR2;
PRAGMA SUPPLEMENTAL_LOG_DATA(check_security_parm_varchar, NONE);
SELECT dvsys.dbms_macadm.check_security_parm_varchar
FROM dual;

CHECK_SECURITY_PARM_VARCHAR
----------------------------
Y
 
CHECK_SYS_SEC_PARM_VARCHAR
Determine if 6 ALTER SYSTEM security system parameters are allowed dbms_macadm.check_sys_sec_parm_varchar RETURN VARCHAR2;
PRAGMA SUPPLEMENTAL_LOG_DATA(check_sys_sec_parm_varchar, NONE);
SELECT dvsys.dbms_macadm.check_sys_sec_parm_varchar
FROM dual;

CHECK_SYS_SEC_PARM_VARCHAR
---------------------------
Y
 
CHECK_TRIG_PARM_VARCHAR
Check state of alter system set system_trig_enabled dbms_macadm.check_trig_parm_varchar RETURN VARCHAR2;
PRAGMA SUPPLEMENTAL_LOG_DATA(check_trig_parm_varchar, NONE);
SELECT dvsys.dbms_macadm.check_trig_parm_varchar
FROM dual;

CHECK_TRIG_PARM_VARCHAR
------------------------
Y
 
CREATE_COMMAND_RULE
Protect a database command by associating it with a Rule Set

The command can only be executed if the Rule Set evaluates to TRUE
dbms_macadm.create_command_rule(
command         IN VARCHAR2,
rule_set_name   IN VARCHAR2,
object_owner    IN VARCHAR2,
object_name     IN VARCHAR2,
enabled         IN VARCHAR2,
privilege_scope IN NUMBER   DEFAULT NULL,
clause_name     IN VARCHAR2 := '%',
parameter_name  IN VARCHAR2 := '%',
event_name      IN VARCHAR2 := '%',
component_name  IN VARCHAR2 := '%',
action_name     IN VARCHAR2 := '%',
scope           IN NUMBER   := dvsys.dbms_macutl.g_scope_local,
pl_sql_stack    IN BOOLEAN  DEFAULT FALSE);
PRAGMA SUPPLEMENTAL_LOG_DATA(create_command_rule, AUTO_WITH_COMMIT);
TBD
 
CREATE_CONNECT_COMMAND_RULE
Create a CONNECT Command Rule declaration dbms_macadm.create_connect_command_rule(
user_name     IN VARCHAR2,
rule_set_name IN VARCHAR2,
enabled       IN VARCHAR2,
scope         IN NUMBER := dvsys.dbms_macutl.g_scope_local);
PRAGMA SUPPLEMENTAL_LOG_DATA(create_connect_command_rule, AUTO_WITH_COMMIT);
TBD
 
CREATE_DOMAIN_IDENTITY
Add a RAC database node to a domain dbms_macadm.create_domain_identity(
domain_name  IN VARCHAR2,
domain_host  IN VARCHAR2,
policy_name  IN VARCHAR2 DEFAULT NULL,
domain_label IN VARCHAR2 DEFAULT NULL);
PRAGMA SUPPLEMENTAL_LOG_DATA(create_domain_identity, AUTO_WITH_COMMIT);
TBD
 
CREATE_FACTOR
Create a new Factor dbms_macadm.create_factor(
factor_name         IN VARCHAR2,
factor_type_name    IN VARCHAR2,
description         IN VARCHAR2,
rule_set_name       IN VARCHAR2,
get_expr            IN VARCHAR2,
validate_expr       IN VARCHAR2,
identify_by         IN NUMBER,
labeled_by          IN NUMBER,
eval_options        IN NUMBER,
audit_options       IN NUMBER,
fail_options        IN NUMBER,
namespace           IN VARCHAR2 DEFAULT NULL,
namespace_attribute IN VARCHAR2 DEFAULT NULL);
PRAGMA SUPPLEMENTAL_LOG_DATA(create_factor, AUTO_WITH_COMMIT);
TBD
 
CREATE_FACTOR_TYPE
Creates a Factor Type dbms_macadm.create_factor_type(
name        IN VARCHAR2,
description IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(create_factor_type, AUTO_WITH_COMMIT);
TBD
 
CREATE_IDENTITY
Creates an Identity dbms_macadm.create_identity(
factor_name IN VARCHAR2,
value       IN VARCHAR2,
trust_level IN NUMBER);
PRAGMA SUPPLEMENTAL_LOG_DATA(create_identity, AUTO_WITH_COMMIT);
TBD
 
CREATE_IDENTITY_MAP
Define a set of tests that are used to derive the identity of a Factor from the value of linked child factors (sub-factors) dbms_macadm.create_identity_map(
identity_factor_name  IN VARCHAR2,
identity_factor_value IN VARCHAR2,
parent_factor_name    IN VARCHAR2,
child_factor_name     IN VARCHAR2,
operation             IN VARCHAR2,
operand1              IN VARCHAR2,
operand2              IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(create_identity_map, AUTO_WITH_COMMIT);
TBD
 
CREATE_MAC_POLICY
Specify the algorithm that is used to merge labels when computing the label for a Factor, or the MAC OLS Session label dbms_macadm.create_mac_policy(
policy_name IN VARCHAR2,
algorithm   IN VARCHAR2,
error_label IN VARCHAR2 DEFAULT NULL);
PRAGMA SUPPLEMENTAL_LOG_DATA(create_mac_policy, AUTO_WITH_COMMIT);
TBD
 
CREATE_POLICY
Create a Database Vault policy dbms_macadm.create_policy(
policy_name  IN VARCHAR2,
description  IN VARCHAR2,
policy_state IN NUMBER,
pl_sql_stack IN BOOLEAN DEFAULT FALSE);
PRAGMA SUPPLEMENTAL_LOG_DATA(create_policy, AUTO_WITH_COMMIT);
TBD
 
CREATE_POLICY_LABEL
Label an Identity within a MAC OLS Policy dbms_macadm.create_policy_label(
identity_factor_name  IN VARCHAR2,
identity_factor_value IN VARCHAR2,
policy_name           IN VARCHAR2,
label                 IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(create_policy_label, AUTO_WITH_COMMIT);
TBD
 
CREATE_REALM
Create a Realm dbms_macadm.create_realm(
realm_name    IN VARCHAR2,
description   IN VARCHAR2,
enabled       IN VARCHAR2,
audit_options IN NUMBER,
realm_type    IN NUMBER  DEFAULT NULL,
realm_scope   IN NUMBER  := dvsys.dbms_macutl.g_scope_local,
pl_sql_stack  IN BOOLEAN DFAULT FALSE);
PRAGMA SUPPLEMENTAL_LOG_DATA(create_realm, AUTO_WITH_COMMIT);
TBD
 
CREATE_ROLE
Create a DV Secure Application Role with role access protected by a Rule Set dbms_macadm.create_role(
role_name     IN VARCHAR2,
enabled       IN VARCHAR2,
rule_set_name IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(create_role, AUTO_WITH_COMMIT);
TBD
 
CREATE_RULE
Create a Rule dbms_macadm.create_rule(
rule_name IN VARCHAR2,
rule_expr IN VARCHAR2,
scope     IN NUMBER := dvsys.dbms_macutl.g_scope_local);
PRAGMA SUPPLEMENTAL_LOG_DATA(create_rule, AUTO_WITH_COMMIT);
TBD
 
CREATE_RULE_SET
Create a Rule Set dbms_macadm.create_rule_set(
rule_set_name   IN VARCHAR2,
description     IN VARCHAR2,
enabled         IN VARCHAR2,
eval_options    IN NUMBER,
audit_options   IN NUMBER,
fail_options    IN NUMBER,
fail_message    IN VARCHAR2,
fail_code       IN NUMBER,
handler_options IN NUMBER,
handler         IN VARCHAR2,
is_static       IN BOOLEAN DEFAULT FALSE,
scope           IN NUMBER  := dvsys.dbms_macutl.g_scope_local);
PRAGMA SUPPLEMENTAL_LOG_DATA(create_rule_set, AUTO_WITH_COMMIT);
TBD
 
CREATE_SESSION_EVENT_CMD_RULE
Create a session event command rule declaration dbms_macadm.create_session_event_cmd_rule(
rule_set_name  IN VARCHAR2,
enabled        IN VARCHAR2,
event_name     IN VARCHAR2 := '%',
component_name IN VARCHAR2 := '%',
action_name    IN VARCHAR2 := '%',
scope          IN NUMBER   := dvsys.dbms_macutl.g_scope_local,
pl_sql_stack   IN BOOLEAN  DEFAULT FALSE);
PRAGMA SUPPLEMENTAL_LOG_DATA(create_session_event_cmd_rule, AUTO_WITH_COMMIT);
TBD
 
CREATE_SYSTEM_EVENT_CMD_RULE
Create a system event command rule declaration dbms_macadm.create_system_event_cmd_rule(
rule_set_name  IN VARCHAR2,
enabled        IN VARCHAR2,
event_name     IN VARCHAR2 := '%',
component_name IN VARCHAR2 := '%',
action_name    IN VARCHAR2 := '%',
scope          IN NUMBER   := dvsys.dbms_macutl.g_scope_local,
pl_sql_stack   IN BOOLEAN  DEFAULT FALSE);
PRAGMA SUPPLEMENTAL_LOG_DATA(create_system_event_cmd_rule, AUTO_WITH_COMMIT);
TBD
 
DELETE_APP_EXCEPTION
Remove a package to exception list dbms_macadm.delete_app_exception(
owner        IN VARCHAR2,
package_name IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(delete_app_exception, AUTO_WITH_COMMIT);
exec dvsys.dbms_macadm.delete_app_exception('C##UWCLASS','COMMON_UTILS');
BEGIN dvsys.dbms_macadm.delete_app_exception('C##UWCLASS','COMMON_UTILS'); END;
*
ERROR at line 1:
ORA-47503: Database Vault is not enabled in CDB$ROOT or application root.
ORA-06512: at "DVSYS.DBMS_MACADM", line 1435
ORA-06512: at "DVSYS.DBMS_MACADM", line 1747
ORA-06512: at line 1
 
DELETE_AUTH_FROM_REALM
Remove the authorization of a user or role to access a Realm dbms_macadm.delete_auth_from_realm(
realm_name IN VARCHAR2,
grantee    IN VARCHAR2,
auth_scope IN NUMBER := dvsys.dbms_macutl.g_scope_local);
PRAGMA SUPPLEMENTAL_LOG_DATA(delete_auth_from_realm, AUTO_WITH_COMMIT);
TBD
 
DELETE_CMD_RULE_FROM_POLICY
Delete a command rule from a Database Vault policy dbms_macadm.delete_cmd_rule_from_policy(
policy_name    IN VARCHAR2,
command        IN VARCHAR2,
object_owner   IN VARCHAR2,
object_name    IN VARCHAR2,
clause_name    IN VARCHAR2 := '%',
parameter_name IN VARCHAR2 := '%',
event_name     IN VARCHAR2 := '%',
component_name IN VARCHAR2 := '%',
action_name    IN VARCHAR2 := '%',
scope          IN NUMBER   := dvsys.dbms_macutl.g_scope_local);
PRAGMA SUPPLEMENTAL_LOG_DATA(delete_cmd_rule_from_policy, AUTO_WITH_COMMIT);
TBD
 
DELETE_COMMAND_RULE
Drop a Command Rule declaration dbms_macadm.delete_command_rule(
command        IN VARCHAR2,
object_owner   IN VARCHAR2,
object_name    IN VARCHAR2,
clause_name    IN VARCHAR2 := '%',
parameter_name IN VARCHAR2 := '%',
event_name     IN VARCHAR2 := '%',
component_name IN VARCHAR2 := '%',
action_name    IN VARCHAR2 := '%',
scope          IN NUMBER   := dvsys.dbms_macutl.g_scope_local);
PRAGMA SUPPLEMENTAL_LOG_DATA(delete_command_rule, AUTO_WITH_COMMIT);
TBD
 
DELETE_CONNECT_COMMAND_RULE
Delete a CONNECT Command Rule declaration dbms_macadm.delete_connect_command_rule(
user_name IN VARCHAR2,
scope     IN NUMBER := dvsys.dbms_macutl.g_scope_local);
PRAGMA SUPPLEMENTAL_LOG_DATA(delete_connect_command_rule, AUTO_WITH_COMMIT);
TBD
 
DELETE_FACTOR
Deletes a Factor dbms_macadm.delete_factor(factor_name IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(delete_factor, AUTO_WITH_COMMIT);
TBD
 
DELETE_FACTOR_LINK
Remove a parent-child relationship between two factors dbms_macadm.delete_factor_link(
parent_factor_name IN VARCHAR2,
child_factor_name  IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(delete_factor_link, AUTO_WITH_COMMIT);
TBD
 
DELETE_FACTOR_TYPE
Deletes a Factor Type dbms_macadm.delete_factor_type(name IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(delete_factor_type, AUTO_WITH_COMMIT);
TBD
 
DELETE_IDENTITY
Drops an Identity dbms_macadm.delete_identity(
factor_name IN VARCHAR2,
value       IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(delete_identity, AUTO_WITH_COMMIT);
TBD
 
DELETE_IDENTITY_MAP
Drops the Identity Map for a Factor dbms_macadm.delete_identity_map(
identity_factor_name  IN VARCHAR2,
identity_factor_value IN VARCHAR2,
parent_factor_name    IN VARCHAR2,
child_factor_name     IN VARCHAR2,
operation             IN VARCHAR2,
operand1              IN VARCHAR2,
operand2              IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(delete_identity_map, AUTO_WITH_COMMIT);
TBD
 
DELETE_INDEX_FUNCTION
Delete a function from the index functions list for function based index dbms_macadm.delete_index_function(objname IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(delete_index_function, AUTO_WITH_COMMIT);
TBD
 
DELETE_MAC_POLICY_CASCADE
Deletes all DV objects related to an OLS policy dbms_macadm.delete_mac_policy_cascade(policy_name IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(delete_mac_policy_cascade, AUTO_WITH_COMMIT);
TBD
 
DELETE_OBJECT_FROM_REALM
Remove a set of objects from Realm protection dbms_macadm.delete_object_from_realm(
realm_name   IN VARCHAR2,
object_owner IN VARCHAR2,
object_name  IN VARCHAR2,
object_type  IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(delete_object_from_realm, AUTO_WITH_COMMIT);
TBD
 
DELETE_OWNER_FROM_POLICY
Delete an owner from a Database Vault policy dbms_macadm.delete_owner_from_policy(
policy_name IN VARCHAR2,
owner_name  IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(delete_owner_from_policy, AUTO_WITH_COMMIT);
TBD
 
DELETE_POLICY_FACTOR
Removes the Factor from contributing to the MAC OLS Label dbms_macadm.delete_policy_factor(
policy_name IN VARCHAR2,
factor_name IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(delete_policy_factor, AUTO_WITH_COMMIT);
TBD
 
DELETE_POLICY_LABEL
Drop the Label from an Identity within a MAC OLS Policy dbms_macadm.delete_policy_label(
identity_factor_name  IN VARCHAR2,
identity_factor_value IN VARCHAR2,
policy_name           IN VARCHAR2,
label                 IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(delete_policy_label, AUTO_WITH_COMMIT);
TBD
 
DELETE_REALM
Drop a Realm dbms_macadm.delete_realm(realm_name IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(delete_realm, AUTO_WITH_COMMIT);
TBD
 
DELETE_REALM_CASCADE
Deletes Realm including the related Realm objects (realm_object$), and authorizations (realm_auth$) dbms_macadm.delete_realm_cascade(realm_name IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(delete_realm_cascade, AUTO_WITH_COMMIT);
TBD
 
DELETE_REALM_FROM_POLICY
Delete a realm from a Database Vault policy dbms_macadm.delete_realm_from_policy(
policy_name IN VARCHAR2,
realm_name  IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(delete_realm_from_policy, AUTO_WITH_COMMIT);
TBD
 
DELETE_ROLE
Drop a DV Secure Application Role dbms_macadm.delete_role(role_name IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(delete_role, AUTO_WITH_COMMIT);
TBD
 
DELETE_RULE
Delete a Rule dbms_macadm.delete_rule(rule_name IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(delete_rule, AUTO_WITH_COMMIT);
TBD
 
DELETE_RULE_FROM_RULE_SET
Delete a Rule from a Rule Set dbms_macadm.delete_rule_from_rule_set(
rule_set_name IN VARCHAR2,
rule_name     IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(delete_rule_from_rule_set, AUTO_WITH_COMMIT);
TBD
 
DELETE_RULE_SET
Delete a Rule Set dbms_macadm.delete_rule_set(rule_set_name IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(delete_rule_set, AUTO_WITH_COMMIT);
TBD
 
DELETE_SESSION_EVENT_CMD_RULE
Delete a session event command rule declaration dbms_macadm.delete_session_event_cmd_rule(
event_name     IN VARCHAR2 := '%',
component_name IN VARCHAR2 := '%',
action_name    IN VARCHAR2 := '%',
scope          IN NUMBER   := dvsys.dbms_macutl.g_scope_local);
PRAGMA SUPPLEMENTAL_LOG_DATA(delete_session_event_cmd_rule, AUTO_WITH_COMMIT);
TBD
 
DELETE_SYSTEM_EVENT_CMD_RULE
Delete a system event command rule declaration dbms_macadm.delete_system_event_cmd_rule(
event_name     IN VARCHAR2 := '%',
component_name IN VARCHAR2 := '%',
action_name    IN VARCHAR2 := '%',
scope          IN NUMBER   := dvsys.dbms_macutl.g_scope_local);
PRAGMA SUPPLEMENTAL_LOG_DATA(delete_system_event_cmd_rule, AUTO_WITH_COMMIT);
TBD
 
DISABLE_APP_PROTECTION
Disable application protection for whole CDB or one of the PDBs dbms_macadm.disable_app_protection(pdb_name IN VARCHAR2 DEFAULT NULL);
PRAGMA SUPPLEMENTAL_LOG_DATA(disable_app_protection, AUTO_WITH_COMMIT);
exec dvsys.dbms_macadm.disable_app_protection('PDBDEV');
BEGIN dvsys.dbms_macadm.disable_app_protection('PDBDEV'); END;
*
ERROR at line 1:
ORA-01031: insufficient privileges
ORA-06512: at "DVSYS.DBMS_MACADM", line 2822
ORA-06512: at line 1
 
DISABLE_DV
Disable  DV enforcement dbms_macadm.disable_dv;
PRAGMA SUPPLEMENTAL_LOG_DATA(disable_event, NONE);
TBD
 
DISABLE_DV_DICTIONARY_ACCTS
Disable user login to DVSYS and DVF accounts dbms_macadm.disable_dv_dictionary_accts;
PRAGMA SUPPLEMENTAL_LOG_DATA(disable_dv_dictionary_accts, AUTO_WITH_COMMIT);
exec dvsys.dbms_macadm.disable_dv_dictionary_accts;
BEGIN dvsys.dbms_macadm.disable_dv_dictionary_accts; END;
*
ERROR at line 1:
ORA-01031: insufficient privileges
ORA-06512: at "DVSYS.DBMS_MACADM", line 1173
ORA-06512: at line 1
 
DISABLE_DV_PATCH_ADMIN_AUDIT
Disables auditing on dv_patch_admin bypass of DV protection dbms_macadm.disable_dv_patch_admin_audit;
PRAGMA SUPPLEMENTAL_LOG_DATA(disable_dv_patch_admin_audit, AUTO_WITH_COMMIT);
exec dvsys.dbms_macadm.disable_dv_patch_admin_audit;
BEGIN dvsys.dbms_macadm.disable_dv_patch_admin_audit; END;
*
ERROR at line 1:
ORA-01031: insufficient privileges
ORA-06512: at "DVSYS.DBMS_MACADM", line 1185
ORA-06512: at line 1
 
DISABLE_EVENT
Disable Event dbms_macadm.disable_event(event IN NUMBER);
PRAGMA SUPPLEMENTAL_LOG_DATA(disable_event, NONE);
TBD
 
DISABLE_ORADEBUG
Disable ORADEBUG in a DV environment dbms_macadm.disable_oradebug;
PRAGMA SUPPLEMENTAL_LOG_DATA(disable_oradebug, AUTO_WITH_COMMIT);
exec dvsys.dbms_macadm.disable_oradebug;
BEGIN dvsys.dbms_macadm.disable_oradebug; END;
*
ERROR at line 1:
ORA-01031: insufficient privileges
ORA-06512: at "DVSYS.DBMS_MACADM", line 1157
ORA-06512: at line 1
 
DROP_DOMAIN_IDENTITY
Remove a RAC database node from a domain dbms_macadm.drop_domain_identity(
domain_name IN VARCHAR2,
domain_host IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(drop_domain_identity, AUTO_WITH_COMMIT);
TBD
 
DROP_POLICY
Drop Database Vault policy dbms_macadm.drop_policy(policy_name IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(drop_policy, AUTO_WITH_COMMIT);
TBD
 
DV_SANITY_CHECK
Sanity check before configure DV dbms_macadm.dv_sanity_check;
PRAGMA SUPPLEMENTAL_LOG_DATA(dv_sanity_check, NONE);
exec dvsys.dbms_macadm.dv_sanity_check;

PL/SQL procedure successfully completed.
 
ENABLE_APP_PROTECTION
Enable application protection for whole CDB or one of the PDBs dbms_macadm.enable_app_protection(pdb_name IN VARCHAR2 DEFAULT NULL);
PRAGMA SUPPLEMENTAL_LOG_DATA(enable_app_protection, AUTO_WITH_COMMIT);
exec dvsys.dbms_macadm.enable_app_protection('PDBDEV');
BEGIN dvsys.dbms_macadm.enable_app_protection('PDBDEV'); END;
*
ERROR at line 1:
ORA-47503: Database Vault is not enabled in CDB$ROOT or application root.
ORA-06512: at "DVSYS.DBMS_MACADM", line 2811
ORA-06512: at line 1
 
ENABLE_DV
Enabl DV enforcement dbms_macadm.enable_dv(strict_mode IN VARCHAR2 DEFAULT 'N');
PRAGMA SUPPLEMENTAL_LOG_DATA(enable_dv, AUTO_WITH_COMMIT);
TBD
 
ENABLE_DV_DICTIONARY_ACCTS
Enable user login to DVSYS and DVF accounts dbms_macadm.enable_dv_dictionary_accts;
PRAGMA SUPPLEMENTAL_LOG_DATA(enable_dv_dictionary_accts, AUTO_WITH_COMMIT);
exec dvsys.dbms_macadm.enable_dv_dictionary_accts;
BEGIN dvsys.dbms_macadm.enable_dv_dictionary_accts; END;
*
ERROR at line 1:
ORA-01031: insufficient privileges
ORA-06512: at "DVSYS.DBMS_MACADM", line 1165
ORA-06512: at line 1
 
ENABLE_DV_PATCH_ADMIN_AUDIT
Enables auditing on activities performed by user with the DV_PATCH_ADMIN role dbms_macadm.enable_dv_patch_admin_audit;
PRAGMA SUPPLEMENTAL_LOG_DATA(enable_dv_patch_admin_audit, AUTO_WITH_COMMIT);
exec dvsys.dbms_macadm.enable_dv_patch_admin_audit;
BEGIN dvsys.dbms_macadm.enable_dv_patch_admin_audit; END;
*
ERROR at line 1:
ORA-01031: insufficient privileges
ORA-06512: at "DVSYS.DBMS_MACADM", line 1179
ORA-06512: at line 1
 
ENABLE_EVENT
Enable Event dbms_macadm.enable_event(event IN NUMBER);
PRAGMA SUPPLEMENTAL_LOG_DATA(enable_event, NONE);
TBD
 
ENABLE_ORADEBUG
Enable ORADEBUG in a DV environment dbms_macadm.enable_oradebug;
PRAGMA SUPPLEMENTAL_LOG_DATA(enable_oradebug, AUTO_WITH_COMMIT);
conn dvsys
Enter password:
Connected.

exec dvsys.dbms_macadm.enable_oradebug;
 
GET_DB_CHARSET
Returns the character set for the database dbms_macadm.get_db_charset RETURN VARCHAR2;
PRAGMA SUPPLEMENTAL_LOG_DATA(get_db_charset, NONE);
SELECT dvsys.dbms_macadm.get_db_charset
FROM dual;

GET_DB_CHARSET
---------------
AL32UTF8
 
GET_INSTANCE_INFO
Returns information from the sys.v_$instance view dbms_macadm.get_instance_info(p_parameter IN VARCHAR2) RETURN VARCHAR2;
PRAGMA SUPPLEMENTAL_LOG_DATA(get_instance_info, NONE);
SELECT dvsys.dbms_macadm.get_instance_info('HOST_NAME')
FROM dual;
 
GET_ORA_LANG
Returns the 2 or 3 character Oracle language for the current administration session dbms_macadm.get_ora_lang RETURN VARCHAR2;
PRAGMA SUPPLEMENTAL_LOG_DATA(get_ora_lang, NONE);
SELECT dvsys.dbms_macadm.get_ora_lang
FROM dual;

GET_ORA_LANG
-------------
us
 
GET_SESSION_INFO
Returns information from the sys.v_$session view for the current session dbms_macadm.get_session_info(p_parameter IN VARCHAR2) RETURN VARCHAR2;
PRAGMA SUPPLEMENTAL_LOG_DATA(get_session_info, NONE);
SELECT dvsys.dbms_macadm.get_session_info('MACHINE')
FROM dual;

DVSYS.DBMS_MACADM.GET_SESSION_INFO('MACHINE')
----------------------------------------------
PERRITO5


SELECT dvsys.dbms_macadm.get_session_info('PROGRAM')
FROM dual;

DVSYS.DBMS_MACADM.GET_SESSION_INFO('PROGRAM')
----------------------------------------------
sqlplus.exe
 
IS_ALTER_USER_ALLOW_VARCHAR
Check to see if ALTER DVSYS is allowed by the specified user dbms_macadm.is_alter_user_allow_varchar(login_user VARCHAR2) RETURN VARCHAR2;
PRAGMA SUPPLEMENTAL_LOG_DATA(is_alter_user_allow_varchar, NONE);
SELECT dvsys.dbms_macadm.is_alter_user_allow_varchar('MDSYS')
FROM dual;

DVSYS.DBMS_MACADM.IS_ALTER_USER_ALLOW_VARCHAR('MDSYS')
-------------------------------------------------------
N
 
IS_DROP_USER_ALLOW_VARCHAR
Undocumented dbms_macadm.is_drop_user_allow_varchar(login_user VARCHAR2) RETURN VARCHAR2;
PRAGMA SUPPLEMENTAL_LOG_DATA(is_drop_user_allow_varchar, NONE);
SELECT dvsys.dbms_macadm.is_drop_user_allow_varchar('MDSYS')
FROM dual;

DVSYS.DBMS_MACADM.IS_DROP_USER_ALLOW_VARCHAR('MDSYS')
------------------------------------------------------
Y
 
RENAME_FACTOR
Renames a Factor dbms_macadm.rename_factor(
factor_name     IN VARCHAR2,
new_factor_name IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(rename_factor, AUTO_WITH_COMMIT);
TBD
 
RENAME_FACTOR_TYPE
Renames a Factor Type dbms_macadm.rename_factor_type(
old_name IN VARCHAR2,
new_name IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(rename_factor_type, AUTO_WITH_COMMIT);
TBD
 
RENAME_POLICY
Rename exiting Database Vault policy dbms_macadm.rename_policy(
policy_name     IN VARCHAR2,
new_policy_name IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(rename_policy, AUTO_WITH_COMMIT);
TBD
 
RENAME_REALM
Rename a Realm dbms_macadm.rename_realm(
realm_name IN VARCHAR2,
new_name   IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(rename_realm, AUTO_WITH_COMMIT);
TBD
 
RENAME_ROLE
Rename a DV Secure Application Role dbms_macadm.rename_role(
role_name     IN VARCHAR2,
new_role_name IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(rename_role, AUTO_WITH_COMMIT);
TBD
 
RENAME_RULE
Rename a Rule dbms_macadm.rename_rule(
rule_name IN VARCHAR2,
new_name  IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(rename_rule, AUTO_WITH_COMMIT);
TBD
 
RENAME_RULE_SET
Rename a Rule Set dbms_macadm.rename_rule_set(
rule_set_name IN VARCHAR2,
new_name      IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(rename_rule_set, AUTO_WITH_COMMIT);
TBD
 
SET_PRESERVE_CASE
Allows mixed case identifiers that are, by default, not allowed dbms_macadm.set_preserve_case(setting IN BOOLEAN);
PRAGMA SUPPLEMENTAL_LOG_DATA(set_preserve_case, NONE);
exec dvsys.dbms_macadm.set_preserve_case(TRUE);

PL/SQL procedure successfully completed.
 
UNAUTHORIZE_DATAPUMP_USER
Undocumented dbms_macadm.unauthorize_datapump_user(
uname   IN VARCHAR2,
sname   IN VARCHAR2 DEFAULT NULL,
objname IN VARCHAR2 DEFAULT NULL,
action  IN VARCHAR2 DEFAULT NULL);
PRAGMA SUPPLEMENTAL_LOG_DATA(unauthorize_datapump_user, AUTO_WITH_COMMIT);
TBD
 
UNAUTHORIZE_DBCAPTURE
Revoke authorization for a user as Database Replay admin to run capture dbms_macadm.unauthorize_dbcapture(uname IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(unauthorize_dbcapture, AUTO_WITH_COMMIT);
exec dvsys.dbms_macadm.unauthorize_dbcapture('C##UWCLASS');
BEGIN dvsys.dbms_macadm.unauthorize_dbcapture('C##UWCLASS'); END;
*
ERROR at line 1:
ORA-01031: insufficient privileges
ORA-06512: at "DVSYS.DBMS_MACADM", line 1435
ORA-06512: at "DVSYS.DBMS_MACADM", line 1609
ORA-06512: at line 1
 
UNAUTHORIZE_DBREPLAY
Revoke authorization for a user as Database Replay admin to run replay dbms_macadm.unauthorize_dbreplay(uname IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(unauthorize_dbreplay, AUTO_WITH_COMMIT);
exec dvsys.dbms_macadm.unauthorize_dbreplay('C##UWCLASS');
BEGIN dvsys.dbms_macadm.unauthorize_dbreplay('C##UWCLASS'); END;
*
ERROR at line 1:
ORA-01031: insufficient privileges
ORA-06512: at "DVSYS.DBMS_MACADM", line 1435
ORA-06512: at "DVSYS.DBMS_MACADM", line 1620
ORA-06512: at line 1
 
UNAUTHORIZE_DDL
Revoke authorize to execute DDLs on another user's schema dbms_macadm.unauthorize_ddl(
uname IN VARCHAR2,
sname IN VARCHAR2 DEFAULT NULL);
PRAGMA SUPPLEMENTAL_LOG_DATA(unauthorize_ddl, AUTO_WITH_COMMIT);
TBD
 
UNAUTHORIZE_DEBUG_CONNECT
Revoke authorization froma user to connect to  another user's session to a PL/SQL debugger dbms_macadm.unauthorize_debug_connect(
uname IN VARCHAR2,
sname IN VARCHAR2 DEFAULT NULL);
PRAGMA SUPPLEMENTAL_LOG_DATA(unauthorize_debug_connect, AUTO_WITH_COMMIT);
TBD
 
UNAUTHORIZE_DIAGNOSTIC_ADMIN
Revoke authorization to a user to access a list of diagnostic fixed tables/views dbms_macadm.unauthorize_diagnostic_admin(uname IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(unauthorize_diagnostic_admin, AUTO_WITH_COMMIT);
TBD
 
UNAUTHORIZE_MAINTENANCE_USER
Revoke authorize for a user to execute maintenance related DDL dbms_macadm.unauthorize_maintenance_user(
uname   IN VARCHAR2,
sname   IN VARCHAR2 DEFAULT NULL,
objname IN VARCHAR2 DEFAULT NULL,
objtype IN VARCHAR2 DEFAULT '%',
action  IN VARCHAR2 DEFAULT NULL);
PRAGMA SUPPLEMENTAL_LOG_DATA(unauthorize_maintenance_user, AUTO_WITH_COMMIT);
TBD
 
UNAUTHORIZE_PREPROCESSOR
Revoke authorization to execute PREPROCESSOR directives in external tables dbms_macadm.unauthorize_preprocessor(uname IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(unauthorize_preprocessor, AUTO_WITH_COMMIT);
exec dvsys.dbms_macadm.unauthorize_preprocessor('C##UWCLASS');
BEGIN dvsys.dbms_macadm.unauthorize_preprocessor('C##UWCLASS'); END;
*
ERROR at line 1:
ORA-01031: insufficient privileges
ORA-06512: at "DVSYS.DBMS_MACADM", line 1435
ORA-06512: at "DVSYS.DBMS_MACADM", line 1583
ORA-06512: at line 1
 
UNAUTHORIZE_PROXY_USER
Remove authorization to proxy as another user dbms_macadm.unauthorize_proxy_user(
uname IN VARCHAR2,
sname IN VARCHAR2 DEFAULT NULL);
PRAGMA SUPPLEMENTAL_LOG_DATA(unauthorize_proxy_user, AUTO_WITH_COMMIT);
TBD
 
UNAUTHORIZE_SCHEDULER_USER
Remove authorization for a user to run jobs in the schema of other than their own dbms_macadm.unauthorize_scheduler_user(
uname IN VARCHAR2,
sname IN VARCHAR2 DEFAULT NULL);
PRAGMA SUPPLEMENTAL_LOG_DATA(unauthorize_scheduler_user, AUTO_WITH_COMMIT);
TBD
 
UNAUTHORIZE_TTS_USER
Undocumented dbms_macadm.unauthorize_tts_user(
uname  IN VARCHAR2,
tsname IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(unauthorize_tts_user, AUTO_WITH_COMMIT);
TBD
 
UNAUTH_DATAPUMP_CREATE_USER
Undocumented dbms_macadm.unauth_datapump_create_user(uname IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(unauth_datapump_create_user, AUTO_WITH_COMMIT);
TBD
 
UNAUTH_DATAPUMP_GRANT
Undocumented dbms_macadm.unauth_datapump_grant(uname IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(unauth_datapump_grant, AUTO_WITH_COMMIT);
TBD
 
UNAUTH_DATAPUMP_GRANT_ROLE
Undocumented dbms_macadm.unauth_datapump_grant_role(
uname IN VARCHAR2,
role  IN VARCHAR2 DEFAULT '%');
PRAGMA SUPPLEMENTAL_LOG_DATA(unauth_datapump_grant_role, AUTO_WITH_COMMIT);
TBD
 
UNAUTH_DATAPUMP_GRANT_SYSPRIV
Undocumented dbms_macadm.unauth_datapump_grant_syspriv(uname IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(unauth_datapump_grant_syspriv, AUTO_WITH_COMMIT);
TBD
 
UPDATE_COMMAND_RULE
Alter a Command Rule declaration dbms_macadm.update_command_rule(
command         IN VARCHAR2,
rule_set_name   IN VARCHAR2,
object_owner    IN VARCHAR2,
object_name     IN VARCHAR2,
enabled         IN VARCHAR2,
privilege_scope IN NUMBER   DEFAULT NULL,
clause_name     IN VARCHAR2 := '%',
parameter_name  IN VARCHAR2 := '%',
event_name      IN VARCHAR2 := '%',
component_name  IN VARCHAR2 := '%',
action_name     IN VARCHAR2 := '%',
scope           IN NUMBER   := dvsys.dbms_macutl.g_scope_local,
pl_sql_stack    IN BOOLEAN  DEFAULT NULL);
PRAGMA SUPPLEMENTAL_LOG_DATA(update_command_rule, AUTO_WITH_COMMIT);
-- found in $ORACLE_HOME/rdbms/admin/catmacpost.sql
BEGIN
  FOR command_rule_rec IN (SELECT * FROM dvsys.dba_dv_command_rule) LOOP
    dbms_macadm.update_command_rule(
      command       => command_rule_rec.command,
      rule_set_name => command_rule_rec.rule_set_name,
      object_owner  => command_rule_rec.object_owner,
      object_name   => command_rule_rec.object_name,
      enabled       => dbms_macutl.g_yes);
  END LOOP;
  COMMIT;
END;
/
 
UPDATE_CONNECT_COMMAND_RULE
Update a CONNECT Command Rule declaration dbms_macadm.update_connect_command_rule(
user_name IN VARCHAR2,
rule_set_name IN VARCHAR2,
enabled IN VARCHAR2,
scope IN NUMBER := dvsys.dbms_macutl.g_scope_local);
PRAGMA SUPPLEMENTAL_LOG_DATA(update_connect_command_rule, AUTO_WITH_COMMIT);
TBD
 
UPDATE_FACTOR
Updates a Factor dbms_macadm.update_factor(
factor_name         IN VARCHAR2,
factor_type_name    IN VARCHAR2,
description         IN VARCHAR2,
rule_set_name       IN VARCHAR2,
get_expr            IN VARCHAR2,
validate_expr       IN VARCHAR2,
identify_by         IN NUMBER,
labeled_by          IN NUMBER,
eval_options        IN NUMBER,
audit_options       IN NUMBER,
fail_options        IN NUMBER,
namespace           IN VARCHAR2 DEFAULT NULL,
namespace_attribute IN VARCHAR2 DEFAULT NULL);
PRAGMA SUPPLEMENTAL_LOG_DATA(update_factor, AUTO_WITH_COMMIT);
TBD
 
UPDATE_FACTOR_TYPE
Updates a Factor Type dbms_macadm.update_factor_type(
name        IN VARCHAR2,
description IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(update_factor_type, AUTO_WITH_COMMIT);
TBD
 
UPDATE_IDENTITY
Updates an Identity dbms_macadm.update_identity(
factor_name IN VARCHAR2,
value       IN VARCHAR2,
trust_level IN NUMBER);
PRAGMA SUPPLEMENTAL_LOG_DATA(update_identity, AUTO_WITH_COMMIT);
TBD
 
UPDATE_MAC_POLICY
Specify the algorithm that is used to merge labels when computing the label for a Factor, or the MAC OLS Session label dbms_macadm.update_mac_policy(
policy_name IN VARCHAR2,
algorithm   IN VARCHAR2,
error_label IN VARCHAR2 DEFAULT NULL);
PRAGMA SUPPLEMENTAL_LOG_DATA(update_mac_policy, AUTO_WITH_COMMIT);
TBD
 
UPDATE_POLICY_DESCRIPTION
Update the description of exiting Database Vault policy dbms_macadm.update_policy_description(
policy_name IN VARCHAR2,
description IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(update_policy_description, AUTO_WITH_COMMIT);
TBD
 
UPDATE_POLICY_STATE
Update the state of existing Database Vault policy dbms_macadm.update_policy_state(
policy_name  IN VARCHAR2,
policy_state IN NUMBER,
pl_sql_stack IN BOOLEAN DEFAULT NULL);
PRAGMA SUPPLEMENTAL_LOG_DATA(update_policy_state, AUTO_WITH_COMMIT);
TBD
 
UPDATE_REALM
Alter a Realm dbms_macadm.update_realm(
realm_name    IN VARCHAR2,
description   IN VARCHAR2,
enabled       IN VARCHAR2,
audit_options IN NUMBER  DEFAULT NULL,
realm_type    IN NUMBER  DEFAULT NULL,
pl_sql_stack  IN BOOLEAN DEFAULT NULL);
PRAGMA SUPPLEMENTAL_LOG_DATA(update_realm, AUTO_WITH_COMMIT);
TBD
 
UPDATE_REALM_AUTH
Update the authorization of a user or role to access a Realm dbms_macadm.update_realm_auth(
realm_name    IN VARCHAR2,
grantee       IN VARCHAR2,
rule_set_name IN VARCHAR2,
auth_options  IN NUMBER,
auth_scope    IN NUMBER := dvsys.dbms_macutl.g_scope_local);
PRAGMA SUPPLEMENTAL_LOG_DATA(update_realm_auth, AUTO_WITH_COMMIT);
TBD
 
UPDATE_ROLE
Update a DV Secure Application Role with.access protected by a Rule Set dbms_macadm.update_role(
role_name     IN VARCHAR2,
enabled       IN VARCHAR2,
rule_set_name IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(update_role, AUTO_WITH_COMMIT);
TBD
 
UPDATE_RULE
Update a Rule dbms_macadm.update_rule(
rule_name IN VARCHAR2,
rule_expr IN VARCHAR2);
PRAGMA SUPPLEMENTAL_LOG_DATA(update_rule, AUTO_WITH_COMMIT);
TBD
 
UPDATE_RULE_SET
Update a Rule Set dbms_macadm.update_rule_set(
rule_set_name   IN VARCHAR2,
description     IN VARCHAR2,
enabled         IN VARCHAR2,
eval_options    IN NUMBER,
audit_options   IN NUMBER,
fail_options    IN NUMBER,
fail_message    IN VARCHAR2,
fail_code       IN NUMBER,
handler_options IN NUMBER,
handler         IN VARCHAR2,
is_static       IN BOOLEAN DEFAULT FALSE);
PRAGMA SUPPLEMENTAL_LOG_DATA(update_rule_set, AUTO_WITH_COMMIT);
TBD
 
UPDATE_SESSION_EVENT_CMD_RULE
Update a session event command rule declaration dbms_macadm.update_session_event_cmd_rule(
rule_set_name  IN VARCHAR2,
enabled        IN VARCHAR2,
event_name     IN VARCHAR2 := '%',
component_name IN VARCHAR2 := '%',
action_name    IN VARCHAR2 := '%',
scope          IN NUMBER   := dvsys.dbms_macutl.g_scope_local,
pl_sql_stack   IN BOOLEAN  DEFAULT NULL);
PRAGMA SUPPLEMENTAL_LOG_DATA(update_session_event_cmd_rule, AUTO_WITH_COMMIT);
TBD
 
UPDATE_SYSTEM_EVENT_CMD_RULE
Update a system event command rule declaration dbms_macadm.update_system_event_cmd_rule(
rule_set_name  IN VARCHAR2,
enabled        IN VARCHAR2,
event_name     IN VARCHAR2 := '%',
component_name IN VARCHAR2 := '%',
action_name    IN VARCHAR2 := '%',
scope          IN NUMBER   := dvsys.dbms_macutl.g_scope_local,
pl_sql_stack   IN BOOLEAN  DEFAULT NULL);
PRAGMA SUPPLEMENTAL_LOG_DATA(update_system_event_cmd_rule, AUTO_WITH_COMMIT);
TBD

Related Topics
Built-in Functions
Built-in Packages
Database Security
DBMS_MACOLS
DBMS_MACOLS_SESSION
DBMS_MACOUT
DBMS_MACSEC
DBMS_MACSEC_FUNCTION
DBMS_MACSEC_ROLES
DBMS_MACSEC_RULES
DBMS_MACUTL
What's New In 19c
What's New In 20c-21c

Morgan's Library Page Footer
This site is maintained by Dan Morgan. Last Updated: This site is protected by copyright and trademark laws under U.S. and International law. © 1998-2022 Daniel A. Morgan All Rights Reserved
  DBSecWorx