<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>OpenText Analytics Database 26.2.x – Database users and privileges</title>
    <link>/en/admin/db-users-and-privileges/</link>
    <description>Recent content in Database users and privileges on OpenText Analytics Database 26.2.x</description>
    <generator>Hugo -- gohugo.io</generator>
    
	  <atom:link href="/en/admin/db-users-and-privileges/index.xml" rel="self" type="application/rss+xml" />
    
    
      
        
      
    
    
    <item>
      <title>Admin: Database users</title>
      <link>/en/admin/db-users-and-privileges/db-users/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/admin/db-users-and-privileges/db-users/</guid>
      <description>
        
        
        &lt;p&gt;Every OpenText™ Analytics Database has one or more users. When users connect to a database, they must log on with valid credentials (username and password) that a superuser defined in the database.&lt;/p&gt;
&lt;p&gt;Database users own the objects they create in a database, such as tables, procedures, and storage locations.

&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

By default, users have the right to &lt;a href=&#34;../../../en/sql-reference/statements/create-statements/create-temporary-table/&#34;&gt;create temporary tables&lt;/a&gt; in a database.

&lt;/div&gt;&lt;/p&gt;

      </description>
    </item>
    
    <item>
      <title>Admin: Database roles</title>
      <link>/en/admin/db-users-and-privileges/db-roles/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/admin/db-users-and-privileges/db-roles/</guid>
      <description>
        
        
        &lt;p&gt;A role is a collection of privileges that can be &lt;a href=&#34;../../../en/sql-reference/statements/grant-statements/grant-role/&#34;&gt;granted&lt;/a&gt; to one or more users or other roles. Roles help you grant and manage sets of privileges for various categories of users, rather than grant those privileges to each user individually.&lt;/p&gt;
&lt;p&gt;For example, several users might require administrative privileges. You can grant these privileges to them as follows:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;../../../en/admin/db-users-and-privileges/db-roles/creating-and-dropping-roles/&#34;&gt;Create&lt;/a&gt; an administrator role with &lt;a href=&#34;../../../en/sql-reference/statements/create-statements/create-role/#&#34;&gt;CREATE ROLE&lt;/a&gt;:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;CREATE ROLE administrator;
&lt;/code&gt;&lt;/pre&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;../../../en/admin/db-users-and-privileges/db-roles/granting-db-roles/&#34;&gt;Grant the role&lt;/a&gt; to the appropriate users.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;../../../en/admin/db-users-and-privileges/db-roles/granting-privileges-to-roles/&#34;&gt;Grant&lt;/a&gt; the appropriate privileges to this role with one or more &lt;a href=&#34;../../../en/sql-reference/statements/grant-statements/&#34;&gt;GRANT&lt;/a&gt; statements. You can later add and remove privileges as needed. Changes in role privileges are automatically propagated to the users who have that role.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;After users are assigned roles, they can either &lt;a href=&#34;../../../en/admin/db-users-and-privileges/db-roles/enabling-roles/&#34;&gt;enable&lt;/a&gt; those roles themselves, or you can &lt;a href=&#34;../../../en/admin/db-users-and-privileges/db-roles/enabling-roles-automatically/&#34;&gt;automatically enable&lt;/a&gt; their roles for them.&lt;/p&gt;

      </description>
    </item>
    
    <item>
      <title>Admin: Database privileges</title>
      <link>/en/admin/db-users-and-privileges/db-privileges/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/admin/db-users-and-privileges/db-privileges/</guid>
      <description>
        
        
        &lt;p&gt;When a database object is created, such as a schema, table, or view, ownership of that object is assigned to the user who created it. By default, only the object&#39;s owner, and users with superuser privileges such as database administrators, have privileges on a new object. Only these users (and other users whom they explicitly authorize) can grant object privileges to other users&lt;/p&gt;
&lt;p&gt;Privileges are granted and revoked by &lt;a href=&#34;../../../en/sql-reference/statements/grant-statements/&#34;&gt;GRANT&lt;/a&gt; and &lt;a href=&#34;../../../en/sql-reference/statements/revoke-statements/&#34;&gt;REVOKE&lt;/a&gt; statements, respectively. The privileges that can be granted on a given object are specific to its type. For example, table privileges include SELECT, INSERT, and UPDATE, while library and resource pool privileges have USAGE privileges only. For a summary of object privileges, see &lt;a href=&#34;../../../en/admin/db-users-and-privileges/db-privileges/db-object-privileges/#&#34;&gt;Database object privileges&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Because privileges on database objects can come from several different sources like explicit grants, roles, and inheritance, privileges can be difficult to monitor. Use the &lt;a href=&#34;../../../en/sql-reference/functions/management-functions/privileges-and-access-functions/get-privileges-description/&#34;&gt;GET_PRIVILEGES_DESCRIPTION&lt;/a&gt; meta-function to check the current user&#39;s &lt;a href=&#34;../../../en/admin/db-users-and-privileges/db-privileges/effective-privileges/&#34;&gt;effective privileges&lt;/a&gt; across all sources on a specified database object.&lt;/p&gt;

      </description>
    </item>
    
    <item>
      <title>Admin: Access policies</title>
      <link>/en/admin/db-users-and-privileges/access-policies/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/admin/db-users-and-privileges/access-policies/</guid>
      <description>
        
        
        &lt;p&gt;&lt;span class=&#34;sql&#34;&gt;&lt;a href=&#34;../../../en/sql-reference/statements/create-statements/create-access-policy/#&#34;&gt;CREATE ACCESS POLICY&lt;/a&gt;&lt;/span&gt; lets you create access policies on tables that specify how much data certain users and roles can query from those tables. Access policies typically prevent these users from viewing the data of specific columns and rows of a table. You can apply access policies to table &lt;a href=&#34;../../../en/admin/db-users-and-privileges/access-policies/creating-column-access-policies/&#34;&gt;columns&lt;/a&gt; and &lt;a href=&#34;../../../en/admin/db-users-and-privileges/access-policies/creating-row-access-policies/&#34;&gt;rows&lt;/a&gt;. If a table has access policies on both, the database filters row access policies first, then filters the column access policies.&lt;/p&gt;
&lt;p&gt;You can create most access policies for any table type—columnar, external, or &lt;a href=&#34;../../../en/flex-tables/&#34;&gt;flex&lt;/a&gt;. (You cannot create column access policies on flex tables.) You can also create access policies on any column type, including joins.&lt;/p&gt;

      </description>
    </item>
    
  </channel>
</rss>
