MINI MINI MANI MO

Path : /opt/oracle/product/18c/dbhomeXE/rdbms/admin/
File Upload :
Current File : //opt/oracle/product/18c/dbhomeXE/rdbms/admin/dbmsfga.sql

Rem Copyright (c) 1900, 2017, Oracle and/or its affiliates. 
Rem All rights reserved.
Rem
Rem    NAME
Rem      dbmsfga.sql - Package declaration of Fine Grained Auditing
Rem
Rem    DESCRIPTION
Rem      This file contains the declaration of the package DBMS_FGA that
Rem      is used to administer Fine Grained Auditing.
Rem
Rem    NOTES
Rem      <other useful comments, qualifications, etc.>
Rem
Rem
Rem BEGIN SQL_FILE_METADATA
Rem SQL_SOURCE_FILE: rdbms/admin/dbmsfga.sql
Rem SQL_SHIPPED_FILE: rdbms/admin/dbmsfga.sql
Rem SQL_PHASE: DBMSFGA
Rem SQL_STARTUP_MODE: NORMAL
Rem SQL_IGNORABLE_ERRORS: NONE
Rem SQL_CALLING_FILE: rdbms/admin/catpdbms.sql
Rem END SQL_FILE_METADATA
Rem
Rem    MODIFIED   (MM/DD/YY)
Rem    rthatte     08/11/17 - Bug 26474019: Make DBMS_FGA invoker rights
Rem                           package
Rem    surman      12/29/13 - 13922626: Update SQL metadata
Rem    surman      03/27/12 - 13615447: Add SQL patching tags
Rem    mjgreave    06/21/11 - Fix typo in file header. #8323439
Rem    amunnoli    02/24/11 - Proj 26873:Grant execute on dbms_fga to
Rem                           AUDIT_ADMIN role
Rem    ajadams     11/11/08 - bug 7330500 - add _with_commit to suplog pragma
Rem    ssonawan    09/09/08 - bug 5921164: add policy_owner input parameter 
Rem    rmacnico    08/28/06 - add support for standby servers
Rem    gmulagun    07/21/04 - bug 3784246 XML format records 
Rem    rvissapr    09/10/03 - bug 3095609 - add all_columns 
Rem    nmanappa    08/29/03 - Bug 2826225 - Add audit_trail arg to add_policy 
Rem    rvissapr    12/19/02 - add default NULL to policy text
Rem    rvissapr    12/12/02 - fix bug 2594538
Rem    rvissapr    06/17/02 - add stmttype
Rem    dmwong      07/13/01 - set default of policy condition to 1=1.
Rem    gviswana    05/24/01 - CREATE OR REPLACE SYNONYM
Rem    dmwong      04/10/00 - dbms package DBMS_FGA for fine grained auditing
Rem    dmwong      01/00/00 - Created
Rem

@@?/rdbms/admin/sqlsessstart.sql

/* Bug 26474019: Make package DBMS_FGA invoker rights */
CREATE OR REPLACE PACKAGE dbms_fga AUTHID CURRENT_USER AS
  -- ------------------------------------------------------------------------

  -- CONSTANTS
  --
  EXTENDED    CONSTANT PLS_INTEGER := 1;
  DB          CONSTANT PLS_INTEGER := 2;
  DB_EXTENDED CONSTANT PLS_INTEGER := 3;             -- (default)
  XML         CONSTANT PLS_INTEGER := 4;
  
  ALL_COLUMNS CONSTANT BINARY_INTEGER := 1;
  ANY_COLUMNS CONSTANT BINARY_INTEGER := 0;          -- (default)

  -- Support log based replication of FGA (proj 17779)
  PRAGMA SUPPLEMENTAL_LOG_DATA(default, AUTO_WITH_COMMIT);

  -- add_policy -  add a fine grained auditing policy to a table or view
  --
  -- INPUT PARAMETERS
  --   object_schema   - schema owning the table/view, current user if NULL
  --   object_name     - name of table or view
  --   policy_name     - name of policy to be added
  --   audit_column    - column to be audited
  --   audit_condition - predicates for this policy
  --   handler_schema  - schema where the event handler procedure is
  --   handler_module  - name of the event handler
  --   enable          - policy is enabled by DEFAULT
  --   statement_type  - statement type a policy applies to (default SELECT)
  --   audit_trail     - Write sqltext and sqlbind into audit trail as well
  --                     as destination of audit trail (default DB_EXTENDED)
  --   audit_column_options - option of using 'Any' or 'All' on audit columns 
  --                          for the policy (default ANY)
  --   policy_owner    - Owner of FGA policy to be added (default NULL)
  --                     Currently used only by Datapump import : Bug-5921164

  PROCEDURE add_policy(object_schema   IN VARCHAR2 := NULL,
                       object_name     IN VARCHAR2,
                       policy_name     IN VARCHAR2,
                       audit_condition IN VARCHAR2 := NULL,
                       audit_column    IN VARCHAR2 := NULL,
                       handler_schema  IN VARCHAR2 := NULL,
                       handler_module  IN VARCHAR2 := NULL,
                       enable          IN BOOLEAN  := TRUE,
                       statement_types IN VARCHAR2 := 'SELECT',
                       audit_trail     IN PLS_INTEGER  := 3,
                       audit_column_opts IN BINARY_INTEGER DEFAULT 0,
                       policy_owner    IN VARCHAR2 := NULL);
 
  -- drop_policy - drop a fine grained auditing policy from a table or view
  --
  -- INPUT PARAMETERS
  --   object_schema   - schema owning the table/view, current user if NULL
  --   object_name     - name of table or view
  --   policy_name     - name of policy to be dropped
 
  PROCEDURE drop_policy(object_schema IN VARCHAR2 := NULL,
                        object_name   IN VARCHAR2,
                        policy_name   IN VARCHAR2); 

  -- enable_policy - enable a security policy for a table or view
  --
  -- INPUT PARAMETERS
  --   object_schema   - schema owning the table/view, current user if NULL
  --   object_name     - name of table or view
  --   policy_name     - name of policy to be enabled or disabled
 
  PROCEDURE enable_policy(object_schema IN VARCHAR2 := NULL,
                          object_name   IN VARCHAR2,
                          policy_name   IN VARCHAR2,
                          enable        IN BOOLEAN := TRUE);

  -- disable_policy - disable a security policy for a table or view
  --
  -- INPUT PARAMETERS
  --   object_schema   - schema owning the table/view, current user if NULL
  --   object_name     - name of table or view
  --   policy_name     - name of policy to be enabled or disabled
 
  PROCEDURE disable_policy(object_schema IN VARCHAR2 := NULL,
                           object_name   IN VARCHAR2,
                           policy_name   IN VARCHAR2);

END dbms_fga;
/
CREATE OR REPLACE PUBLIC SYNONYM dbms_fga FOR sys.dbms_fga
/

--
-- Grant execute right to EXECUTE_CATALOG_ROLE
--
GRANT EXECUTE ON sys.dbms_fga TO execute_catalog_role
/
GRANT EXECUTE ON sys.dbms_fga TO AUDIT_ADMIN
/

@?/rdbms/admin/sqlsessend.sql

OHA YOOOO