Identify the method that is used by fine-grained access (FGA).

Identify the method that is used by fine-grained access (FGA).

Identify the method that is used by fine-grained access (FGA).

A.
using policy functions to generate predicates dynamically

B.
creating triggers on corresponding tables to generate dynamic predicates

C.
modifying the existing application code to include a predicate for all SQL statements

D.
creating views with necessary predicates, and then creating synonyms with the same name as
the tables



Leave a Reply 3

Your email address will not be published. Required fields are marked *


gelete

gelete

A.

Fine-Grained Access Control
Fine-grained access control lets you use functions to implement security policies
and to associate those security policies with tables, views, or synonyms.

Dynamic Predicates
The function or package that implements the security policy you create returns a predicate (a WHERE condition).
This predicate controls access according to the policy specifications.

A dynamic predicate for a table, view, or synonym is generated by a PL/SQL function,
which is associated with a security policy through a PL/SQL interface.

http://docs.oracle.com/cd/B28359_01/server.111/b28318/security.htm#i15359