Call: +44 (0)1904 557620 Call
Blog

Pete Finnigan's Oracle Security Weblog

This is the weblog for Pete Finnigan. Pete works in the area of Oracle security and he specialises in auditing Oracle databases for security issues. This weblog is aimed squarely at those interested in the security of their Oracle databases.

[Previous entry: "Integrigy releases a useful impact analysis paper on CPU - Jan 2005"] [Next entry: "Amis blog talks about LOG4PLSQL"]

Tom talks about proxy users



I was browsing Vattekkat Satheesh Babu's Oracle feed of feeds and found an interesting post by Tom Kyte on his Ask Tom site where someone asked a question about the difference between a normal database user and a proxy user and also about FGA might work with proxy users.

Tom’s answer which also includes some input by David Knox is a very good discussion on the subject of proxy users and how they work. There is a little example code and some well thought out and written explanations. The post about proxy users and FGA can be found on Toms site and is well worth reading.