Playing with Oracle 12c Multitenant Users and Roles

Posted on November 10, 2013

I’ve realized these days that the great list of articles by Oracle Alchemist does not contain any articles describing a little more in depth common roles and Users.

I’ve found these ones by Pete Finnigan and Bobby Curtis:

http://www.petefinnigan.com/weblog/archives/00001366.htm

http://dbasolved.com/2013/06/29/common-user-vs-local-user-12c-edition/

http://www.petefinnigan.com/weblog/archives/00001370.htm

But I would like to investigate a little more.

My test environment

Just to give you an idea, I have two PDBs (HR and HR2), each containing an HR schema.

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

SQL> alter session set container=CDB$ROOT;

 

Session altered.

 

SQL> select NAME, CON_ID from v$containers;

 

NAME                               CON_ID

—————————— ———-

CDB$ROOT                                1

PDB$SEED                                2

HR                                      3

HR2                                     4

 

4 rows selected.

 

SQL> r

  1* select username, con_id from cdb_users where username =’HR’

 

USERNAME                           CON_ID

—————————— ———-

HR                                      4

HR                                      3

 

2 rows selected.

Creating the common user

As already pointed by the existing articles, I can’t create a common user into the root container without the c## prefix, unless I’m altering the hidden parameter _common_user_prefix.

1

2

3

4

5

SQL> create user goofy identified by pippo;

create user goofy identified by pippo

*

ERROR at line 1:

ORA-65096: invalid common user or role name

so I specify the correct prefix, and it works:

1

2

3

4

5

6

7

SQL> create user C##GOOFY identified by pippo;

 

User created.

 

SQL> grant create session, alter session to c##goofy;

 

Grant succeeded.

The user is common, so it appears in all the containers, I can check it by querying CDB_USERS from the root container.

1

2

3

4

5

6

7

SQL> select username, con_id from cdb_users where username like ‘%GOOFY%’;

 

USERNAME                                               CON_ID

————————————————– ———-

C##GOOFY                                                    1

C##GOOFY                                                    3

C##GOOFY                                                    4

Creating the local user

Then I create also a local user into the HR PDB.

1

2

3

4

5

6

7

8

9

10

11

SQL> alter session set container=HR;

 

Session altered.

 

SQL> create user goofy identified by pippo;

 

User created.

 

SQL> grant create session, alter session to goofy;

 

Grant succeeded.

 

CDB_USERS scope

From the PDB I see only the users in the PDB scope:

1

2

3

4

5

6

SQL> select username, con_id from cdb_users where username like ‘%GOOFY%’;

 

USERNAME                                               CON_ID

————————————————– ———-

C##GOOFY                                                    3

GOOFY                                                       3

If I change to the root, I see the users valid into all the containers:

1

2

3

4

5

6

7

8

9

10

11

12

SQL> alter session set container=CDB$ROOT;

 

Session altered.

 

SQL> select username, con_id from cdb_users where username like ‘%GOOFY%’;

 

USERNAME                                               CON_ID

————————————————– ———-

C##GOOFY                                                    1

C##GOOFY                                                    3

C##GOOFY                                                    4

GOOFY                                                       3

Creating a common role

Do the roles obey to the same rules valid for the users?

1

2

3

4

5

6

7

8

9

SQL> alter session set container=CDB$ROOT;

 

Session altered.

 

SQL> create role country_reader;

create role country_reader

*

ERROR at line 1:

ORA-65096: invalid common user or role name

Yes, they do! So, let’s create a common role with the C## prefix:

1

2

3

SQL> create role C##COUNTRY_ROLE container=ALL;

 

Role created.

It works, but if I try to create a common role into the root container only, I get an error:

1

2

3

4

5

SQL> create role C##REGIONS_ROLE container=current;

create role C##REGIONS_ROLE container=current

*

ERROR at line 1:

ORA-65094: invalid local user or role name

And also if I try to create a local role into the root, I can’t:

1

2

3

4

5

SQL> create role REGIONS_ROLE container=current;

create role REGIONS_ROLE container=current

*

ERROR at line 1:

ORA-65049: creation of local user or role is not allowed in CDB$ROOT

Note that the error ORA-65049 is different from the ORA-65096 that I’ve got before.

My conclusion is that the clause container of the create role and create userstatements doesn’t make sense as you can ONLY create common users and roles into the root container and only local ones into the PDBs.

 Creating a local role

Just as experiment, I’ve tried to see if I can create a local role with container=ALL. It doesn’t work:

1

2

3

4

5

6

7

8

9

SQL> alter session set container=hr;

 

Session altered.

 

SQL> create role REGION_ROLE container=ALL;

create role REGION_ROLE container=ALL

*

ERROR at line 1:

ORA-65050: Common DDLs only allowed in CDB$ROOT

So I create the local role with container=current:

1

2

3

SQL> create role REGION_ROLE container=CURRENT;

 

Role created.

Now, from the PDB I can see the two roles I can access, whereas from the root I can see all the roles I’ve defined so far: the common role is available from all the PDBs, the local role only from the db where it has been defined, just like the users.

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

SQL>  select role, con_id from cdb_roles where   role like ‘%COUNTRY%’ or role like ‘%REGION%’;

 

ROLE                                                CON_ID

———————————————– ———-

REGION_ROLE                                              3

C##COUNTRY_ROLE                                          3

 

SQL> alter session set container=CDB$ROOT;

 

Session altered.

 

SQL>  select role, con_id from cdb_roles where  oracle_maintained=’N’;

 

ROLE                                                                                                                           CON_ID

—————————————– ———-

C##COUNTRY_ROLE                                    1

C##COUNTRY_ROLE                                    4

C##COUNTRY_ROLE                                    3

REGION_ROLE                                        3

 

4 rows selected.

 Granting object privileges to the roles

From the root I can’t give grants on objects that reside in a PDB since I cannot see them: I need to connect to the PDB and give the grants from there:

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

SQL> grant select on hr.countries to C##country_role;

grant select on hr.countries to C##country_role

*

ERROR at line 1:

ORA-00942: table or view does not exist

 

SQL> alter session set container=hr;

 

Session altered.

 

SQL> grant select on hr.countries to C##COUNTRY_ROLE;

 

Grant succeeded.

 

SQL> grant select on hr.regions to REGION_ROLE;

 

Grant succeeded.

Now, if I query CDB_TAB_PRIVS from the root, I see that the grants are given at a local level (con_id=3 and common=N):

1

2

3

4

5

6

7

8

9

10

11

12

SQL> alter session set container=cdb$root;

 

Session altered.

 

SQL> select GRANTEE, OWNER, TABLE_NAME, PRIVILEGE, COMMON, CON_ID from  cdb_tab_privs where owner=’HR’;

 

GRANTEE              OWNER    TABLE_NAME       PRIVILEGE     COM     CON_ID

——————– ——– —————- ————- — ———-

REGION_ROLE          HR       REGIONS          SELECT        NO           3

C##COUNTRY_ROLE      HR       COUNTRIES        SELECT        NO           3

 

2 rows selected.

 Granting common and local roles to commond and local users

From a PDB, I can grant local roles to local users or common users:

1

2

3

4

5

6

7

SQL> grant REGION_ROLE to goofy;

 

Grant succeeded.

 

SQL> grant REGION_ROLE to c##goofy;

 

Grant succeeded.

But I can’t grant a common role to a common user with container=all if I’m in a PDB:

1

2

3

4

5

SQL> grant C##COUNTRY_ROLE to c##goofy container=all;

grant C##COUNTRY_ROLE to c##goofy container=all

*

ERROR at line 1:

ORA-65050: Common DDLs only allowed in CDB$ROOT

To grant the a common role to a common user I can decide either to:

  •  give the grant locally while connected to the PDB:

 

1

2

3

4

5

SQL> grant C##COUNTRY_ROLE to c##goofy container=current;

 

Grant succeeded.

 

SQL>

 

  •  give the grant commonly while connected to the root:

 

1

2

3

4

5

6

7

SQL> alter session set container=cdb$root;

 

Session altered.

 

SQL> grant C##COUNTRY_ROLE to c##goofy container=all;

 

Grant succeeded.

I can also grant locally both roles and system privileges to common users while connected to the root container: in this case the privileges are applied to the root container only. Finally having the clause container finally starts to make sense:

1

2

3

4

5

6

7

SQL> grant C##COUNTRY_ROLE to c##goofy container=current;

 

Grant succeeded.

 

SQL> grant select any table to c##goofy container=current;

 

Grant succeeded.

Verifying the grants

Ok, I’ve given the grants and I’ve never verified if they work, so far.

Let’s try with the select any table privilege I’ve given in the last snippet. I expect C##GOOFY to select any table from the root container and only HR.COUNTRIES and HR.REGIONS on the HR PDB bacause they have been granted through the two roles.

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

SQL> connect c##goofy/pippo;

Connected.

SQL> select count(*) from APEX_040200.WWV_FLOW_TABS;

 

COUNT(*)

———-

609

 

1 row selected.

 

SQL> connect c##goofy/pippo@node4:1521/hr

ERROR:

ORA-01045: user C##GOOFY lacks CREATE SESSION privilege; logon denied

 

Warning: You are no longer connected to ORACLE.

What’s the mess? When I’ve created the user c##goofy, I’ve granted create and alter session without the container=all:

1

SQL> grant create session, alter session to c##goofy;

According to the documentation, the grant command uses container=current by default (common=N):

1

2

3

4

5

6

7

8

9

SQL> select * from dba_sys_privs where grantee=’C##GOOFY’;

 

GRANTEE                        PRIVILEGE                                ADM COM

—————————— —————————————- — —

C##GOOFY                       SELECT ANY TABLE                         NO  NO

C##GOOFY                       ALTER SESSION                            NO  NO

C##GOOFY                       CREATE SESSION                           NO  NO

 

3 rows selected.

So, I need to give the grants commonly to let c##goofy connect to all the PDBs:

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

SQL> grant create session, alter session to c##goofy container=all;

 

Grant succeeded.

 

SQL>  select * from dba_sys_privs where grantee=’C##GOOFY’;

 

GRANTEE                        PRIVILEGE                                ADM COM

—————————— —————————————- — —

C##GOOFY                       SELECT ANY TABLE                         NO  NO

C##GOOFY                       ALTER SESSION                            NO  NO

C##GOOFY                       CREATE SESSION                           NO  NO

C##GOOFY                       ALTER SESSION                            NO  YES

C##GOOFY                       CREATE SESSION                           NO  YES

 

5 rows selected.

Now I see that the grants give two distinct permissions : one local and the other common.

If I revoke the grants without container clause, actually only the local one is revokedand the user can continue to login. To revoke the grants I would need to check and revoke both local and common privileges.

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

SQL> revoke create session, alter session from c##goofy;

 

Revoke succeeded.

 

SQL>  select * from dba_sys_privs where grantee=’C##GOOFY’;

 

GRANTEE                        PRIVILEGE                                ADM COM

—————————— —————————————- — —

C##GOOFY                       SELECT ANY TABLE                         NO  NO

C##GOOFY                       ALTER SESSION                            NO  YES

C##GOOFY                       CREATE SESSION                           NO  YES

 

3 rows selected.

 

SQL> connect C##GOOFY/pippo;

Connected.

After the first revoke statement, I can still connect to HR and verify that my select any table privilege doesn’t apply to the PDB as it’s local to the root container:

1

2

3

4

5

6

7

SQL> connect C##GOOFY/pippo@node4:1521/hr

Connected.

SQL> select count(*) from hr.DEPARTMENTS;

select count(*) from hr.DEPARTMENTS

*

ERROR at line 1:

ORA-00942: table or view does not exist

After that, I want to check the privileges given through the local and common roles.

I expect both users to select from hr.countries and hr.regions since they have been granted indirectly by the roles.

Let’s try the local user first:

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

SQL> connect goofy/pippo@node4:1521/hr

Connected.

SQL> select count(*) from hr.regions;

 

  COUNT(*)

———-

         4

 

1 row selected.

 

SQL> select count(*) from hr.countries;

 

  COUNT(*)

———-

        25

 

1 row selected.

Yeah, it works as expected.

Now let’s try the common user:

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

SQL> connect c##goofy/pippo@node4:1521/hr

Connected.

SQL> select count(*) from hr.regions;

 

  COUNT(*)

———-

         4

 

1 row selected.

 

SQL> select count(*) from hr.countries;

 

  COUNT(*)

———-

        25

 

1 row selected.

It also work, so everything is ok.

Common and local grants, why you must pay attention

During the example, I’ve granted the C##COUNTRY_ROLE many times: locally to PDB, locally to the ROOT, commonly. The result is that I’ve flooded the grant table with many entries:

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

SQL> alter session set container=CDB$ROOT;

 

Session altered.

 

SQL> select grantee, GRANTED_ROLE, COMMON, CON_ID from cdb_role_privs where grantee like ‘%GOOFY’ order by GRANTEE, GRANTED_ROLE;

 

GRANTEE                        GRANTED_ROLE                   COM     CON_ID

—————————— —————————— — ———-

C##GOOFY                       C##COUNTRY_ROLE                YES          4

C##GOOFY                       C##COUNTRY_ROLE                YES          3

C##GOOFY                       C##COUNTRY_ROLE                YES          1

C##GOOFY                       C##COUNTRY_ROLE                NO           1

C##GOOFY                       C##COUNTRY_ROLE                NO           3

C##GOOFY                       REGION_ROLE                    NO           3

GOOFY                          C##COUNTRY_ROLE                NO           3

GOOFY                          REGION_ROLE                    NO           3

 

8 rows selected.

Let’s try to clean things: for sure I don’t need the grant local to the root:

1

2

3

SQL> revoke C##COUNTRY_ROLE from C##GOOFY container=current;

 

Revoke succeeded.

Then I can choose between revoking the common privilege or the local one. Let’s try to remove the local one:

1

2

3

4

5

6

7

SQL> alter session set container=hr;

 

Session altered.

 

SQL>  revoke C##COUNTRY_ROLE from C##GOOFY container=current;

 

Revoke succeeded.

I’ve removed the local one, but I have still the common one (I’m connected to the PDB so the entries from the other containers are not displayed):

1

2

3

4

5

6

7

8

9

10

SQL> select grantee, GRANTED_ROLE, COMMON, CON_ID from cdb_role_privs where grantee like ‘%GOOFY’ order by GRANTEE, GRANTED_ROLE;

 

GRANTEE                        GRANTED_ROLE                   COM     CON_ID

—————————— —————————— — ———-

C##GOOFY                       C##COUNTRY_ROLE                YES          3

C##GOOFY                       REGION_ROLE                    NO           3

GOOFY                          C##COUNTRY_ROLE                NO           3

GOOFY                          REGION_ROLE                    NO           3

 

4 rows selected.

I still have access to the tables as expected:

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

SQL> connect C##GOOFY/pippo@node4:1521/hr

Connected.

SQL>  select count(*) from hr.countries;

 

  COUNT(*)

———-

        25

 

1 row selected.

 

SQL>  select count(*) from hr.regions;

 

  COUNT(*)

———-

         4

 

1 row selected.

So, you must pay attention to a couple of things:

  • When granting privileges from the root container, keep in mind that container=current is the default even when the grantee or the role granted are common.
  • When revoking the grants with a Multitenant architecture, keep in mind that there is a scope and you may need more than one statement to actually remove the grant from all the scopes.

As always, I look for opinions and suggestions, feel free to comment!


Ludovico

The following two tabs change content below.

My Twitter profile
My LinkedIn profile

Ludovico

Oracle ACE Director and Computing Engineer at CERN

Ludovico is an Oracle ACE Director, frequent speaker and community contributor, working as Computing Engineer at CERN, the European Council for Nuclear Research, in Switzerland.

2 THOUGHTS ON “PLAYING WITH ORACLE 12C MULTITENANT USERS AND ROLES”

  1. Pingback: Playing with Oracle 12c Multitenant Users and Roles – Ludovico Caldara – Blogs – triBLOG

  2. Awesome way of explaining the things with proper example. Thanks buddy. Keep it up.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

This website uses cookies to improve your experience. We’ll assume you’re ok with this, but you can opt-out if you wish.Accept

Use Oracle SQL developer to operate
https://www.oracle.com/webfolder/technetwork/tutorials/obe/db/12c/r1/12c_sqldev/pdb/12cPDB01.html

Read more

世界越快心越慢

在晚飯後的休息時間,我特別享受在客廳瀏灠youtube上各樣各式創作者的影音作品。很大不同於傳統媒體,節目多是針對大多數族群喜好挑選的,在youtube上我會依心情看無腦的動畫、一些旅拍記錄、新聞時事談論。 尤其在看了大量的Youtube的分享後,我真的感受到會限制我的是我的無知,特別是那些我想都沒想過的實際應用,在學習後大大幫助到我的生活和工作層面。 休息在家時,我喜歡想一些沒做過的菜,動手去設計生活和工作上的解決方案,自己是真的很難閒著沒事做。 如創作文章,陪養新的習慣都能感覺到成長的喜悅,是不同於吃喝玩樂的快樂的。 創作不去限制固定的形式,文字是創作、影像聲音也是創作,記錄生活也是創作,我想留下的就是創造—》實現—》回憶,這樣子的循環過程,在留下的足跡面看到自己一路上的成長、失敗、絕望、重新再來。 雖然大部份的時候去做這些創作也不明白有什麼特別的意義,但不去做也不會留下什麼,所以呀不如反事都去試試看,也許能有不一樣的水花也許有意想不到的結果,投資自己永遠不會是失敗的決定,不是嗎?先問問自己再開始計畫下一步,未來沒人說得準。 像最近看youtube仍大一群人在為DOS開

By Phillips Hsieh

知識管理的三個步驟:一小時學會把知識運用到生活上

摘錄瓦基「閱讀前哨站」文章作為自己學習知識管理的內容 Part1「篩選資訊」 如何從海量資訊中篩選出啟發性、實用性和相關性的精華,讓你在學習過程中不再迷失方向。 1. 實用性 2. 啟發性 Part2「提高理解」 如何通過譬喻法和應用法,將抽象的知識與日常生活和工作緊密結合,建立更深刻的理解。 1. 應用法 2. 譬喻法 Part3「運用知識」 如何連結既有知識,跟自己感興趣的領域和專案產生關聯,讓你在運用知識的路途上游刃有餘。 1. 跟日常工作專案、人際活動產生連結 # 為什麼要寫日記? * 寫日記是為了忘記,忘卻瑣碎事情,保持專注力 * 寫日記就像在翻譯這個世界,訓練自己的解讀能力 * 不只是透過日記來記錄生活,而是透過日記來發展生活 #如何寫日記? * 不要寫流水帳式的日記,而是寫覆盤式的日記 當我們試著記錄活動和感受之間的關聯,有助於辦認出真正快樂的事 日記的記錄方式要以過程為主,而非結果 * 感恩日記的科學建議,每日感恩的案例

By Phillips Hsieh
2024年 3月30日 14屆美利達環彰化百K

2024年 3月30日 14屆美利達環彰化百K

這是場半小時就被秒報名額滿的經典賽事, 能順利出賽實屬隊友的功勞, 這次的準備工作想試試新買的外胎, 因為是無內胎用的外胎, 特別緊超級難安裝的, 問了其他朋友才知道, 要沾上肥皂水才容易滑入車框。 一早四點起床準備, 五點集合備好咖啡在車上飲用, 約了六點在彰化田尾鄉南鎮國小, 整好裝四人一起出發前往會場。 被排在最後一批出發, 這次的路線會繞行的員林148上139縣道, 其實在早上五點多天就開始有點飄雨, 大伙就開始擔心不會要雨戰吧! 果不其然才出發準備上148爬坡雨勢越來越大, 戴著防風眼鏡的我在身體的熱氣加上雨水冷凝效果下, 鏡面上滿是霧氣肉眼可視距離才剩不到五公尺, 只能緊依前前方的車友幫忙開路, 之後洪大跟上來我立馬請求他幫忙開路, 上了139停下車把防風眼鏡收起來, 反正下雨天又陰天完全用不到太陽眼鏡了。 雨是邊下邊打雷, 大伙都在這條139上一台一台單車好像避電針, 一時有點害怕不然想平時沒做什麼壞事, 真打到自己就是天意了。 下了139雨勢開始變小, 大伙的速度開始有所提昇, 開高鐵列車的時機己成熟, 物色好列車就跟好跟滿。 最後找了一隊似乎整團有固定在練

By Phillips Hsieh
2023 12月9號 美利達單車嘉年華

2023 12月9號 美利達單車嘉年華

第二次參加美利達環南投賽事, 還記得去年第一次參加這美利達環南投, 還特地提前一天跟車友在魚池住了一晚。 這回用上了剛在7月份剛安裝的車頂架, 安裝了二種不同的攜車架, 都樂這邊可以不用拆車輪直上車頂, YAKIMA這邊選了經濟的款式, 折掉前輪利用前叉固定在攜車架上。 約了唯一一位一起參加的朋友, 二人一早四點約見面, 幫朋友帶上了拿鐵咖啡, 開上日月潭在水社碼頭停好車, 騎往向山遊客中心, 路過美麗的日月潭簡直不要太美了拍一張。 抵達會場己是人山人海了, 跟著大伙排隊順便也看網紅也欣賞名車。 出發就先沿著日月潭順時針騎, 騎到玄裝寺很急停下來上一下廁所, 比賽時都會尿都特別的滿, 一方面是比較緊張,一方面是特別興奮。 這時己經跟車友失散了, 只能獨推沿路看有沒有車友可以一起組隊的, 很可惜在山區大家的實力不一只求平安順騎了, 原則就是有補給就停有食物就吃。 下到水里人群再次聚集起來, 光等紅綠燈就是一條車龍。 騎行了一大圈水里再回到131縣道, 這時背後傳來熟悉的聲音叫菲哥, 終於跟車友重新集合接下來就一路邊聊邊騎。 最後來幾張專業攝影師拍攝的照片 回到終點台上

By Phillips Hsieh