Playing with Oracle 12c Multitenant Users and Roles

Posted on November 10, 2013

I’ve realized these days that the great list of articles by Oracle Alchemist does not contain any articles describing a little more in depth common roles and Users.

I’ve found these ones by Pete Finnigan and Bobby Curtis:

http://www.petefinnigan.com/weblog/archives/00001366.htm

http://dbasolved.com/2013/06/29/common-user-vs-local-user-12c-edition/

http://www.petefinnigan.com/weblog/archives/00001370.htm

But I would like to investigate a little more.

My test environment

Just to give you an idea, I have two PDBs (HR and HR2), each containing an HR schema.

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

SQL> alter session set container=CDB$ROOT;

 

Session altered.

 

SQL> select NAME, CON_ID from v$containers;

 

NAME                               CON_ID

—————————— ———-

CDB$ROOT                                1

PDB$SEED                                2

HR                                      3

HR2                                     4

 

4 rows selected.

 

SQL> r

  1* select username, con_id from cdb_users where username =’HR’

 

USERNAME                           CON_ID

—————————— ———-

HR                                      4

HR                                      3

 

2 rows selected.

Creating the common user

As already pointed by the existing articles, I can’t create a common user into the root container without the c## prefix, unless I’m altering the hidden parameter _common_user_prefix.

1

2

3

4

5

SQL> create user goofy identified by pippo;

create user goofy identified by pippo

*

ERROR at line 1:

ORA-65096: invalid common user or role name

so I specify the correct prefix, and it works:

1

2

3

4

5

6

7

SQL> create user C##GOOFY identified by pippo;

 

User created.

 

SQL> grant create session, alter session to c##goofy;

 

Grant succeeded.

The user is common, so it appears in all the containers, I can check it by querying CDB_USERS from the root container.

1

2

3

4

5

6

7

SQL> select username, con_id from cdb_users where username like ‘%GOOFY%’;

 

USERNAME                                               CON_ID

————————————————– ———-

C##GOOFY                                                    1

C##GOOFY                                                    3

C##GOOFY                                                    4

Creating the local user

Then I create also a local user into the HR PDB.

1

2

3

4

5

6

7

8

9

10

11

SQL> alter session set container=HR;

 

Session altered.

 

SQL> create user goofy identified by pippo;

 

User created.

 

SQL> grant create session, alter session to goofy;

 

Grant succeeded.

 

CDB_USERS scope

From the PDB I see only the users in the PDB scope:

1

2

3

4

5

6

SQL> select username, con_id from cdb_users where username like ‘%GOOFY%’;

 

USERNAME                                               CON_ID

————————————————– ———-

C##GOOFY                                                    3

GOOFY                                                       3

If I change to the root, I see the users valid into all the containers:

1

2

3

4

5

6

7

8

9

10

11

12

SQL> alter session set container=CDB$ROOT;

 

Session altered.

 

SQL> select username, con_id from cdb_users where username like ‘%GOOFY%’;

 

USERNAME                                               CON_ID

————————————————– ———-

C##GOOFY                                                    1

C##GOOFY                                                    3

C##GOOFY                                                    4

GOOFY                                                       3

Creating a common role

Do the roles obey to the same rules valid for the users?

1

2

3

4

5

6

7

8

9

SQL> alter session set container=CDB$ROOT;

 

Session altered.

 

SQL> create role country_reader;

create role country_reader

*

ERROR at line 1:

ORA-65096: invalid common user or role name

Yes, they do! So, let’s create a common role with the C## prefix:

1

2

3

SQL> create role C##COUNTRY_ROLE container=ALL;

 

Role created.

It works, but if I try to create a common role into the root container only, I get an error:

1

2

3

4

5

SQL> create role C##REGIONS_ROLE container=current;

create role C##REGIONS_ROLE container=current

*

ERROR at line 1:

ORA-65094: invalid local user or role name

And also if I try to create a local role into the root, I can’t:

1

2

3

4

5

SQL> create role REGIONS_ROLE container=current;

create role REGIONS_ROLE container=current

*

ERROR at line 1:

ORA-65049: creation of local user or role is not allowed in CDB$ROOT

Note that the error ORA-65049 is different from the ORA-65096 that I’ve got before.

My conclusion is that the clause container of the create role and create userstatements doesn’t make sense as you can ONLY create common users and roles into the root container and only local ones into the PDBs.

 Creating a local role

Just as experiment, I’ve tried to see if I can create a local role with container=ALL. It doesn’t work:

1

2

3

4

5

6

7

8

9

SQL> alter session set container=hr;

 

Session altered.

 

SQL> create role REGION_ROLE container=ALL;

create role REGION_ROLE container=ALL

*

ERROR at line 1:

ORA-65050: Common DDLs only allowed in CDB$ROOT

So I create the local role with container=current:

1

2

3

SQL> create role REGION_ROLE container=CURRENT;

 

Role created.

Now, from the PDB I can see the two roles I can access, whereas from the root I can see all the roles I’ve defined so far: the common role is available from all the PDBs, the local role only from the db where it has been defined, just like the users.

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

SQL>  select role, con_id from cdb_roles where   role like ‘%COUNTRY%’ or role like ‘%REGION%’;

 

ROLE                                                CON_ID

———————————————– ———-

REGION_ROLE                                              3

C##COUNTRY_ROLE                                          3

 

SQL> alter session set container=CDB$ROOT;

 

Session altered.

 

SQL>  select role, con_id from cdb_roles where  oracle_maintained=’N’;

 

ROLE                                                                                                                           CON_ID

—————————————– ———-

C##COUNTRY_ROLE                                    1

C##COUNTRY_ROLE                                    4

C##COUNTRY_ROLE                                    3

REGION_ROLE                                        3

 

4 rows selected.

 Granting object privileges to the roles

From the root I can’t give grants on objects that reside in a PDB since I cannot see them: I need to connect to the PDB and give the grants from there:

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

SQL> grant select on hr.countries to C##country_role;

grant select on hr.countries to C##country_role

*

ERROR at line 1:

ORA-00942: table or view does not exist

 

SQL> alter session set container=hr;

 

Session altered.

 

SQL> grant select on hr.countries to C##COUNTRY_ROLE;

 

Grant succeeded.

 

SQL> grant select on hr.regions to REGION_ROLE;

 

Grant succeeded.

Now, if I query CDB_TAB_PRIVS from the root, I see that the grants are given at a local level (con_id=3 and common=N):

1

2

3

4

5

6

7

8

9

10

11

12

SQL> alter session set container=cdb$root;

 

Session altered.

 

SQL> select GRANTEE, OWNER, TABLE_NAME, PRIVILEGE, COMMON, CON_ID from  cdb_tab_privs where owner=’HR’;

 

GRANTEE              OWNER    TABLE_NAME       PRIVILEGE     COM     CON_ID

——————– ——– —————- ————- — ———-

REGION_ROLE          HR       REGIONS          SELECT        NO           3

C##COUNTRY_ROLE      HR       COUNTRIES        SELECT        NO           3

 

2 rows selected.

 Granting common and local roles to commond and local users

From a PDB, I can grant local roles to local users or common users:

1

2

3

4

5

6

7

SQL> grant REGION_ROLE to goofy;

 

Grant succeeded.

 

SQL> grant REGION_ROLE to c##goofy;

 

Grant succeeded.

But I can’t grant a common role to a common user with container=all if I’m in a PDB:

1

2

3

4

5

SQL> grant C##COUNTRY_ROLE to c##goofy container=all;

grant C##COUNTRY_ROLE to c##goofy container=all

*

ERROR at line 1:

ORA-65050: Common DDLs only allowed in CDB$ROOT

To grant the a common role to a common user I can decide either to:

  •  give the grant locally while connected to the PDB:

 

1

2

3

4

5

SQL> grant C##COUNTRY_ROLE to c##goofy container=current;

 

Grant succeeded.

 

SQL>

 

  •  give the grant commonly while connected to the root:

 

1

2

3

4

5

6

7

SQL> alter session set container=cdb$root;

 

Session altered.

 

SQL> grant C##COUNTRY_ROLE to c##goofy container=all;

 

Grant succeeded.

I can also grant locally both roles and system privileges to common users while connected to the root container: in this case the privileges are applied to the root container only. Finally having the clause container finally starts to make sense:

1

2

3

4

5

6

7

SQL> grant C##COUNTRY_ROLE to c##goofy container=current;

 

Grant succeeded.

 

SQL> grant select any table to c##goofy container=current;

 

Grant succeeded.

Verifying the grants

Ok, I’ve given the grants and I’ve never verified if they work, so far.

Let’s try with the select any table privilege I’ve given in the last snippet. I expect C##GOOFY to select any table from the root container and only HR.COUNTRIES and HR.REGIONS on the HR PDB bacause they have been granted through the two roles.

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

SQL> connect c##goofy/pippo;

Connected.

SQL> select count(*) from APEX_040200.WWV_FLOW_TABS;

 

COUNT(*)

———-

609

 

1 row selected.

 

SQL> connect c##goofy/pippo@node4:1521/hr

ERROR:

ORA-01045: user C##GOOFY lacks CREATE SESSION privilege; logon denied

 

Warning: You are no longer connected to ORACLE.

What’s the mess? When I’ve created the user c##goofy, I’ve granted create and alter session without the container=all:

1

SQL> grant create session, alter session to c##goofy;

According to the documentation, the grant command uses container=current by default (common=N):

1

2

3

4

5

6

7

8

9

SQL> select * from dba_sys_privs where grantee=’C##GOOFY’;

 

GRANTEE                        PRIVILEGE                                ADM COM

—————————— —————————————- — —

C##GOOFY                       SELECT ANY TABLE                         NO  NO

C##GOOFY                       ALTER SESSION                            NO  NO

C##GOOFY                       CREATE SESSION                           NO  NO

 

3 rows selected.

So, I need to give the grants commonly to let c##goofy connect to all the PDBs:

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

SQL> grant create session, alter session to c##goofy container=all;

 

Grant succeeded.

 

SQL>  select * from dba_sys_privs where grantee=’C##GOOFY’;

 

GRANTEE                        PRIVILEGE                                ADM COM

—————————— —————————————- — —

C##GOOFY                       SELECT ANY TABLE                         NO  NO

C##GOOFY                       ALTER SESSION                            NO  NO

C##GOOFY                       CREATE SESSION                           NO  NO

C##GOOFY                       ALTER SESSION                            NO  YES

C##GOOFY                       CREATE SESSION                           NO  YES

 

5 rows selected.

Now I see that the grants give two distinct permissions : one local and the other common.

If I revoke the grants without container clause, actually only the local one is revokedand the user can continue to login. To revoke the grants I would need to check and revoke both local and common privileges.

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

SQL> revoke create session, alter session from c##goofy;

 

Revoke succeeded.

 

SQL>  select * from dba_sys_privs where grantee=’C##GOOFY’;

 

GRANTEE                        PRIVILEGE                                ADM COM

—————————— —————————————- — —

C##GOOFY                       SELECT ANY TABLE                         NO  NO

C##GOOFY                       ALTER SESSION                            NO  YES

C##GOOFY                       CREATE SESSION                           NO  YES

 

3 rows selected.

 

SQL> connect C##GOOFY/pippo;

Connected.

After the first revoke statement, I can still connect to HR and verify that my select any table privilege doesn’t apply to the PDB as it’s local to the root container:

1

2

3

4

5

6

7

SQL> connect C##GOOFY/pippo@node4:1521/hr

Connected.

SQL> select count(*) from hr.DEPARTMENTS;

select count(*) from hr.DEPARTMENTS

*

ERROR at line 1:

ORA-00942: table or view does not exist

After that, I want to check the privileges given through the local and common roles.

I expect both users to select from hr.countries and hr.regions since they have been granted indirectly by the roles.

Let’s try the local user first:

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

SQL> connect goofy/pippo@node4:1521/hr

Connected.

SQL> select count(*) from hr.regions;

 

  COUNT(*)

———-

         4

 

1 row selected.

 

SQL> select count(*) from hr.countries;

 

  COUNT(*)

———-

        25

 

1 row selected.

Yeah, it works as expected.

Now let’s try the common user:

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

SQL> connect c##goofy/pippo@node4:1521/hr

Connected.

SQL> select count(*) from hr.regions;

 

  COUNT(*)

———-

         4

 

1 row selected.

 

SQL> select count(*) from hr.countries;

 

  COUNT(*)

———-

        25

 

1 row selected.

It also work, so everything is ok.

Common and local grants, why you must pay attention

During the example, I’ve granted the C##COUNTRY_ROLE many times: locally to PDB, locally to the ROOT, commonly. The result is that I’ve flooded the grant table with many entries:

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

SQL> alter session set container=CDB$ROOT;

 

Session altered.

 

SQL> select grantee, GRANTED_ROLE, COMMON, CON_ID from cdb_role_privs where grantee like ‘%GOOFY’ order by GRANTEE, GRANTED_ROLE;

 

GRANTEE                        GRANTED_ROLE                   COM     CON_ID

—————————— —————————— — ———-

C##GOOFY                       C##COUNTRY_ROLE                YES          4

C##GOOFY                       C##COUNTRY_ROLE                YES          3

C##GOOFY                       C##COUNTRY_ROLE                YES          1

C##GOOFY                       C##COUNTRY_ROLE                NO           1

C##GOOFY                       C##COUNTRY_ROLE                NO           3

C##GOOFY                       REGION_ROLE                    NO           3

GOOFY                          C##COUNTRY_ROLE                NO           3

GOOFY                          REGION_ROLE                    NO           3

 

8 rows selected.

Let’s try to clean things: for sure I don’t need the grant local to the root:

1

2

3

SQL> revoke C##COUNTRY_ROLE from C##GOOFY container=current;

 

Revoke succeeded.

Then I can choose between revoking the common privilege or the local one. Let’s try to remove the local one:

1

2

3

4

5

6

7

SQL> alter session set container=hr;

 

Session altered.

 

SQL>  revoke C##COUNTRY_ROLE from C##GOOFY container=current;

 

Revoke succeeded.

I’ve removed the local one, but I have still the common one (I’m connected to the PDB so the entries from the other containers are not displayed):

1

2

3

4

5

6

7

8

9

10

SQL> select grantee, GRANTED_ROLE, COMMON, CON_ID from cdb_role_privs where grantee like ‘%GOOFY’ order by GRANTEE, GRANTED_ROLE;

 

GRANTEE                        GRANTED_ROLE                   COM     CON_ID

—————————— —————————— — ———-

C##GOOFY                       C##COUNTRY_ROLE                YES          3

C##GOOFY                       REGION_ROLE                    NO           3

GOOFY                          C##COUNTRY_ROLE                NO           3

GOOFY                          REGION_ROLE                    NO           3

 

4 rows selected.

I still have access to the tables as expected:

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

SQL> connect C##GOOFY/pippo@node4:1521/hr

Connected.

SQL>  select count(*) from hr.countries;

 

  COUNT(*)

———-

        25

 

1 row selected.

 

SQL>  select count(*) from hr.regions;

 

  COUNT(*)

———-

         4

 

1 row selected.

So, you must pay attention to a couple of things:

  • When granting privileges from the root container, keep in mind that container=current is the default even when the grantee or the role granted are common.
  • When revoking the grants with a Multitenant architecture, keep in mind that there is a scope and you may need more than one statement to actually remove the grant from all the scopes.

As always, I look for opinions and suggestions, feel free to comment!


Ludovico

The following two tabs change content below.

My Twitter profile
My LinkedIn profile

Ludovico

Oracle ACE Director and Computing Engineer at CERN

Ludovico is an Oracle ACE Director, frequent speaker and community contributor, working as Computing Engineer at CERN, the European Council for Nuclear Research, in Switzerland.

2 THOUGHTS ON “PLAYING WITH ORACLE 12C MULTITENANT USERS AND ROLES”

  1. Pingback: Playing with Oracle 12c Multitenant Users and Roles – Ludovico Caldara – Blogs – triBLOG

  2. Awesome way of explaining the things with proper example. Thanks buddy. Keep it up.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

This website uses cookies to improve your experience. We’ll assume you’re ok with this, but you can opt-out if you wish.Accept

Use Oracle SQL developer to operate
https://www.oracle.com/webfolder/technetwork/tutorials/obe/db/12c/r1/12c_sqldev/pdb/12cPDB01.html

Read more

How to document Home Lab and Network

運維機房和跨域的網路,會遇到各式需求與問題,用對工具才能分析問題,個人覺得最重要的是使用能處理問題的工具。 推薦目前想學和正在使用的平台與軟體,協助將公司/家用機房文件化 佈告欄任務管理 Focalboard 白板可管理任務指派 網路架構文件編寫 netbox 精細管理網路設備與連接線路 IP 資源管理 phpipam 專注網路IP分配 邏輯塊文件編寫 draw.io 視覺化概念圖 機房設備管理 ITDB 管理設備生命週期與使用者

By Phillips Hsieh

如何在Raspberry Pi4上安裝Proxmox for ARM64

第一步 準備好Raspberry Pi 4 / CM4 4GB RAM,這裡要留意CM4如果是買有內建eMMC storage會限制不能使用SD卡開機而限制本地空間容量,如果沒有NAS外接空間或使用USB開機的話,建議買CM4 Lite插上大容量SD卡 第二步 去Armbian官網下載最小化Debian bookworm image https://www.armbian.com/rpi4b/ Armbian 25.2.2 Bookworm Minimal / IOT 然後寫入SD/USB開機碟,寫入方法參考官方文件 https://github.com/raspberrypi/usbboot/blob/master/Readme.md Note: 官方提供的預先設定系統方法,可以在Armbian初次啟動自動化完成系統設定。連結在此 https://docs.armbian.com/User-Guide_Autoconfig/

By Phillips Hsieh

世界越快心越慢

在晚飯後的休息時間,我特別享受在客廳瀏灠youtube上各樣各式創作者的影音作品。很大不同於傳統媒體,節目多是針對大多數族群喜好挑選的,在youtube上我會依心情看無腦的動畫、一些旅拍記錄、新聞時事談論。 尤其在看了大量的Youtube的分享後,我真的感受到會限制我的是我的無知,特別是那些我想都沒想過的實際應用,在學習後大大幫助到我的生活和工作層面。 休息在家時,我喜歡想一些沒做過的菜,動手去設計生活和工作上的解決方案,自己是真的很難閒著沒事做。 如創作文章,陪養新的習慣都能感覺到成長的喜悅,是不同於吃喝玩樂的快樂的。 創作不去限制固定的形式,文字是創作、影像聲音也是創作,記錄生活也是創作,我想留下的就是創造—》實現—》回憶,這樣子的循環過程,在留下的足跡面看到自己一路上的成長、失敗、絕望、重新再來。 雖然大部份的時候去做這些創作也不明白有什麼特別的意義,但不去做也不會留下什麼,所以呀不如反事都去試試看,也許能有不一樣的水花也許有意想不到的結果,投資自己永遠不會是失敗的決定,不是嗎?先問問自己再開始計畫下一步,未來沒人說得準。 像最近看youtube仍大一群人在為DOS開

By Phillips Hsieh

知識管理的三個步驟:一小時學會把知識運用到生活上

摘錄瓦基「閱讀前哨站」文章作為自己學習知識管理的內容 Part1「篩選資訊」 如何從海量資訊中篩選出啟發性、實用性和相關性的精華,讓你在學習過程中不再迷失方向。 1. 實用性 2. 啟發性 Part2「提高理解」 如何通過譬喻法和應用法,將抽象的知識與日常生活和工作緊密結合,建立更深刻的理解。 1. 應用法 2. 譬喻法 Part3「運用知識」 如何連結既有知識,跟自己感興趣的領域和專案產生關聯,讓你在運用知識的路途上游刃有餘。 1. 跟日常工作專案、人際活動產生連結 # 為什麼要寫日記? * 寫日記是為了忘記,忘卻瑣碎事情,保持專注力 * 寫日記就像在翻譯這個世界,訓練自己的解讀能力 * 不只是透過日記來記錄生活,而是透過日記來發展生活 #如何寫日記? * 不要寫流水帳式的日記,而是寫覆盤式的日記 當我們試著記錄活動和感受之間的關聯,有助於辦認出真正快樂的事 日記的記錄方式要以過程為主,而非結果 * 感恩日記的科學建議,每日感恩的案例

By Phillips Hsieh