Type Name | Meaning | Attributes | Notes |
| | | |
| additional metadata for queue tables | | |
| | | |
| | | |
| | | Modeled as dependent, granted object. The base object name is the statement audit option name (for example, ALTER SYSTEM). There is no base object schema. The grantee is the user or proxy whose statements are audited. |
| | | |
| | | |
| | | |
| | | Does not include: primary key constraint for IOT column NOT NULL constraints certain REF SCOPE and WITH ROWID constraints for tables with REF columns
|
| | | |
| all metadata objects in a database | | Corresponds to a full database export |
| | | Modeled as schema objects because they have owners. For public links, the owner is PUBLIC. For private links, the creator is the owner. |
| | | Granted to a user by ALTER USER |
| | | |
| | | |
| fine-grained audit policies | | Not modeled as named object because policy names are not unique. |
| | | |
| precomputed statistics on indexes | | The base object is the index's table. |
| | | |
| | | |
| | | |
| | | |
| external procedure libraries | | |
| | | |
| | | |
| | | |
| | G | Modeled as user grants. Grants the privileges of one user to other user in the form GRANT ... ON USER .... The grantee is the user. Example: GRANT INHERIT PRIVILEGES ON USER "USER1" TO "USER2". |
| | | |
| | | By default, both package specification and package body are retrieved. See "[color=var(--oj-link-text-color)] SET_FILTER Procedure". |
| | | |
| | | |
| | | |
| | | |
| | | Granted to a user by ALTER USER |
| | | |
| | | |
| | | |
| driving contexts for enforcement of fine-grained access-control policies | | Corresponds to the DBMS_RLS.ADD_POLICY_CONTENT procedure |
| fine-grained access-control policy groups | | Corresponds to the DBMS_RLS.CREATE_GROUP procedure |
| fine-grained access-control policies | | Corresponds to DBMS_RLS.ADD_GROUPED_POLICY. Not modeled as named objects because policy names are not unique. |
| | | Data Pump does not use these object types. Instead, it exports resource manager objects as procedural objects. |
RMGR_INTITIAL_CONSUMER_GROUP | assign initial consumer groups to users | | |
| | | |
| | | Dependent on resource plan |
| | | |
| | | |
| | | |
| all metadata objects in a schema | | Corresponds to user-mode export. |
| | | |
| | | Private synonyms are schema objects. Public synonyms are not, but for the purposes of this API, their schema name is PUBLIC. The name of a synonym is considered to be the synonym itself. For example, in CREATE PUBLIC SYNONYM FOO FOR BAR, the resultant object is considered to have name FOO and schema PUBLIC. |
| | | |
| | | |
| metadata describing row data for a table, nested table, or partition | | For partitions, the object name is the partition name. For nested tables, the object name is the storage table name. The base object is the top-level table to which the table data belongs. For nested tables and partitioning, this is the top-level table (not the parent table or partition). For nonpartitioned tables and non-nested tables this is the table itself. |
| metadata for a table and its associated objects | | Corresponds to table-mode export |
| precomputed statistics on tables | | |
| | | |
| | | |
| metadata for objects in a transportable tablespace set | | Corresponds to transportable tablespace export |
| | | |
| | | |
| | | By default, both type and type body are retrieved. See "SET_FILTER Procedure". . |
| | | |
| | | |
| | | |
| | | |
| | | The object's name is its URL (which may be longer than 30 characters). Its schema is the user who registered it. |
| Real Application Security (RAS) user | | |
| Real Application Security (RAS) role | | |
| Real Application Security (RAS) rolesets | | Corresponds to RAS rolesets |
| Real Application Security (RAS) role grants | | Corresponds to RAS role grants |
| Real Application Security (RAS) security class | | Corresponds to RAS security classes |
| Real Application Security (RAS) data security policy | | Corresponds to RAS data security policies |
| Real Application Security (RAS) ACL | | Corresponds to RAS access control lists (ACLs) and associated access control entries (ACEs) |
| Real Application Security (RAS) ACL parameter | | Corresponds to RAS access control lists (ACL) parameters |
| Real Application Security (RAS) namespace | | Corresponds to RAS namespa |