<>
What are Portal DB provider access privileges?
Provider access privileges define the actions that can be performed on a provider and the database portlets owned by it. By default, you are granted the highest level of access, Manage access privilege, on any provider you create. With Manage privileges, not only can you perform actions on the provider and create database portlets within it, but you can grant access privileges to other Portal developers. You can also delete the provider.
The Action column of the Portal Navigator indicates the actions you can perform on the provider. (Actions not available to you are not listed.)
Provider-level versus database portlet-level privileges
Provider-level privileges potentially apply to all database portlets in an provider. Any database portlet built in a provider inherits privileges by default from the provider. For example, after MY_CHART is created in MY_APP, Oracle Portal developers with Edit or higher access privileges on MY_APP can edit MY_CHART.
database portlet-level privileges apply only to individual database portlets within a provider. Users with Manage provider-level access can override these privileges and set access on a database portlet level rather than the provider level.
Provider-level access privileges and the actions you can perform with them are listed below.
Provider-level access privileges
|
Manage |
Edit |
View Source |
Customize |
Execute |
Grant provider privileges to other users |
|
|
|
|
|
Drop the provider and all of its database portlets from the database. |
|
|
|
|
|
Rename and export the provider |
|
|
|
|
|
Create database portlets in the provider |
|
|
|
|
|
Edit database portlets owned by the provider |
|
|
|
|
|
Drop individual database portlets owned by the provider |
|
|
|
|
|
Copy, rename, and export database portlets owned by the provider |
|
|
|
|
|
View the call interface, package spec and body of database portlets owned by the provider |
|
|
|
|
|
Customize the provider or any database portlet within it |
|
|
|
|
|
Run the provider or any database portlet within it |
|
|
|
|
|
Development versus runtime privileges
The above privileges can be divided into those that apply to provider development or to runtime provider deployment. MANAGE, EDIT, and VIEW privileges provide security for a provider while it is being developed.
Because MANAGE privileges provide the ability to do anything in a provider, you'd typically grant it to one or more project leads with overall responsibility for planning and managing the development of the provider.
EDIT privileges typically are granted to developers who will be creating and updating the provider's database portlets.
VIEW SOURCE privileges might be granted to other developers who need to know what the provider's code looks like, but don't need to edit or add code. For example, you might grant this privilege to a shared database portlet developer or a developer of another provider who is creating a named link to a database portlet in your provider.
CUSTOMIZE and RUN privileges provide access to the provider after it has been created and deployed in a run-time environment such as an Oracle Portal content area. RUN enables a user to run any database portlet in the provider,
You can restrict access to a provider using CUSTOMIZE. For example, you may want provide some users with a restricted view of salary data, but allow other a wider view. You could include in your provider a report that by default presents data for a particular department. All users with RUN privileges could see that data. Users with CUSTOMIZE privileges might customize the report to view data for that department or other departments.