tag:blogger.com,1999:blog-12214002.post4923360027237357004..comments2024-03-09T06:56:57.099-05:00Comments on Let's Wreck This Together...with Oracle Application Express!: Application Express and parsing of SQLJoel R. Kallmanhttp://www.blogger.com/profile/01915290758512999160noreply@blogger.comBlogger5125tag:blogger.com,1999:blog-12214002.post-24365021891323586392016-03-04T05:43:03.142-05:002016-03-04T05:43:03.142-05:00Hi Tony,
Parsing of SQL in APEX is done with resp...Hi Tony,<br /><br />Parsing of SQL in APEX is done with respect to both roles and directly granted privileges.<br /><br />JoelJoel R. Kallmanhttps://www.blogger.com/profile/01915290758512999160noreply@blogger.comtag:blogger.com,1999:blog-12214002.post-8903521070221160302016-03-03T13:10:22.024-05:002016-03-03T13:10:22.024-05:00So quick question, does APEX support database role...So quick question, does APEX support database roles or is still limited as in prior versions?APEX Developer In the USAhttps://www.blogger.com/profile/06746962787261032815noreply@blogger.comtag:blogger.com,1999:blog-12214002.post-50327986537843908982010-08-24T13:54:45.681-04:002010-08-24T13:54:45.681-04:00>Since there really isn't any great explana...>Since there really isn't any great explanation of this anywhere<br /><br /><a href="http://forums.oracle.com/forums/thread.jspa?messageID=926724&tstart=0#926724" rel="nofollow">Not as up to date, not as brief, but definitely in the "great" category..</a>Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-12214002.post-16218890530249666392010-08-17T08:07:59.178-04:002010-08-17T08:07:59.178-04:00Thanks for this great explanation.Thanks for this great explanation.Stewhttps://www.blogger.com/profile/05177922393895344852noreply@blogger.comtag:blogger.com,1999:blog-12214002.post-77316819939794836182010-08-13T15:32:24.182-04:002010-08-13T15:32:24.182-04:00But, you can fairly easily develop VPD policies th...But, you can fairly easily develop VPD policies that do use the roles, or roles that you've setup with your Apex application that are observed. So while this doesn't do too much for system privileges it does let you use roles to secure the data, which the original person may have interested in as well. Maybe I am off base on what they were shooting for.Tonyhttps://www.blogger.com/profile/12184354575866057215noreply@blogger.com