Neoview User Management and Security Administration Guide (R2.5)

BESSTALMADGE ROLE.ROLE002 Y
BESSTALMADGE ROLE.ROLE003
BESSTALMADGE ROLE.ROLE004
CHESLEY3 ROLE.ROLE001 Y
CHESLEY3 ROLE.ROLE002 Y
CHESLEY3 ROLE.ROLE003
DAVELEE5 ROLE.ROLE001 Y
DAVELEE6 ROLE.ROLE002 Y
DAVELEE6 ROLE.ROLE003
DAVELEE7 ROLE.ROLE001 Y
DAVELEE8 ROLE.ROLE002 Y
DAVELEE8 ROLE.ROLE003
DAVELEE9 ROLE.ROLE001 Y
ORVILLETANG1 ROLE.ROLE002 Y
ORVILLETANG1 ROLE.ROLE001
ORVILLETANG1 ROLE.MGR
ORVILLETANG2 ROLE.MGR Y
ORVILLETANG2 ROLE.ROLE002
ORVILLETANG2 ROLE.ROLE003
ORVILLETANG4 ROLE.DBA Y
ORVILLETANG5 ROLE.SECMGR Y
ORVILLETANG6 ROLE.SECMGR Y
ORVILLETANG6 ROLE.MGR
If the query is run by BESSTALMADGE, it displays only the following rows:
User Name ROLE_NAME IS_DEFAULT
-------------------- ------------- ------------
BESSTALMADGE ROLE.ROLE002 Y
BESSTALMADGE ROLE.ROLE003
BESSTALMADGE ROLE.ROLE004
This query displays all the roles assigned to a specified user:
select role_name,is_default from hp_security.userroleinfo
where user_name = 'POCAHONTAS';
ROLE_NAME IS_DEFAULT
------------- ------------
ROLE.MARKTNG Yes
ROLE.EMPLOYM
ROLE.DBGRP3
This query displays the roles assigned to users with names starting “ONEILLC”. The display
indicates which role is the user's default role. A NULL value in the LAST_DB_LOGIN field
indicates that the user has not yet logged on in the role.
SQL>select substring(user_name,1,15) as user_name, substring(role_name,1,15) as role_name, is_default,
last_db_login from hp_security.userroleinfo where user_name like 'ONEILLC%';
USER_NAME ROLE_NAME IS_DEFAULT LAST_DB_LOGIN
--------------- --------------- ---------- --------------------------
ONEILLC9 ROLE.PUBS01 Yes 2009-09-03 16:19:26.392425
ONEILLC10 ROLE.PUBS02 Yes NULL
ONEILLC9 ROLE.PUBS02 NULL
User Configuration Change Log for Database Users (HP_SECURITY.USERROLELOG)
The user role log view (USERROLELOG) consists of one row for each user-management action.
For each action, the view indicates what the action was and when it occurred, the user or role to
which the action applies, the user's role if the action pertained to a user, and the name of the user
who took the action.
The retention time for data in the underlying table and therefore in this view is controlled by a
setting in the system security policy.
Column Definitions
Each row consists of the following columns:
124 User and Role Management