B DBMS_SQL_FIREWALL
The DBMS_SQL_FIREWALL
package enables you to monitor users and detect or prevent SQL injection attacks against those users.
This chapter contains the following topics:
B.1 DBMS_SQL_FIREWALL Overview
The DBMS_SQL_FIREWALL
PL/SQL package enables you to manage SQL Firewall, which tracks and can block SQL injection attacks.
The DBMS_SQL_FIREWALL
package enables you to capture SQL activities of users, create allow-lists (that is, permitted actions) from the captured SQL activities, and then enforce the allow-lists to prevent or detect potential SQL injection attacks. In addition to SQL statements, the allow-list can contain a context list, which is a set of session contexts allowed for database connections. An example of a context can be IP addresses. You can also configure SQL Firewall to not run when Oracle Scheduler is running, because to do so may interfere with Oracle Scheduler operations. After you enable the allow-list, any SQL that the user performs will be monitored by SQL Firewall. SQL that the user performs that is not in the allow-list is considered to be a SQL injection attack. You can configure SQL Firewall to either allow the user to continue performing these SQL operations, or you can block these activities. Note that the SQL operations that violate the allow-list will always be written to a log table that you can query with data dictionary views.
You can configure SQL Firewall in both the root and in individual pluggable databases (PDBs).
Related Topics
B.2 DBMS_SQL_FIREWALL Security Model
Oracle Database protects the administration of SQL Firewall by storing its metadata in tables in the SYS
schema.
Hence, these tables rely on dictionary protection, just as other dictionary tables in SYS
do. Therefore, users who have the SELECT ANY TABLE
system privilege cannot query these tables unless they also have the SELECT ANY DICTIONARY
system privilege or are granted the SELECT
object privileges on the tables. Only the SYS
user can grant these privileges to other users.
Oracle Database stores the SQL Firewall tables in the SYSAUX
tablespace by default. If you want to move the SQL Firewall log tables to a different (user-defined) tablespace, then you must first disable SQL Firewall, and then use the MOVE
clause of the ALTER TABLE
statement to perform the move operation.
To use the procedures in the DBMS_SQL_FIREWALL
package, a user must be granted the SQL_FIREWALL_ADMIN
role.
Related Topics
B.3 DBMS_SQL_FIREWALL Constants
The DBMS_SQL_FIREWALL
package provides constants that are used with several SQL Firewall procedures.
These constants are described in the following table.
Table B-1 DBMS_SQL_FIREWALL Constants
Name | Type | Value | Description |
---|---|---|---|
|
|
|
Enforces both allowed SQL and allowed contexts when you run the |
|
|
|
Enforces allowed contexts when you run the |
|
|
|
Enforces allowed SQL when you run the |
|
|
|
Purges all logs when you run the |
|
NUMBER |
|
Purges only capture logs when you run the |
|
|
|
Specifies the user's IP address when you run the |
|
|
|
Specifies the user's operating system program when you run the |
|
|
|
Specifies an operating system name when you run the |
|
|
|
Indicates whether SQL Firewall will capture and enforce allow-lists for database connections and SQL executions during Oracle Scheduler operations. Use this constant with the |
|
|
|
Purges only violation logs when you run the |
B.4 Summary of DBMS_SQL_FIREWALL Subprograms
This table lists and describes the DBMS_SQL_FIREWALL
package subprograms.
Table B-2 DBMS_SQL_FIREWALL Package Subprograms
Subprogram | Description |
---|---|
Adds a context to the list of allowed contexts for a user who is configured for SQL Firewall |
|
Appends additional contents to an existing allow-list by using the existing capture logs or violation logs of the user, or both |
|
Appends a single SQL record to the violation log or capture log to an existing allow-list |
|
Creates a SQL Firewall capture for a specified user at a given level |
|
Deletes a SQL Firewall context value that had been assigned to a user |
|
Deletes a specified entry from the allowed SQL that had been assigned to a user |
|
Disables SQL Firewall |
|
Disables SQL Firewall allow-list enforcement for a given user |
|
Deletes the SQL Firewall allow-list of a specified user |
|
Drops a SQL Firewall capture and deletes all the associated capture logs |
|
Enables SQL Firewall |
|
Enables SQL Firewall allow-list enforcement for a given user |
|
Prevents SQL Firewall from capturing or enforcing allow-lists for database connections and SQL executions during Oracle Scheduler operations |
|
Exports the allow-list of the given user in JSON format, into the CLOB provided from the |
|
Flushes all the SQL Firewall logs that reside in the memory into the log tables |
|
Generates a SQL Firewall allow-list for the specified user by using data from the existing capture logs of the user |
|
Imports the allow-list from the specified |
|
Enables SQL Firewall to capture and enforce allow-lists for database connections and SQL executions during Oracle Scheduler operations |
|
Purges SQL Firewall logs |
|
Starts a SQL Firewall capture for a user |
|
Stops a SQL Firewall capture for a user |
|
Updates the SQL Firewall allow-list enforcement options for the given user |
B.4.1 ADD_ALLOWED_CONTEXT Procedure
This procedure adds a context to the list of allowed contexts for a user's SQL Firewall allow-list.
Syntax
DBMS_SQL_FIREWALL.ADD_ALLOWED_CONTEXT ( username IN VARCHAR2, context_type IN NUMBER, value IN VARCHAR2);
Parameters
Table B-3 ADD_ALLOWED_CONTEXT Procedure Parameters
Parameter | Description |
---|---|
|
Specifies the name of the user who has a SQL Firewall allow-list. To find all the users who has an allow-list, query |
|
Specifies one of the following context types:
|
|
Specifies the value of the |
Usage Notes
-
You can find the user's current context type settings by querying the following data dictionary views:
DBA_SQL_FIREWALL_ALLOWED_IP_ADDR
DBA_SQL_FIREWALL_ALLOWED_OS_PROG
DBA_SQL_FIREWALL_ALLOWED_OS_USER
- Before you can add any contexts for the user, the user's allow-list must be created (using the
DBMS_SQL_FIREWALL.GENERATE_ALLOW_LIST
procedure). - This procedure can be run when the allow-list is enabled or disabled, and it takes effects immediately.
Example
BEGIN
DBMS_SQL_FIREWALL.ADD_ALLOWED_CONTEXT (
username => 'PFITCH',
context_type => DBMS_SQL_FIREWALL.OS_PROGRAM,
value => 'SQL Developer'
);
END;
/
B.4.2 APPEND_ALLOW_LIST Procedure
This procedure appends additional contents to an existing allow-list by using the existing capture logs or violation logs of the user, or both.
Syntax
DBMS_SQL_FIREWALL.APPEND_ALLOW_LIST ( username IN VARCHAR2, source IN NUMBER);
Parameters
Table B-4 APPEND_ALLOW_LIST Procedure Parameters
Parameter | Description |
---|---|
|
Specifies the name of the user who was designated for the SQL Firewall allow-list. To find this user, query |
|
Specifies one of the following log types:
|
Usage Notes
DBMS_SQL_FIREWALL.APPEND_ALLOW_LIST
processes the specified source logs and identifies contents to be appended to the allow-list. Then it populates the SQL Firewall metadata tables for the allowed SQL and allowed contexts, which will be used during the allow-list enforcement.- You can run this procedure when the allow-list is either enabled or disabled.
- The change takes effect immediately.
- A new allow-list version number will be associated with all the allowed SQL entries added by the same
DBMS_SQL_FIREWALL.APPEND_ALLOW_LIST
execution. This new version number will be1
plus the current maximum allow-list version of the specified user.
Example
BEGIN
DBMS_SQL_FIREWALL.APPEND_ALLOW_LIST (
username => 'PFITCH',
source => DBMS_SQL_FIREWALL.CAPTURE_LOG
);
END;
/
B.4.3 APPEND_ALLOW_LIST_SINGLE_SQL Procedure
This procedure appends a single SQL record to the violation log or capture log to an existing allow-list.
This procedure is useful for when you want to individually append SQL commands from the violations log or the capture log to an existing allow-list.
Syntax
DBMS_SQL_FIREWALL.APPEND_ALLOW_LIST_SINGLE_SQL ( username IN VARCHAR2, sql_signature IN VARCHAR2, current_user IN VARCHAR2, top_level IN VARCHAR2, source IN NUMBER DEFAULT);
Parameters
Table B-5 APPEND_ALLOW_LIST_SINGLE_SQL Procedure Parameters
Parameter | Description |
---|---|
|
Specifies the name of the user who was designated for the SQL Firewall allow-list. To find this user, query |
|
Specifies the signature of the SQL to be added. To find the signature of the SQL for the target record, query the |
|
Specifies the name of the user who the SQL command was executed as. For example, if user pfitch invokes a definer's rights procedure created in the psmith schema, then all the SQL commands in the procedure are executed as psmith , the current_user . If the procedure is an invoker's rights procedure, then the current_user is the invoker, pfitch .
|
|
Specifies whether the SQL that was executed was top level. Possible values are as follows:
|
|
Specifies the source log to add the SQL record from:
|
Usage Notes
DBMS_SQL_FIREWALL.APPEND_ALLOW_LIST_SINGLE_SQL
processes the specified source log and identifies the target SQL record to be appended to the allow-list. Then it populates the SQL Firewall metadata tables for the allowed SQL, which will be used during the allow-list enforcement.- You can run this procedure when the allow-list is either enabled or disabled.
- The change takes effect immediately.
- A new allow-list version number will be associated with the newly added allowed SQL entry.
Example
- Query the
DBA_SQL_FIREWALL_VIOLATIONS
or theDBA_SQL_FIREWALL_CAPTURE_LOGS
data dictionary view to find the target SQL record that you want to add to the allow-list.Obtain the values for the
USERNAME
,SQL_SIGNATURE
,CURRENT_USER
, andTOP_LEVEL
columns for the target SQL record. - Enter these values in the
DBMS_SQL_FIREWALL.APPEND_ALLOW_LIST_SINGLE_SQL
SQL procedure to add the target SQL record to the allow-list.For example:
BEGIN DBMS_SQL_FIREWALL.APPEND_ALLOW_LIST_SINGLE_SQL ( username => 'PFITCH', sql_signature => '7D33A84D0A1B56E382B9A92D01BCD19933969CB16E2AB4934A2258563F5ADB44', current_user => 'PSMITH', top_level => 'N', source => DBMS_SQL_FIREWALL.CAPTURE_LOG ); END; /
B.4.4 CREATE_CAPTURE Procedure
This procedure creates a SQL Firewall capture for a specified user at a given level.
Syntax
DBMS_SQL_FIREWALL.CREATE_CAPTURE ( username IN VARCHAR2, top_level_only IN BOOLEAN, start_capture IN BOOLEAN);
Parameters
Table B-6 CREATE_CAPTURE Procedure Parameters
Parameter | Description |
---|---|
|
Specifies the name of the user whose SQL Firewall capture is to be created. To find existing users, query |
|
|
|
|
Usage Notes
To find the status of existing SQL Firewall captures, including users who have already been configured for SQL Firewall captures, query the DBA_SQL_FIREWALL_CAPTURES
data dictionary view.
Example
BEGIN
DBMS_SQL_FIREWALL.CREATE_CAPTURE (
username => 'C##HR_ADMIN',
top_level_only => TRUE,
start_capture => TRUE
);
END;
/
B.4.5 DELETE_ALLOWED_CONTEXT Procedure
This procedure deletes a context from the list of allowed contexts for a user's SQL Firewall allow-list.
Syntax
DBMS_SQL_FIREWALL.DELETE_ALLOWED_CONTEXT ( username IN VARCHAR2, context_type IN NUMBER, value IN VARCHAR2);
Parameters
Table B-7 DELETE_ALLOWED_CONTEXT Procedure Parameters
Parameter | Description |
---|---|
|
Specifies the name of the user who was designated for the SQL Firewall allow-list. To find this user, query |
|
|
|
Specifies the value of the |
Usage Notes
- You can find the user's current context type settings by querying the following data dictionary views:
DBA_SQL_FIREWALL_ALLOWED_IP_ADDR
DBA_SQL_FIREWALL_ALLOWED_OS_PROG
DBA_SQL_FIREWALL_ALLOWED_OS_USER
- This procedure can be run when the allow-list is enabled or disabled, and it takes effects immediately.
Example
BEGIN
DBMS_SQL_FIREWALL.DELETE_ALLOWED_CONTEXT, (
username => 'PFITCH',
context_type => DBMS_SQL_FIREWALL.OS_PROGRAM,
value => 'SQL Developer'
);
END;
/
B.4.6 DELETE_ALLOWED_SQL Procedure
This procedure deletes a specified entry from the list of allowed SQL for a user's SQL Firewall allow-list
Syntax
DBMS_SQL_FIREWALL.DELETE_ALLOWED_SQL ( username IN VARCHAR2, allowed_sql_id IN NUMBER);
Parameters
Table B-8 DELETE_ALLOWED_SQL Procedure Parameters
Parameter | Description |
---|---|
|
Specifies the name of the user who was designated for the SQL Firewall allow-list. To find this user, query |
|
Specifies the ID of the allowed SQL entry to be deleted from the allowed SQL of this user.To find this value, query |
Usage Notes
- You can run this procedure when the allow-list is either enabled or disabled.
- The change takes effect immediately.
Example
BEGIN
DBMS_SQL_FIREWALL.DELETE_ALLOWED_SQL (
username => 'PFITCH',
allowed_sql_id => 1
);
END;
/
B.4.7 DISABLE Procedure
This procedure disables SQL Firewall and stops all the existing captures and allow-lists that are enabled.
Syntax
DBMS_SQL_FIREWALL.DISABLE;
Parameters
None
Usage Notes
You can find the current status of SQL Firewall by querying the DBA_SQL_FIREWALL_STATUS
data dictionary view.
Example
EXEC DBMS_SQL_FIREWALL.DISABLE;
B.4.8 DISABLE_ALLOW_LIST Procedure
This procedure immediately disables SQL Firewall allow-list enforcement for a given user.
Syntax
DBMS_SQL_FIREWALL.DISABLE_ALLOW_LIST ( username IN VARCHAR2);
Parameters
Table B-9 DISABLE_ALLOW_LIST Procedure Parameters
Parameter | Description |
---|---|
|
Specifies the name of the user who was designated for the SQL Firewall allow-list. To find this user, query |
Usage Notes
To find the status of users' allow-lists, query the DBA_SQL_FIREWALL_ALLOW_LISTS
data dictionary view.
Example
EXEC DBMS_SQL_FIREWALL.DISABLE_ALLOW_LIST ('PFITCH');
B.4.9 DROP_ALLOW_LIST Procedure
This procedure deletes the SQL Firewall allow-list of a specified user.
Syntax
DBMS_SQL_FIREWALL.DROP_ALLOW_LIST ( username IN VARCHAR2);
Parameters
Table B-10 DROP_ALLOW_LIST Procedure Parameters
Parameter | Description |
---|---|
|
Specifies the name of the user who was designated for the SQL Firewall allow-list. To find this user, query |
Usage Notes
-
To find the status of users' allow-lists, query the
DBA_SQL_FIREWALL_ALLOW_LISTS
data dictionary view. -
You cannot drop an allow-list that is currently enabled. To disable an allow-list, run the
DBMS_SQL_FIREWALL.DISABLE_ALLOW_LIST
procedure.
Example
EXEC DBMS_SQL_FIREWALL.DROP_ALLOW_LIST ('PFITCH');
B.4.10 DROP_CAPTURE Procedure
This procedure drops a SQL Firewall capture and deletes all the associated capture logs.
Syntax
DBMS_SQL_FIREWALL.DROP_CAPTURE ( username IN VARCHAR2);
Parameters
Table B-11 DROP_CAPTURE procedure Parameters
Parameter | Description |
---|---|
|
Specifies the name of the user whose SQL Firewall capture is to be dropped. To find this user, query |
Usage Notes
-
To find the status of existing SQL Firewall captures, query the
DBA_SQL_FIREWALL_CAPTURES
data dictionary view. -
You cannot drop a capture that is currently running. To stop the capture, run the
DBMS_SQL_FIREWALL.STOP_CAPTURE
procedure. -
Dropping a capture for a user does not affect the user's allow-list, which can continue to run even if the capture has been dropped. Captures and allow-lists are separate entities.
Example
EXEC DBMS_SQL_FIREWALL.DROP_CAPTURE ('C##HR_ADMIN');
B.4.11 ENABLE Procedure
This procedure enables SQL Firewall and starts all existing captures and allow-lists that are configured to be enabled.
Syntax
DBMS_SQL_FIREWALL.ENABLE;
Parameters
None
Usage Notes
You can find the current status of SQL Firewall by querying the DBA_SQL_FIREWALL_STATUS
data dictionary view.
Example
EXEC DBMS_SQL_FIREWALL.ENABLE;
B.4.12 ENABLE_ALLOW_LIST Procedure
This procedure immediately enables SQL Firewall allow-list enforcement for a given user.
Syntax
DBMS_SQL_FIREWALL.ENABLE_ALLOW_LIST ( username IN VARCHAR2, enforce IN NUMBER, block IN BOOLEAN;
Parameters
Table B-12 ENABLE_ALLOW_LIST Procedure Parameters
Parameter | Description |
---|---|
|
Specifies the name of the user whose SQL Firewall allow-list is to be enabled. To find this user, query |
|
|
|
|
Usage Notes
-
To find the status of users' allow-lists, query the
DBA_SQL_FIREWALL_ALLOW_LISTS
data dictionary view. -
SQL Firewall always generates a violation log for any unmatched database connection or SQL statement regardless of the
block
option setting.
Example
BEGIN
DBMS_SQL_FIREWALL.ENABLE_ALLOW_LIST (
username => 'PFITCH',
enforce => DBMS_SQL_FIREWALL.ENFORCE_SQL,
block => TRUE
);
END;
/
B.4.13 EXCLUDE Procedure
This procedure prevents SQL Firewall from capturing or enforcing allow-lists for database connections and SQL executions during Oracle Scheduler operations.
Oracle Scheduler jobs are often used in databases for various maintenance purposes. Accidentally interrupting critical jobs can cause undesirable consequences. You can configure SQL Firewall to not capture any SQL statements nor enforce any allow-lists that are run during an Oracle Scheduler job session. This procedure applies to all users that have been configured for SQL Firewall captures and allow-lists. By default, Oracle Scheduler jobs are excluded from SQL Firewall operations.
Syntax
DBMS_SQL_FIREWALL.EXCLUDE ( FEATURE IN NUMBER);
Parameters
Table B-13 EXCLUDE Procedure Parameters
Parameter | Description |
---|---|
|
Enter |
Usage Notes
-
To find the status of whether SQL Firewall is enforced during Oracle Scheduler operations, query the
EXCLUDE_JOBS
column of theDBA_SQL_FIREWALL_STATUS
data dictionary view. If the output isY
, then Oracle Scheduler jobs are excluded from SQL Firewall operations. -
To enable Oracle Firewall to run during Oracle Scheduler operations, run the
DBMS_SQL_FIREWALL.INCLUDE
procedure.
Example
EXEC DBMS_SQL_FIREWALL.EXCLUDE (DBMS_SQL_FIREWALL.SCHEDULER_JOB);
B.4.14 EXPORT_ALLOW_LIST Procedure
This procedure exports the allow-list of the given user in JSON format, into the CLOB provided from the allow_list
argument.
Syntax
DBMS_SQL_FIREWALL.EXPORT_ALLOW_LIST ( username IN VARCHAR2, allow_list IN/OUT CLOB;
Parameters
Table B-14 EXPORT_ALLOW_LIST Procedure Parameters
Parameter | Description |
---|---|
|
Specifies the user that the allow-list was created for. To find which user has an allow-list, query |
|
Specifies the |
Usage Notes
-
Before you run this procedure, you must create the
CLOB
and then pass it to the API (for example, byDBMS_LOB.CREATETEMPORARY
for the PL/SQL client, or byOracleConnection.createClob()
for JDBC Java client). -
The export operation includes the allow-list's settings (
status
,enforce
,block
,top_level_only
,generated_on
, andstatus_updated_on timestamp
), allowed SQL, and allowed contexts. In addition, the export operation includes all the referenced SQL logs (by the allowed SQL). -
DBMS_SQL_FIREWALL.EXPORT_ALLOW_LIST
does not export capture logs or violation logs. -
To find the status of users' allow-lists, query the
DBA_SQL_FIREWALL_ALLOW_LISTS
data dictionary view. -
If you want to export all the SQL Firewall metadata, which includes captures and allow-lists for all users, then instead of using
DBMS_SQL_FIREWALL.EXPORT_ALLOW_LIST
, use theinclude=SQL_FIREWALL
clause in the Oracle Data Pumpexpdp
command. See Oracle Database Security Guide.
Example
BEGIN
DBMS_SQL_FIREWALL.EXPORT_ALLOW_LIST (
username => 'PFITCH',
allow_list => ALLOW_LIST_CLOB;
);
END;
/
B.4.15 FLUSH_LOGS Procedure
This procedure flushes all the SQL Firewall logs that reside in the memory into the log tables.
Syntax
DBMS_SQL_FIREWALL.FLUSH_LOGS;
Parameters
None
Usage Notes
- Usually you do not need to invoke this procedure explicitly, because logs in the memory are flushed to the log tables frequently in the background. But in case if you want to see the capture logs or violation logs immediately after the action during when SQL Firewall is running, you can run this procedure before looking at the logs.
- The
DBMS_SQL_FIREWALL.FLUSH_LOGS
procedure is equivalent to theDBMS_MEMOPTIMIZE_ADMIN.WRITES_FLUSH
procedure. (See WRITES_FLUSH Procedure.)
Example
EXEC DBMS_SQL_FIREWALL.FLUSH_LOGS;
B.4.16 GENERATE_ALLOW_LIST Procedure
This procedure generates a SQL Firewall allow-list for the specified user by using the existing capture logs of the user.
Syntax
DBMS_SQL_FIREWALL.GENERATE_ALLOW_LIST ( username IN VARCHAR2;
Parameters
Table B-15 GENERATE_ALLOW_LIST Procedure Parameters
Parameter | Description |
---|---|
|
Specifies the name of the user who was designated for the SQL Firewall allow-list. To find this user, query |
Usage Notes
- To find information about existing generated allow-lists, query the
DBA_SQL_FIREWALL_ALLOW_LISTS
data dictionary view. - Before you run this procedure, the following components must be in place:
- The specified user must exist.
- A capture (using
DBMS_SQL_FIREWALL.CREATE_CAPTURE
) has been created for this user. This capture must be disabled (usingDBMS_SQL_FIREWALL.STOP_CAPTURE
) before you can generate an allow-list for the user. - No allow-list exists yet for the user.
Example
EXEC DBMS_SQL_FIREWALL.GENERATE_ALLOW_LIST ('PFITCH');
B.4.17 IMPORT_ALLOW_LIST Procedure
This procedure imports the allow-list from the specified CLOB
for the given user, to the target database.
Syntax
DBMS_SQL_FIREWALL.IMPORT_ALLOW_LIST ( username IN VARCHAR2, allow_list IN CLOB;
Parameters
Table B-16 IMPORT_ALLOW_LIST Procedure Parameters
Parameter | Description |
---|---|
|
Specifies the user of the exported allow-list. To check whether this user already had an allow-list created in the target database, query |
|
Specifies the |
Usage Notes
-
If this user does not have an allow-list in the target database, a new allow-list will be created for this user using the allow-list from the JSON payload. The new allow-list will have the same settings (
status
,top_level_only
,enforce
,block
,generated_on
,status_updated_on
), same allowed contexts and same allowed SQL as the one in the JSON. If the specified user already has an allow-list in the target database, then all the settings (status
,top_level_only
,enforce
,block
, and various timestamps) of the existing allow-list will remain untouched, but only the allowed SQL and allowed contexts from the JSON will be merged into the ones for the existing allow-list. -
In addition, the import operation includes all the referenced SQL logs (by the allowed SQL).
-
To find the status of users' allow-lists, query the
DBA_SQL_FIREWALL_ALLOW_LISTS
data dictionary view. -
If you want to import all the SQL Firewall metadata, which includes captures and allow-lists, then instead of using
DBMS_SQL_FIREWALL.IMPORT_ALLOW_LIST
, use theinclude=SQL_FIREWALL
clause in the Oracle Data Pumpimpdp
command. See Oracle Database Security Guide.
Example
BEGIN
DBMS_SQL_FIREWALL.IMPORT_ALLOW_LIST (
username => 'PFITCH',
allow_list => ALLOW_LIST_CLOB;
);
END;
/
B.4.18 INCLUDE Procedure
This procedure enables SQL Firewall to capture and enforce allow-lists for database connections and SQL executions during Oracle Scheduler operations.
Syntax
DBMS_SQL_FIREWALL.INCLUDE ( FEATURE IN NUMBER);
Parameters
Table B-17 INCLUDE Procedure Parameters
Parameter | Description |
---|---|
|
Enter |
Usage Notes
-
To find the status of whether SQL Firewall is enforced during Oracle Scheduler operations, query the
EXCLUDE_JOBS
column of theDBA_SQL_FIREWALL_STATUS
data dictionary view. If the output isN
, then SQL Firewall can perform during Oracle Scheduler operations. -
To prevent SQL Firewall from running during Oracle Scheduler operations, run the
DBMS_SQL_FIREWALL.EXCLUDE
procedure.
Example
EXEC DBMS_SQL_FIREWALL.INCLUDE (DBMS_SQL_FIREWALL.SCHEDULER_JOB);
B.4.19 PURGE_LOG Procedure
This procedure purges SQL Firewall logs that belong to the given user based on the specified purge time (that is, logs that were generated before the specified purge time).
Syntax
BEGIN
DBMS_SQL_FIREWALL.PURGE_LOG (
username IN VARCHAR2,
purge_time IN TIMESTAMP WITH TIME ZONE,
log_type IN NUMBER);
Parameters
Table B-18 PURGE_LOG Procedure Parameters
Parameter | Description |
---|---|
|
Specifies the user whose capture logs or violation logs you want to purge. To see capture logs, query |
|
The timestamp (in |
|
Specifies the type of the logs to be purged.
|
Usage Notes
To find information about SQL Firewall logs, query the DBA_SQL_FIREWALL_VIOLATIONS
data dictionary view.
Example
BEGIN
DBMS_SQL_FIREWALL.PURGE_LOG (
username => 'PSMITH',
purge_time => TO_TIMESTAMP_TZ('23-JAN-22 18.44.42 -07:00', 'DD/MM/YY HH24:MI:SS TZH:TZM'),
log_type => DBMS_SQL_FIREWALL.VIOLATION_LOG
);
END;
/
B.4.20 START_CAPTURE Procedure
This procedure immediately starts a SQL Firewall capture for a user.
Syntax
DBMS_SQL_FIREWALL.START_CAPTURE ( username IN VARCHAR2);
Parameters
Table B-19 START_CAPTURE Procedure Parameters
Parameter | Description |
---|---|
|
Specifies the name of the user to be designated for the SQL Firewall capture. |
Usage Notes
-
A user can only have one SQL Firewall capture. To find if the user already has been configured for a capture, query the
DBA_SQL_FIREWALL_CAPTURES
data dictionary view. -
After you start the capture process, all SQL the user enters is captured into the SQL Firewall capture log table. You can periodically check the this SQL by querying the
DBA_SQL_FIREWALL_CAPTURE_LOGS
data dictionary view.
Example
EXEC DBMS_SQL_FIREWALL.START_CAPTURE ('PFITCH');
B.4.21 STOP_CAPTURE Procedure
This procedure immediately stops a SQL Firewall capture for a given user.
Syntax
DBMS_SQL_FIREWALL.STOP_CAPTURE ( username IN VARCHAR2);
Parameters
Table B-20 STOP_CAPTURE Procedure Parameters
Parameter | Description |
---|---|
|
Specifies the name of the user who was designated for the SQL Firewall capture. To find this user, query |
Usage Notes
-
The capture process must be currently running before you can run this procedure. You can check its status by querying the
DBA_SQL_FIREWALL_CAPTURES
data dictionary view. -
After you stop the capture process, you can generate an allow-list for the user by running the
DBMS_SQL_FIREWALL.GENERATE_ALLOW_LIST
procedure.
Example
EXEC DBMS_SQL_FIREWALL.STOP_CAPTURE ('PFITCH');
B.4.22 UPDATE_ALLOW_LIST_ENFORCEMENT Procedure
This procedure immediately updates the SQL Firewall allow-list enforcement options for the given user.
Syntax
BEGIN
DBMS_SQL_FIREWALL.UPDATE_ALLOW_LIST_ENFORCEMENT (
username IN VARCHAR2,
enforce IN NUMBER,
block IN BOOLEAN);
Parameters
Table B-21 UPDATE_ALLOW_LIST_ENFORCEMENT Procedure Parameters
Parameter | Description |
---|---|
|
Specifies the name of the user for whom the allow-list was generated. To find this user, query |
|
|
|
|
Usage Notes
To find the status of users' allow-lists, query the DBA_SQL_FIREWALL_ALLOW_LISTS
data dictionary view.
Example
BEGIN
DBMS_SQL_FIREWALL.UPDATE_ALLOW_LIST_ENFORCEMENT (
username => 'PFITCH',
enforce => DBMS_SQL_FIREWALL.ENFORCE_SQL,
block => TRUE
);
END;
/