What are application access privileges?

Application access privileges define the actions you can perform on an application and the components owned by it. By default, you are granted the highest level of access, Manage, on any application you create. With Manage privileges, not only can you perform actions on the application and create components within it, but you can grant access privileges to other Portal developers, and delete the application.

The Action column of the Portal Application Navigator indicates the actions you can perform on the application.

Application- versus component-level privileges

Application-level privileges potentially apply to all components in an application. Any component built in an application by default inherits privileges from the application. For example, after MY_CHART is created in MY_APP, Oracle Portal developers with Edit or higher access privileges on MY_APP can edit MY_CHART.

Component-level privileges apply only to individual components within an application. Users with Manage application-level access can override these privileges and set access on a component level rather than the application level.

Application-level access privileges and the actions you can perform with them are listed below.

Application-level access privileges

 Manage

Edit

View Source

Customize

Execute

Grant application privileges to other users

 

 

 

 

 

Drop the application and all of its components from the database.

 

 

 

 

 

Rename and export the application

 

 

 

 

Create components in the application

 

 

 

Edit components owned by the application

 

 

 

Drop individual components owned by the application

 

 

 

 

Copy, rename, and export components owned by the application

 

 

 

 

View the call interface, package spec and body of components owned by the application

 

 

 

 

Customize the application or any component within it

 

 

 

 

Run the application or any component within it

 

 

 

 

 

Development versus run-time privileges

The above privileges can be divided into those that apply to application development or to run-time application deployment. MANAGE, EDIT, and VIEW privileges provide security for an application while it is being developed.

Because MANAGE privileges provide the ability to do anything in an application, you'd typically grant it to one or more project leads with overall responsibility for planning and managing the development of the application.

EDIT privileges typically are granted to developers who will be creating and updating the application's components.

VIEW SOURCE privileges might be granted to other developers who need to know what the application's code looks like, but don't need to edit or add code. For example, you might grant this privilege to a shared component developer or a developer of another application who is creating a named link to a component in your application.

CUSTOMIZE and RUN privileges provide access to the application after it has been created and deployed in a run-time environment such as an Oracle Portal content area. RUN enables a user to run any component in the application,

You can restrict access to an application using CUSTOMIZE. For example, you may want provide some users with a restricted view of salary data, but allow other a wider view. You could include in your application a report that by default presents data for a particular department. All users with RUN privileges could see that data. Users with CUSTOMIZE privileges might customize the report to view data for that department or other departments.

Related topics

  •  What are global access privileges?

  •  Granting application access privileges