oci.DataSafe.getSecurityPolicyReportDatabaseViewAccessEntries
Explore with Pulumi AI
This data source provides the list of Security Policy Report Database View Access Entries in Oracle Cloud Infrastructure Data Safe service.
Retrieves a list of all database view access entries in Data Safe.
The ListDatabaseViewAccessEntries operation returns only the database view access objects for the specified security policy report.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as oci from "@pulumi/oci";
const testSecurityPolicyReportDatabaseViewAccessEntries = oci.DataSafe.getSecurityPolicyReportDatabaseViewAccessEntries({
securityPolicyReportId: testSecurityPolicyReport.id,
scimQuery: securityPolicyReportDatabaseViewAccessEntryScimQuery,
targetId: testTarget.id,
});
import pulumi
import pulumi_oci as oci
test_security_policy_report_database_view_access_entries = oci.DataSafe.get_security_policy_report_database_view_access_entries(security_policy_report_id=test_security_policy_report["id"],
scim_query=security_policy_report_database_view_access_entry_scim_query,
target_id=test_target["id"])
package main
import (
"github.com/pulumi/pulumi-oci/sdk/v2/go/oci/DataSafe"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := DataSafe.GetSecurityPolicyReportDatabaseViewAccessEntries(ctx, &datasafe.GetSecurityPolicyReportDatabaseViewAccessEntriesArgs{
SecurityPolicyReportId: testSecurityPolicyReport.Id,
ScimQuery: pulumi.StringRef(securityPolicyReportDatabaseViewAccessEntryScimQuery),
TargetId: pulumi.StringRef(testTarget.Id),
}, nil)
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Oci = Pulumi.Oci;
return await Deployment.RunAsync(() =>
{
var testSecurityPolicyReportDatabaseViewAccessEntries = Oci.DataSafe.GetSecurityPolicyReportDatabaseViewAccessEntries.Invoke(new()
{
SecurityPolicyReportId = testSecurityPolicyReport.Id,
ScimQuery = securityPolicyReportDatabaseViewAccessEntryScimQuery,
TargetId = testTarget.Id,
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.oci.DataSafe.DataSafeFunctions;
import com.pulumi.oci.DataSafe.inputs.GetSecurityPolicyReportDatabaseViewAccessEntriesArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var testSecurityPolicyReportDatabaseViewAccessEntries = DataSafeFunctions.getSecurityPolicyReportDatabaseViewAccessEntries(GetSecurityPolicyReportDatabaseViewAccessEntriesArgs.builder()
.securityPolicyReportId(testSecurityPolicyReport.id())
.scimQuery(securityPolicyReportDatabaseViewAccessEntryScimQuery)
.targetId(testTarget.id())
.build());
}
}
variables:
testSecurityPolicyReportDatabaseViewAccessEntries:
fn::invoke:
Function: oci:DataSafe:getSecurityPolicyReportDatabaseViewAccessEntries
Arguments:
securityPolicyReportId: ${testSecurityPolicyReport.id}
scimQuery: ${securityPolicyReportDatabaseViewAccessEntryScimQuery}
targetId: ${testTarget.id}
Using getSecurityPolicyReportDatabaseViewAccessEntries
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getSecurityPolicyReportDatabaseViewAccessEntries(args: GetSecurityPolicyReportDatabaseViewAccessEntriesArgs, opts?: InvokeOptions): Promise<GetSecurityPolicyReportDatabaseViewAccessEntriesResult>
function getSecurityPolicyReportDatabaseViewAccessEntriesOutput(args: GetSecurityPolicyReportDatabaseViewAccessEntriesOutputArgs, opts?: InvokeOptions): Output<GetSecurityPolicyReportDatabaseViewAccessEntriesResult>
def get_security_policy_report_database_view_access_entries(filters: Optional[Sequence[_datasafe.GetSecurityPolicyReportDatabaseViewAccessEntriesFilter]] = None,
scim_query: Optional[str] = None,
security_policy_report_id: Optional[str] = None,
target_id: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetSecurityPolicyReportDatabaseViewAccessEntriesResult
def get_security_policy_report_database_view_access_entries_output(filters: Optional[pulumi.Input[Sequence[pulumi.Input[_datasafe.GetSecurityPolicyReportDatabaseViewAccessEntriesFilterArgs]]]] = None,
scim_query: Optional[pulumi.Input[str]] = None,
security_policy_report_id: Optional[pulumi.Input[str]] = None,
target_id: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetSecurityPolicyReportDatabaseViewAccessEntriesResult]
func GetSecurityPolicyReportDatabaseViewAccessEntries(ctx *Context, args *GetSecurityPolicyReportDatabaseViewAccessEntriesArgs, opts ...InvokeOption) (*GetSecurityPolicyReportDatabaseViewAccessEntriesResult, error)
func GetSecurityPolicyReportDatabaseViewAccessEntriesOutput(ctx *Context, args *GetSecurityPolicyReportDatabaseViewAccessEntriesOutputArgs, opts ...InvokeOption) GetSecurityPolicyReportDatabaseViewAccessEntriesResultOutput
> Note: This function is named GetSecurityPolicyReportDatabaseViewAccessEntries
in the Go SDK.
public static class GetSecurityPolicyReportDatabaseViewAccessEntries
{
public static Task<GetSecurityPolicyReportDatabaseViewAccessEntriesResult> InvokeAsync(GetSecurityPolicyReportDatabaseViewAccessEntriesArgs args, InvokeOptions? opts = null)
public static Output<GetSecurityPolicyReportDatabaseViewAccessEntriesResult> Invoke(GetSecurityPolicyReportDatabaseViewAccessEntriesInvokeArgs args, InvokeOptions? opts = null)
}
public static CompletableFuture<GetSecurityPolicyReportDatabaseViewAccessEntriesResult> getSecurityPolicyReportDatabaseViewAccessEntries(GetSecurityPolicyReportDatabaseViewAccessEntriesArgs args, InvokeOptions options)
// Output-based functions aren't available in Java yet
fn::invoke:
function: oci:DataSafe/getSecurityPolicyReportDatabaseViewAccessEntries:getSecurityPolicyReportDatabaseViewAccessEntries
arguments:
# arguments dictionary
The following arguments are supported:
- Security
Policy stringReport Id - The OCID of the security policy report resource.
- Filters
List<Get
Security Policy Report Database View Access Entries Filter> - Scim
Query string The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
Example: query=(accessType eq 'SELECT') and (grantee eq 'ADMIN')
- Target
Id string - A filter to return only items related to a specific target OCID.
- Security
Policy stringReport Id - The OCID of the security policy report resource.
- Filters
[]Get
Security Policy Report Database View Access Entries Filter - Scim
Query string The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
Example: query=(accessType eq 'SELECT') and (grantee eq 'ADMIN')
- Target
Id string - A filter to return only items related to a specific target OCID.
- security
Policy StringReport Id - The OCID of the security policy report resource.
- filters
List<Get
Security Policy Report Database View Access Entries Filter> - scim
Query String The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
Example: query=(accessType eq 'SELECT') and (grantee eq 'ADMIN')
- target
Id String - A filter to return only items related to a specific target OCID.
- security
Policy stringReport Id - The OCID of the security policy report resource.
- filters
Get
Security Policy Report Database View Access Entries Filter[] - scim
Query string The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
Example: query=(accessType eq 'SELECT') and (grantee eq 'ADMIN')
- target
Id string - A filter to return only items related to a specific target OCID.
- security_
policy_ strreport_ id - The OCID of the security policy report resource.
- filters
Sequence[datasafe.
Get Security Policy Report Database View Access Entries Filter] - scim_
query str The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
Example: query=(accessType eq 'SELECT') and (grantee eq 'ADMIN')
- target_
id str - A filter to return only items related to a specific target OCID.
- security
Policy StringReport Id - The OCID of the security policy report resource.
- filters List<Property Map>
- scim
Query String The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
Example: query=(accessType eq 'SELECT') and (grantee eq 'ADMIN')
- target
Id String - A filter to return only items related to a specific target OCID.
getSecurityPolicyReportDatabaseViewAccessEntries Result
The following output properties are available:
- Database
View List<GetAccess Entry Collections Security Policy Report Database View Access Entries Database View Access Entry Collection> - The list of database_view_access_entry_collection.
- Id string
- The provider-assigned unique ID for this managed resource.
- Security
Policy stringReport Id - Filters
List<Get
Security Policy Report Database View Access Entries Filter> - Scim
Query string - Target
Id string - The OCID of the of the target database.
- Database
View []GetAccess Entry Collections Security Policy Report Database View Access Entries Database View Access Entry Collection - The list of database_view_access_entry_collection.
- Id string
- The provider-assigned unique ID for this managed resource.
- Security
Policy stringReport Id - Filters
[]Get
Security Policy Report Database View Access Entries Filter - Scim
Query string - Target
Id string - The OCID of the of the target database.
- database
View List<GetAccess Entry Collections Security Policy Report Database View Access Entries Database View Access Entry Collection> - The list of database_view_access_entry_collection.
- id String
- The provider-assigned unique ID for this managed resource.
- security
Policy StringReport Id - filters
List<Get
Security Policy Report Database View Access Entries Filter> - scim
Query String - target
Id String - The OCID of the of the target database.
- database
View GetAccess Entry Collections Security Policy Report Database View Access Entries Database View Access Entry Collection[] - The list of database_view_access_entry_collection.
- id string
- The provider-assigned unique ID for this managed resource.
- security
Policy stringReport Id - filters
Get
Security Policy Report Database View Access Entries Filter[] - scim
Query string - target
Id string - The OCID of the of the target database.
- database_
view_ Sequence[datasafe.access_ entry_ collections Get Security Policy Report Database View Access Entries Database View Access Entry Collection] - The list of database_view_access_entry_collection.
- id str
- The provider-assigned unique ID for this managed resource.
- security_
policy_ strreport_ id - filters
Sequence[datasafe.
Get Security Policy Report Database View Access Entries Filter] - scim_
query str - target_
id str - The OCID of the of the target database.
- database
View List<Property Map>Access Entry Collections - The list of database_view_access_entry_collection.
- id String
- The provider-assigned unique ID for this managed resource.
- security
Policy StringReport Id - filters List<Property Map>
- scim
Query String - target
Id String - The OCID of the of the target database.
Supporting Types
GetSecurityPolicyReportDatabaseViewAccessEntriesDatabaseViewAccessEntryCollection
GetSecurityPolicyReportDatabaseViewAccessEntriesDatabaseViewAccessEntryCollectionItem
- Access
Type string - The type of the access the user has on the table, there can be one or more from SELECT, UPDATE, INSERT or DELETE.
- Column
Name string - If there are column level privileges on a table or view.
- Grant
From stringRole - This can be empty in case of direct grant, in case of indirect grant, this attribute displays the name of the role which is granted to the user though which the user has access to the table.
- Grantee string
- Grantee is the user who can access the table or view
- Grantor string
- The user who granted the privilege.
- Is
Access boolConstrained By Database Vault - Indicates whether the table access is constrained via Oracle Database Vault.
- Is
Access boolConstrained By Real Application Security - Indicates whether the view access is constrained via Real Application Security.
- Is
Access boolConstrained By Redaction - Indicates whether the view access is constrained via Oracle Data Redaction.
- Is
Access boolConstrained By Sql Firewall - Indicates whether the view access is constrained via Oracle Database SQL Firewall.
- Is
Access boolConstrained By Virtual Private Database - Indicates whether the view access is constrained via Virtual Private Database.
- Key string
- The unique key that identifies the table access report. It is numeric and unique within a security policy report.
- Privilege string
- The name of the privilege.
- Privilege
Grantable string - Indicates whether the grantee can grant this privilege to other users. Privileges can be granted to a user or role with GRANT_OPTION or ADMIN_OPTION
- Privilege
Type string - Type of the privilege user has, this includes System Privilege, Schema Privilege, Object Privilege, Column Privilege, Owner or Schema Privilege on a schema.
- Table
Name string - The name of the database table the user has access to.
- Table
Schema string - The name of the schema the table belongs to.
- Target
Id string - A filter to return only items related to a specific target OCID.
- View
Name string - The name of the view.
- View
Schema string - The name of the schema.
- View
Text string - Definition of the view.
- Access
Type string - The type of the access the user has on the table, there can be one or more from SELECT, UPDATE, INSERT or DELETE.
- Column
Name string - If there are column level privileges on a table or view.
- Grant
From stringRole - This can be empty in case of direct grant, in case of indirect grant, this attribute displays the name of the role which is granted to the user though which the user has access to the table.
- Grantee string
- Grantee is the user who can access the table or view
- Grantor string
- The user who granted the privilege.
- Is
Access boolConstrained By Database Vault - Indicates whether the table access is constrained via Oracle Database Vault.
- Is
Access boolConstrained By Real Application Security - Indicates whether the view access is constrained via Real Application Security.
- Is
Access boolConstrained By Redaction - Indicates whether the view access is constrained via Oracle Data Redaction.
- Is
Access boolConstrained By Sql Firewall - Indicates whether the view access is constrained via Oracle Database SQL Firewall.
- Is
Access boolConstrained By Virtual Private Database - Indicates whether the view access is constrained via Virtual Private Database.
- Key string
- The unique key that identifies the table access report. It is numeric and unique within a security policy report.
- Privilege string
- The name of the privilege.
- Privilege
Grantable string - Indicates whether the grantee can grant this privilege to other users. Privileges can be granted to a user or role with GRANT_OPTION or ADMIN_OPTION
- Privilege
Type string - Type of the privilege user has, this includes System Privilege, Schema Privilege, Object Privilege, Column Privilege, Owner or Schema Privilege on a schema.
- Table
Name string - The name of the database table the user has access to.
- Table
Schema string - The name of the schema the table belongs to.
- Target
Id string - A filter to return only items related to a specific target OCID.
- View
Name string - The name of the view.
- View
Schema string - The name of the schema.
- View
Text string - Definition of the view.
- access
Type String - The type of the access the user has on the table, there can be one or more from SELECT, UPDATE, INSERT or DELETE.
- column
Name String - If there are column level privileges on a table or view.
- grant
From StringRole - This can be empty in case of direct grant, in case of indirect grant, this attribute displays the name of the role which is granted to the user though which the user has access to the table.
- grantee String
- Grantee is the user who can access the table or view
- grantor String
- The user who granted the privilege.
- is
Access BooleanConstrained By Database Vault - Indicates whether the table access is constrained via Oracle Database Vault.
- is
Access BooleanConstrained By Real Application Security - Indicates whether the view access is constrained via Real Application Security.
- is
Access BooleanConstrained By Redaction - Indicates whether the view access is constrained via Oracle Data Redaction.
- is
Access BooleanConstrained By Sql Firewall - Indicates whether the view access is constrained via Oracle Database SQL Firewall.
- is
Access BooleanConstrained By Virtual Private Database - Indicates whether the view access is constrained via Virtual Private Database.
- key String
- The unique key that identifies the table access report. It is numeric and unique within a security policy report.
- privilege String
- The name of the privilege.
- privilege
Grantable String - Indicates whether the grantee can grant this privilege to other users. Privileges can be granted to a user or role with GRANT_OPTION or ADMIN_OPTION
- privilege
Type String - Type of the privilege user has, this includes System Privilege, Schema Privilege, Object Privilege, Column Privilege, Owner or Schema Privilege on a schema.
- table
Name String - The name of the database table the user has access to.
- table
Schema String - The name of the schema the table belongs to.
- target
Id String - A filter to return only items related to a specific target OCID.
- view
Name String - The name of the view.
- view
Schema String - The name of the schema.
- view
Text String - Definition of the view.
- access
Type string - The type of the access the user has on the table, there can be one or more from SELECT, UPDATE, INSERT or DELETE.
- column
Name string - If there are column level privileges on a table or view.
- grant
From stringRole - This can be empty in case of direct grant, in case of indirect grant, this attribute displays the name of the role which is granted to the user though which the user has access to the table.
- grantee string
- Grantee is the user who can access the table or view
- grantor string
- The user who granted the privilege.
- is
Access booleanConstrained By Database Vault - Indicates whether the table access is constrained via Oracle Database Vault.
- is
Access booleanConstrained By Real Application Security - Indicates whether the view access is constrained via Real Application Security.
- is
Access booleanConstrained By Redaction - Indicates whether the view access is constrained via Oracle Data Redaction.
- is
Access booleanConstrained By Sql Firewall - Indicates whether the view access is constrained via Oracle Database SQL Firewall.
- is
Access booleanConstrained By Virtual Private Database - Indicates whether the view access is constrained via Virtual Private Database.
- key string
- The unique key that identifies the table access report. It is numeric and unique within a security policy report.
- privilege string
- The name of the privilege.
- privilege
Grantable string - Indicates whether the grantee can grant this privilege to other users. Privileges can be granted to a user or role with GRANT_OPTION or ADMIN_OPTION
- privilege
Type string - Type of the privilege user has, this includes System Privilege, Schema Privilege, Object Privilege, Column Privilege, Owner or Schema Privilege on a schema.
- table
Name string - The name of the database table the user has access to.
- table
Schema string - The name of the schema the table belongs to.
- target
Id string - A filter to return only items related to a specific target OCID.
- view
Name string - The name of the view.
- view
Schema string - The name of the schema.
- view
Text string - Definition of the view.
- access_
type str - The type of the access the user has on the table, there can be one or more from SELECT, UPDATE, INSERT or DELETE.
- column_
name str - If there are column level privileges on a table or view.
- grant_
from_ strrole - This can be empty in case of direct grant, in case of indirect grant, this attribute displays the name of the role which is granted to the user though which the user has access to the table.
- grantee str
- Grantee is the user who can access the table or view
- grantor str
- The user who granted the privilege.
- is_
access_ boolconstrained_ by_ database_ vault - Indicates whether the table access is constrained via Oracle Database Vault.
- is_
access_ boolconstrained_ by_ real_ application_ security - Indicates whether the view access is constrained via Real Application Security.
- is_
access_ boolconstrained_ by_ redaction - Indicates whether the view access is constrained via Oracle Data Redaction.
- is_
access_ boolconstrained_ by_ sql_ firewall - Indicates whether the view access is constrained via Oracle Database SQL Firewall.
- is_
access_ boolconstrained_ by_ virtual_ private_ database - Indicates whether the view access is constrained via Virtual Private Database.
- key str
- The unique key that identifies the table access report. It is numeric and unique within a security policy report.
- privilege str
- The name of the privilege.
- privilege_
grantable str - Indicates whether the grantee can grant this privilege to other users. Privileges can be granted to a user or role with GRANT_OPTION or ADMIN_OPTION
- privilege_
type str - Type of the privilege user has, this includes System Privilege, Schema Privilege, Object Privilege, Column Privilege, Owner or Schema Privilege on a schema.
- table_
name str - The name of the database table the user has access to.
- table_
schema str - The name of the schema the table belongs to.
- target_
id str - A filter to return only items related to a specific target OCID.
- view_
name str - The name of the view.
- view_
schema str - The name of the schema.
- view_
text str - Definition of the view.
- access
Type String - The type of the access the user has on the table, there can be one or more from SELECT, UPDATE, INSERT or DELETE.
- column
Name String - If there are column level privileges on a table or view.
- grant
From StringRole - This can be empty in case of direct grant, in case of indirect grant, this attribute displays the name of the role which is granted to the user though which the user has access to the table.
- grantee String
- Grantee is the user who can access the table or view
- grantor String
- The user who granted the privilege.
- is
Access BooleanConstrained By Database Vault - Indicates whether the table access is constrained via Oracle Database Vault.
- is
Access BooleanConstrained By Real Application Security - Indicates whether the view access is constrained via Real Application Security.
- is
Access BooleanConstrained By Redaction - Indicates whether the view access is constrained via Oracle Data Redaction.
- is
Access BooleanConstrained By Sql Firewall - Indicates whether the view access is constrained via Oracle Database SQL Firewall.
- is
Access BooleanConstrained By Virtual Private Database - Indicates whether the view access is constrained via Virtual Private Database.
- key String
- The unique key that identifies the table access report. It is numeric and unique within a security policy report.
- privilege String
- The name of the privilege.
- privilege
Grantable String - Indicates whether the grantee can grant this privilege to other users. Privileges can be granted to a user or role with GRANT_OPTION or ADMIN_OPTION
- privilege
Type String - Type of the privilege user has, this includes System Privilege, Schema Privilege, Object Privilege, Column Privilege, Owner or Schema Privilege on a schema.
- table
Name String - The name of the database table the user has access to.
- table
Schema String - The name of the schema the table belongs to.
- target
Id String - A filter to return only items related to a specific target OCID.
- view
Name String - The name of the view.
- view
Schema String - The name of the schema.
- view
Text String - Definition of the view.
GetSecurityPolicyReportDatabaseViewAccessEntriesFilter
Package Details
- Repository
- oci pulumi/pulumi-oci
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
oci
Terraform Provider.