oci.DataSafe.getSecurityPolicyReportDatabaseTableAccessEntries
Explore with Pulumi AI
This data source provides the list of Security Policy Report Database Table Access Entries in Oracle Cloud Infrastructure Data Safe service.
Retrieves a list of all database table access entries in Data Safe.
The ListDatabaseTableAccessEntries operation returns only the database table access reports for the specified security policy report.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as oci from "@pulumi/oci";
const testSecurityPolicyReportDatabaseTableAccessEntries = oci.DataSafe.getSecurityPolicyReportDatabaseTableAccessEntries({
    securityPolicyReportId: testSecurityPolicyReport.id,
    scimQuery: securityPolicyReportDatabaseTableAccessEntryScimQuery,
});
import pulumi
import pulumi_oci as oci
test_security_policy_report_database_table_access_entries = oci.DataSafe.get_security_policy_report_database_table_access_entries(security_policy_report_id=test_security_policy_report["id"],
    scim_query=security_policy_report_database_table_access_entry_scim_query)
package main
import (
	"github.com/pulumi/pulumi-oci/sdk/v2/go/oci/datasafe"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		_, err := datasafe.GetSecurityPolicyReportDatabaseTableAccessEntries(ctx, &datasafe.GetSecurityPolicyReportDatabaseTableAccessEntriesArgs{
			SecurityPolicyReportId: testSecurityPolicyReport.Id,
			ScimQuery:              pulumi.StringRef(securityPolicyReportDatabaseTableAccessEntryScimQuery),
		}, nil)
		if err != nil {
			return err
		}
		return nil
	})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Oci = Pulumi.Oci;
return await Deployment.RunAsync(() => 
{
    var testSecurityPolicyReportDatabaseTableAccessEntries = Oci.DataSafe.GetSecurityPolicyReportDatabaseTableAccessEntries.Invoke(new()
    {
        SecurityPolicyReportId = testSecurityPolicyReport.Id,
        ScimQuery = securityPolicyReportDatabaseTableAccessEntryScimQuery,
    });
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.oci.DataSafe.DataSafeFunctions;
import com.pulumi.oci.DataSafe.inputs.GetSecurityPolicyReportDatabaseTableAccessEntriesArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        final var testSecurityPolicyReportDatabaseTableAccessEntries = DataSafeFunctions.getSecurityPolicyReportDatabaseTableAccessEntries(GetSecurityPolicyReportDatabaseTableAccessEntriesArgs.builder()
            .securityPolicyReportId(testSecurityPolicyReport.id())
            .scimQuery(securityPolicyReportDatabaseTableAccessEntryScimQuery)
            .build());
    }
}
variables:
  testSecurityPolicyReportDatabaseTableAccessEntries:
    fn::invoke:
      function: oci:DataSafe:getSecurityPolicyReportDatabaseTableAccessEntries
      arguments:
        securityPolicyReportId: ${testSecurityPolicyReport.id}
        scimQuery: ${securityPolicyReportDatabaseTableAccessEntryScimQuery}
Using getSecurityPolicyReportDatabaseTableAccessEntries
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getSecurityPolicyReportDatabaseTableAccessEntries(args: GetSecurityPolicyReportDatabaseTableAccessEntriesArgs, opts?: InvokeOptions): Promise<GetSecurityPolicyReportDatabaseTableAccessEntriesResult>
function getSecurityPolicyReportDatabaseTableAccessEntriesOutput(args: GetSecurityPolicyReportDatabaseTableAccessEntriesOutputArgs, opts?: InvokeOptions): Output<GetSecurityPolicyReportDatabaseTableAccessEntriesResult>def get_security_policy_report_database_table_access_entries(filters: Optional[Sequence[GetSecurityPolicyReportDatabaseTableAccessEntriesFilter]] = None,
                                                             scim_query: Optional[str] = None,
                                                             security_policy_report_id: Optional[str] = None,
                                                             opts: Optional[InvokeOptions] = None) -> GetSecurityPolicyReportDatabaseTableAccessEntriesResult
def get_security_policy_report_database_table_access_entries_output(filters: Optional[pulumi.Input[Sequence[pulumi.Input[GetSecurityPolicyReportDatabaseTableAccessEntriesFilterArgs]]]] = None,
                                                             scim_query: Optional[pulumi.Input[str]] = None,
                                                             security_policy_report_id: Optional[pulumi.Input[str]] = None,
                                                             opts: Optional[InvokeOptions] = None) -> Output[GetSecurityPolicyReportDatabaseTableAccessEntriesResult]func GetSecurityPolicyReportDatabaseTableAccessEntries(ctx *Context, args *GetSecurityPolicyReportDatabaseTableAccessEntriesArgs, opts ...InvokeOption) (*GetSecurityPolicyReportDatabaseTableAccessEntriesResult, error)
func GetSecurityPolicyReportDatabaseTableAccessEntriesOutput(ctx *Context, args *GetSecurityPolicyReportDatabaseTableAccessEntriesOutputArgs, opts ...InvokeOption) GetSecurityPolicyReportDatabaseTableAccessEntriesResultOutput> Note: This function is named GetSecurityPolicyReportDatabaseTableAccessEntries in the Go SDK.
public static class GetSecurityPolicyReportDatabaseTableAccessEntries 
{
    public static Task<GetSecurityPolicyReportDatabaseTableAccessEntriesResult> InvokeAsync(GetSecurityPolicyReportDatabaseTableAccessEntriesArgs args, InvokeOptions? opts = null)
    public static Output<GetSecurityPolicyReportDatabaseTableAccessEntriesResult> Invoke(GetSecurityPolicyReportDatabaseTableAccessEntriesInvokeArgs args, InvokeOptions? opts = null)
}public static CompletableFuture<GetSecurityPolicyReportDatabaseTableAccessEntriesResult> getSecurityPolicyReportDatabaseTableAccessEntries(GetSecurityPolicyReportDatabaseTableAccessEntriesArgs args, InvokeOptions options)
public static Output<GetSecurityPolicyReportDatabaseTableAccessEntriesResult> getSecurityPolicyReportDatabaseTableAccessEntries(GetSecurityPolicyReportDatabaseTableAccessEntriesArgs args, InvokeOptions options)
fn::invoke:
  function: oci:DataSafe/getSecurityPolicyReportDatabaseTableAccessEntries:getSecurityPolicyReportDatabaseTableAccessEntries
  arguments:
    # arguments dictionaryThe following arguments are supported:
- SecurityPolicy stringReport Id 
- The OCID of the security policy report resource.
- Filters
List<GetSecurity Policy Report Database Table Access Entries Filter> 
- ScimQuery string
- The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.) - Example: query=(accessType eq 'SELECT') and (grantee eq 'ADMIN') 
- SecurityPolicy stringReport Id 
- The OCID of the security policy report resource.
- Filters
[]GetSecurity Policy Report Database Table Access Entries Filter 
- ScimQuery string
- The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.) - Example: query=(accessType eq 'SELECT') and (grantee eq 'ADMIN') 
- securityPolicy StringReport Id 
- The OCID of the security policy report resource.
- filters
List<GetSecurity Policy Report Database Table Access Entries Filter> 
- scimQuery String
- The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.) - Example: query=(accessType eq 'SELECT') and (grantee eq 'ADMIN') 
- securityPolicy stringReport Id 
- The OCID of the security policy report resource.
- filters
GetSecurity Policy Report Database Table Access Entries Filter[] 
- scimQuery string
- The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.) - Example: query=(accessType eq 'SELECT') and (grantee eq 'ADMIN') 
- security_policy_ strreport_ id 
- The OCID of the security policy report resource.
- filters
Sequence[GetSecurity Policy Report Database Table Access Entries Filter] 
- scim_query str
- The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.) - Example: query=(accessType eq 'SELECT') and (grantee eq 'ADMIN') 
- securityPolicy StringReport Id 
- The OCID of the security policy report resource.
- filters List<Property Map>
- scimQuery String
- The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.) - Example: query=(accessType eq 'SELECT') and (grantee eq 'ADMIN') 
getSecurityPolicyReportDatabaseTableAccessEntries Result
The following output properties are available:
- DatabaseTable List<GetAccess Entry Collections Security Policy Report Database Table Access Entries Database Table Access Entry Collection> 
- The list of database_table_access_entry_collection.
- Id string
- The provider-assigned unique ID for this managed resource.
- SecurityPolicy stringReport Id 
- Filters
List<GetSecurity Policy Report Database Table Access Entries Filter> 
- ScimQuery string
- DatabaseTable []GetAccess Entry Collections Security Policy Report Database Table Access Entries Database Table Access Entry Collection 
- The list of database_table_access_entry_collection.
- Id string
- The provider-assigned unique ID for this managed resource.
- SecurityPolicy stringReport Id 
- Filters
[]GetSecurity Policy Report Database Table Access Entries Filter 
- ScimQuery string
- databaseTable List<GetAccess Entry Collections Security Policy Report Database Table Access Entries Database Table Access Entry Collection> 
- The list of database_table_access_entry_collection.
- id String
- The provider-assigned unique ID for this managed resource.
- securityPolicy StringReport Id 
- filters
List<GetSecurity Policy Report Database Table Access Entries Filter> 
- scimQuery String
- databaseTable GetAccess Entry Collections Security Policy Report Database Table Access Entries Database Table Access Entry Collection[] 
- The list of database_table_access_entry_collection.
- id string
- The provider-assigned unique ID for this managed resource.
- securityPolicy stringReport Id 
- filters
GetSecurity Policy Report Database Table Access Entries Filter[] 
- scimQuery string
- database_table_ Sequence[Getaccess_ entry_ collections Security Policy Report Database Table Access Entries Database Table Access Entry Collection] 
- The list of database_table_access_entry_collection.
- id str
- The provider-assigned unique ID for this managed resource.
- security_policy_ strreport_ id 
- filters
Sequence[GetSecurity Policy Report Database Table Access Entries Filter] 
- scim_query str
- databaseTable List<Property Map>Access Entry Collections 
- The list of database_table_access_entry_collection.
- id String
- The provider-assigned unique ID for this managed resource.
- securityPolicy StringReport Id 
- filters List<Property Map>
- scimQuery String
Supporting Types
GetSecurityPolicyReportDatabaseTableAccessEntriesDatabaseTableAccessEntryCollection            
GetSecurityPolicyReportDatabaseTableAccessEntriesDatabaseTableAccessEntryCollectionItem             
- AccessThrough stringObject 
- A non-null value in this field indicates the object through which user has access to table, possible values could be table or view.
- AccessType string
- The type of the access the user has on the table, there can be one or more from SELECT, UPDATE, INSERT, OWNER or DELETE.
- AreAll boolTables Accessible 
- Indicates whether the user has access to all the tables in the schema.
- ColumnName string
- If there are column level privileges on a table or view.
- GrantFrom stringRole 
- This can be empty in case of direct grant, in case of indirect grant, this attribute displays the name of the role which is granted to the user though which the user has access to the table.
- Grantee string
- Grantee is the user who can access the table
- Grantor string
- The one who granted this privilege.
- IsAccess boolConstrained By Database Vault 
- Indicates whether the table access is constrained via Oracle Database Vault.
- IsAccess boolConstrained By Label Security 
- Indicates whether the table access is constrained via Oracle Label Security.
- IsAccess boolConstrained By Real Application Security 
- Indicates whether the table access is constrained via Real Application Security.
- IsAccess boolConstrained By Redaction 
- Indicates whether the table access is constrained via Oracle Data Redaction.
- IsAccess boolConstrained By Sql Firewall 
- Indicates whether the table access is constrained via Oracle Database SQL Firewall.
- IsAccess boolConstrained By View 
- Indicates whether the access is constrained on a table via a view.
- IsAccess boolConstrained By Virtual Private Database 
- Indicates whether the table access is constrained via Virtual Private Database.
- IsSensitive bool
- Indicates whether the table is marked as sensitive.
- Key string
- The unique key that identifies the table access report. It is numeric and unique within a security policy report.
- Privilege string
- Name of the privilege.
- PrivilegeGrantable string
- Indicates whether the grantee can grant this privilege to other users. Privileges can be granted to a user or role with GRANT_OPTION or ADMIN_OPTION
- PrivilegeType string
- Type of the privilege user has, this includes System Privilege, Schema Privilege, Object Privilege, Column Privilege, Owner or Schema Privilege on a schema.
- TableName string
- The name of the database table the user has access to.
- TableSchema string
- The name of the schema the table belongs to.
- TargetId string
- The OCID of the of the target database.
- AccessThrough stringObject 
- A non-null value in this field indicates the object through which user has access to table, possible values could be table or view.
- AccessType string
- The type of the access the user has on the table, there can be one or more from SELECT, UPDATE, INSERT, OWNER or DELETE.
- AreAll boolTables Accessible 
- Indicates whether the user has access to all the tables in the schema.
- ColumnName string
- If there are column level privileges on a table or view.
- GrantFrom stringRole 
- This can be empty in case of direct grant, in case of indirect grant, this attribute displays the name of the role which is granted to the user though which the user has access to the table.
- Grantee string
- Grantee is the user who can access the table
- Grantor string
- The one who granted this privilege.
- IsAccess boolConstrained By Database Vault 
- Indicates whether the table access is constrained via Oracle Database Vault.
- IsAccess boolConstrained By Label Security 
- Indicates whether the table access is constrained via Oracle Label Security.
- IsAccess boolConstrained By Real Application Security 
- Indicates whether the table access is constrained via Real Application Security.
- IsAccess boolConstrained By Redaction 
- Indicates whether the table access is constrained via Oracle Data Redaction.
- IsAccess boolConstrained By Sql Firewall 
- Indicates whether the table access is constrained via Oracle Database SQL Firewall.
- IsAccess boolConstrained By View 
- Indicates whether the access is constrained on a table via a view.
- IsAccess boolConstrained By Virtual Private Database 
- Indicates whether the table access is constrained via Virtual Private Database.
- IsSensitive bool
- Indicates whether the table is marked as sensitive.
- Key string
- The unique key that identifies the table access report. It is numeric and unique within a security policy report.
- Privilege string
- Name of the privilege.
- PrivilegeGrantable string
- Indicates whether the grantee can grant this privilege to other users. Privileges can be granted to a user or role with GRANT_OPTION or ADMIN_OPTION
- PrivilegeType string
- Type of the privilege user has, this includes System Privilege, Schema Privilege, Object Privilege, Column Privilege, Owner or Schema Privilege on a schema.
- TableName string
- The name of the database table the user has access to.
- TableSchema string
- The name of the schema the table belongs to.
- TargetId string
- The OCID of the of the target database.
- accessThrough StringObject 
- A non-null value in this field indicates the object through which user has access to table, possible values could be table or view.
- accessType String
- The type of the access the user has on the table, there can be one or more from SELECT, UPDATE, INSERT, OWNER or DELETE.
- areAll BooleanTables Accessible 
- Indicates whether the user has access to all the tables in the schema.
- columnName String
- If there are column level privileges on a table or view.
- grantFrom StringRole 
- This can be empty in case of direct grant, in case of indirect grant, this attribute displays the name of the role which is granted to the user though which the user has access to the table.
- grantee String
- Grantee is the user who can access the table
- grantor String
- The one who granted this privilege.
- isAccess BooleanConstrained By Database Vault 
- Indicates whether the table access is constrained via Oracle Database Vault.
- isAccess BooleanConstrained By Label Security 
- Indicates whether the table access is constrained via Oracle Label Security.
- isAccess BooleanConstrained By Real Application Security 
- Indicates whether the table access is constrained via Real Application Security.
- isAccess BooleanConstrained By Redaction 
- Indicates whether the table access is constrained via Oracle Data Redaction.
- isAccess BooleanConstrained By Sql Firewall 
- Indicates whether the table access is constrained via Oracle Database SQL Firewall.
- isAccess BooleanConstrained By View 
- Indicates whether the access is constrained on a table via a view.
- isAccess BooleanConstrained By Virtual Private Database 
- Indicates whether the table access is constrained via Virtual Private Database.
- isSensitive Boolean
- Indicates whether the table is marked as sensitive.
- key String
- The unique key that identifies the table access report. It is numeric and unique within a security policy report.
- privilege String
- Name of the privilege.
- privilegeGrantable String
- Indicates whether the grantee can grant this privilege to other users. Privileges can be granted to a user or role with GRANT_OPTION or ADMIN_OPTION
- privilegeType String
- Type of the privilege user has, this includes System Privilege, Schema Privilege, Object Privilege, Column Privilege, Owner or Schema Privilege on a schema.
- tableName String
- The name of the database table the user has access to.
- tableSchema String
- The name of the schema the table belongs to.
- targetId String
- The OCID of the of the target database.
- accessThrough stringObject 
- A non-null value in this field indicates the object through which user has access to table, possible values could be table or view.
- accessType string
- The type of the access the user has on the table, there can be one or more from SELECT, UPDATE, INSERT, OWNER or DELETE.
- areAll booleanTables Accessible 
- Indicates whether the user has access to all the tables in the schema.
- columnName string
- If there are column level privileges on a table or view.
- grantFrom stringRole 
- This can be empty in case of direct grant, in case of indirect grant, this attribute displays the name of the role which is granted to the user though which the user has access to the table.
- grantee string
- Grantee is the user who can access the table
- grantor string
- The one who granted this privilege.
- isAccess booleanConstrained By Database Vault 
- Indicates whether the table access is constrained via Oracle Database Vault.
- isAccess booleanConstrained By Label Security 
- Indicates whether the table access is constrained via Oracle Label Security.
- isAccess booleanConstrained By Real Application Security 
- Indicates whether the table access is constrained via Real Application Security.
- isAccess booleanConstrained By Redaction 
- Indicates whether the table access is constrained via Oracle Data Redaction.
- isAccess booleanConstrained By Sql Firewall 
- Indicates whether the table access is constrained via Oracle Database SQL Firewall.
- isAccess booleanConstrained By View 
- Indicates whether the access is constrained on a table via a view.
- isAccess booleanConstrained By Virtual Private Database 
- Indicates whether the table access is constrained via Virtual Private Database.
- isSensitive boolean
- Indicates whether the table is marked as sensitive.
- key string
- The unique key that identifies the table access report. It is numeric and unique within a security policy report.
- privilege string
- Name of the privilege.
- privilegeGrantable string
- Indicates whether the grantee can grant this privilege to other users. Privileges can be granted to a user or role with GRANT_OPTION or ADMIN_OPTION
- privilegeType string
- Type of the privilege user has, this includes System Privilege, Schema Privilege, Object Privilege, Column Privilege, Owner or Schema Privilege on a schema.
- tableName string
- The name of the database table the user has access to.
- tableSchema string
- The name of the schema the table belongs to.
- targetId string
- The OCID of the of the target database.
- access_through_ strobject 
- A non-null value in this field indicates the object through which user has access to table, possible values could be table or view.
- access_type str
- The type of the access the user has on the table, there can be one or more from SELECT, UPDATE, INSERT, OWNER or DELETE.
- are_all_ booltables_ accessible 
- Indicates whether the user has access to all the tables in the schema.
- column_name str
- If there are column level privileges on a table or view.
- grant_from_ strrole 
- This can be empty in case of direct grant, in case of indirect grant, this attribute displays the name of the role which is granted to the user though which the user has access to the table.
- grantee str
- Grantee is the user who can access the table
- grantor str
- The one who granted this privilege.
- is_access_ boolconstrained_ by_ database_ vault 
- Indicates whether the table access is constrained via Oracle Database Vault.
- is_access_ boolconstrained_ by_ label_ security 
- Indicates whether the table access is constrained via Oracle Label Security.
- is_access_ boolconstrained_ by_ real_ application_ security 
- Indicates whether the table access is constrained via Real Application Security.
- is_access_ boolconstrained_ by_ redaction 
- Indicates whether the table access is constrained via Oracle Data Redaction.
- is_access_ boolconstrained_ by_ sql_ firewall 
- Indicates whether the table access is constrained via Oracle Database SQL Firewall.
- is_access_ boolconstrained_ by_ view 
- Indicates whether the access is constrained on a table via a view.
- is_access_ boolconstrained_ by_ virtual_ private_ database 
- Indicates whether the table access is constrained via Virtual Private Database.
- is_sensitive bool
- Indicates whether the table is marked as sensitive.
- key str
- The unique key that identifies the table access report. It is numeric and unique within a security policy report.
- privilege str
- Name of the privilege.
- privilege_grantable str
- Indicates whether the grantee can grant this privilege to other users. Privileges can be granted to a user or role with GRANT_OPTION or ADMIN_OPTION
- privilege_type str
- Type of the privilege user has, this includes System Privilege, Schema Privilege, Object Privilege, Column Privilege, Owner or Schema Privilege on a schema.
- table_name str
- The name of the database table the user has access to.
- table_schema str
- The name of the schema the table belongs to.
- target_id str
- The OCID of the of the target database.
- accessThrough StringObject 
- A non-null value in this field indicates the object through which user has access to table, possible values could be table or view.
- accessType String
- The type of the access the user has on the table, there can be one or more from SELECT, UPDATE, INSERT, OWNER or DELETE.
- areAll BooleanTables Accessible 
- Indicates whether the user has access to all the tables in the schema.
- columnName String
- If there are column level privileges on a table or view.
- grantFrom StringRole 
- This can be empty in case of direct grant, in case of indirect grant, this attribute displays the name of the role which is granted to the user though which the user has access to the table.
- grantee String
- Grantee is the user who can access the table
- grantor String
- The one who granted this privilege.
- isAccess BooleanConstrained By Database Vault 
- Indicates whether the table access is constrained via Oracle Database Vault.
- isAccess BooleanConstrained By Label Security 
- Indicates whether the table access is constrained via Oracle Label Security.
- isAccess BooleanConstrained By Real Application Security 
- Indicates whether the table access is constrained via Real Application Security.
- isAccess BooleanConstrained By Redaction 
- Indicates whether the table access is constrained via Oracle Data Redaction.
- isAccess BooleanConstrained By Sql Firewall 
- Indicates whether the table access is constrained via Oracle Database SQL Firewall.
- isAccess BooleanConstrained By View 
- Indicates whether the access is constrained on a table via a view.
- isAccess BooleanConstrained By Virtual Private Database 
- Indicates whether the table access is constrained via Virtual Private Database.
- isSensitive Boolean
- Indicates whether the table is marked as sensitive.
- key String
- The unique key that identifies the table access report. It is numeric and unique within a security policy report.
- privilege String
- Name of the privilege.
- privilegeGrantable String
- Indicates whether the grantee can grant this privilege to other users. Privileges can be granted to a user or role with GRANT_OPTION or ADMIN_OPTION
- privilegeType String
- Type of the privilege user has, this includes System Privilege, Schema Privilege, Object Privilege, Column Privilege, Owner or Schema Privilege on a schema.
- tableName String
- The name of the database table the user has access to.
- tableSchema String
- The name of the schema the table belongs to.
- targetId String
- The OCID of the of the target database.
GetSecurityPolicyReportDatabaseTableAccessEntriesFilter        
Package Details
- Repository
- oci pulumi/pulumi-oci
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the ociTerraform Provider.