Oracle SA_USER_ADMIN_INT
Version 26ai

General Information
Library Note Morgan's Library Page Header
The best Oracle News for FY2026

Oracle Database 26ai will be available on generic Linux platforms in January and soon on AIX and Windows
Purpose Internal utilities supporting Label Security core functions
AUTHID CURRENT_USER
Dependencies
DUAL OLS$COMPARTMENTS OLS$USER
LBAC$SA_LABELS OLS$GROUPS OLS$USER_COMPARTMENTS
LBAC$USER_LIBT OLS$LAB OLS$USER_GROUPS
LBAC_CACHE OLS$LEVELS OS$USER_LEVELS
LBAC_LGSTNDBY_UTIL OLS$POL PLITBLM
LBAC_SERVICES OLS$PROFILE SA_USER_ADMIN
LBAC_STANDARD OLS$PROG SA_UTL
OBJ$ OLS$SESSION_LIBT _BASE_USER
Documented No
First Available 20c
Security Model Owned by LBACSYS with no privileges granted

Direct access to this package is prevented by an Accessible By clause.
Source {ORACLE_HOME}/rdbms/admin/prvtolsdd.plb
Subprograms
 
ADD_COMPARTMENTS
Undocumented sa_user_admin_int.add_compartments(
policy_name IN VARCHAR2,
user_name   IN VARCHAR2,
comps       IN VARCHAR2,
access_mode IN VARCHAR2,
in_def      IN VARCHAR2,
in_row      IN VARCHAR2,
invoker_usr IN VARCHAR2);
All objects are protected by an ACCESSIBLE BY clause
 
ADD_GROUPS
Undocumented sa_user_admin_int.add_groups(
policy_name IN VARCHAR2,
user_name   IN VARCHAR2,
groups      IN VARCHAR2,
access_mode IN VARCHAR2,
in_def      IN VARCHAR2,
in_row      IN VARCHAR2,
invoker_usr IN VARCHAR2);
All objects are protected by an ACCESSIBLE BY clause
 
ALTER_COMPARTMENTS
Undocumented sa_user_admin_int.alter_compartments(
policy_name IN VARCHAR2,
user_name   IN VARCHAR2,
comps       IN VARCHAR2,
access_mode IN VARCHAR2,
in_def      IN VARCHAR2,
in_row      IN VARCHAR2,
invoker_usr IN VARCHAR2);
All objects are protected by an ACCESSIBLE BY clause
 
ALTER_GROUPS (new 20c)
Undocumented sa_user_admin_int.alter_groups(
policy_name IN VARCHAR2,
user_name   IN VARCHAR2,
groups      IN VARCHAR2,
access_mode IN VARCHAR2,
in_def      IN VARCHAR2,
in_row      IN VARCHAR2,
invoker_usr IN VARCHAR2);
All objects are protected by an ACCESSIBLE BY clause
 
DROP_ALL_COMPARTMENTS
Undocumented sa_user_admin_int.drop_all_compartments(
policy_name IN VARCHAR2,
user_name   IN VARCHAR2,
invoker_usr IN VARCHAR2);
All objects are protected by an ACCESSIBLE BY clause
 
DROP_ALL_GROUPS
Undocumented sa_user_admin_int.drop_all_groups(
policy_name IN VARCHAR2,
user_name   IN VARCHAR2,
invoker_usr IN VARCHAR2);
exec lbacsys.sa_user_admin_int.drop_all_groups('X', 'Y', USER);
     *
PLS-00904: insufficient privilege to access object SA_USER_ADMIN_INT
 
DROP_COMPARTMENTS
Undocumented sa_user_admin_int.drop_compartments(
policy_name IN VARCHAR2,
user_name   IN VARCHAR2,
comps       IN VARCHAR2,
invoker_usr IN VARCHAR2);
All objects are protected by an ACCESSIBLE BY clause
 
DROP_GROUPS
Undocumented sa_user_admin_int.drop_groups(
policy_name IN VARCHAR2,
user_name   IN VARCHAR2,
groups      IN VARCHAR2,
invoker_usr IN VARCHAR2);
All objects are protected by an ACCESSIBLE BY clause
 
DROP_USER_ACCESS
Undocumented sa_user_admin_int.drop_user_access(
policy_name IN VARCHAR2,
user_name   IN VARCHAR2,
invoker_usr IN VARCHAR2);
All objects are protected by an ACCESSIBLE BY clause
 
SET_COMPARTMENTS
Undocumented sa_user_admin_int.set_compartments(
policy_name IN VARCHAR2,
user_name   IN VARCHAR2,
read_comps  IN VARCHAR2,
write_comps IN VARCHAR2,
def_comps   IN VARCHAR2,
row_comps   IN VARCHAR2,
invoker_usr IN VARCHAR2);
All objects are protected by an ACCESSIBLE BY clause
 
SET_DEFAULT_LABEL
Undocumented sa_user_admin_int.set_default_label(
policy_name IN VARCHAR2,
user_name   IN VARCHAR2,
def_label   IN VARCHAR2,
invoker_usr IN VARCHAR2);
All objects are protected by an ACCESSIBLE BY clause
 
SET_GROUPS
Undocumented sa_user_admin_int.set_groups(
policy_name  IN VARCHAR2,
user_name    IN VARCHAR2,
read_groups  IN VARCHAR2,
write_groups IN VARCHAR2,
def_groups   IN VARCHAR2,
row_groups   IN VARCHAR2,
invoker_usr  IN VARCHAR2);
All objects are protected by an ACCESSIBLE BY clause
 
SET_LEVELS
Undocumented sa_user_admin_int.set_levels(
policy_name IN VARCHAR2,
user_name   IN VARCHAR2,
max_level   IN VARCHAR2,
min_level   IN VARCHAR2,
def_level   IN VARCHAR2,
row_level   IN VARCHAR2,
invoker_usr IN VARCHAR2);
All objects are protected by an ACCESSIBLE BY clause
 
SET_PROG_PRIVS
Undocumented sa_user_admin_int.set_prog_privs(
policy_name       IN VARCHAR2,
schema_name       IN VARCHAR2,
program_unit_name IN VARCHAR2,
privileges        IN VARCHAR2,
invoker_usr       IN VARCHAR2);
All objects are protected by an ACCESSIBLE BY clause
 
SET_ROW_LABEL
Undocumented sa_user_admin_int.set_row_label(
policy_name IN VARCHAR2,
user_name   IN VARCHAR2,
row_label   IN VARCHAR2,
invoker_usr IN VARCHAR2);
All objects are protected by an ACCESSIBLE BY clause
 
SET_USER_LABELS
Undocumented sa_user_admin_int.set_user_labels(
policy_name     IN VARCHAR2,
user_name       IN VARCHAR2,
max_read_label  IN VARCHAR2,
max_write_label IN VARCHAR2,
min_write_label IN VARCHAR2,
def_label       IN VARCHAR2,
row_label       IN VARCHAR2,
invoker_usr     IN VARCHAR2);
All objects are protected by an ACCESSIBLE BY clause
 
SET_USER_PRIVS
Undocumented sa_user_admin_int.set_user_privs(
policy_name IN VARCHAR2,
user_name   IN VARCHAR2,
privileges  IN VARCHAR2,
invoker_usr IN VARCHAR2);
All objects are protected by an ACCESSIBLE BY clause

Related Topics
Built-in Functions
Built-in Packages
Database Security
LBAC$SA_LABELS
LBAC_EVENTS
LBAC_EXP
LBAC_POLICY_ADMIN
LBAC_POLICY_ADMIN_INT
LBAC_SESSION
LBAC_STANDARD
LBAC_SYSDBA
OLS$DATAPUMP
OLS_ENFORCEMENT
OLS_UTIL_WRAPPER
Oracle Label Security (OLS)
SA_COMPONENTS
SA_LABEL_ADMIN
SA_SYSDA
TO_LABEL_LIST
What's New In 21c
What's New In 26ai

Morgan's Library Page Footer
This site is maintained by Daniel Morgan. Last Updated: This site is protected by copyright and trademark laws under U.S. and International law. © 1998-2026 Daniel A. Morgan All Rights Reserved