1 CHANGE_PROTECTION Changes protection for a single entry within the specified access control list. Example: RDO> CHANGE PROTECTION FOR DATABASE cont> [ADMIN,JONES] cont> ACCESS "WRITE+MODIFY+ERASE". 2 Format (B)0CHANGE PROTECTION FOR qqqqk x lqqqqqqqqqqqqqqqqqqqqj mqqqqwqqq> DATABASE qqqqqqqqqqq>qqqqqqqqqqqqqqqqqk tqqq> RELATION qq> relation-name qqqqqqqqqqqu tqqq> VIEW qqqqqq> view-name qqqqqqqqqqqqqqqu mqqq> FIELD q> field-name IN relation-name qu lqqqqqqqqqqqqqqqqqqqqqqqqqqwqk tqq> sequence-number qqqu x mwq> identifier qqqwqqqqj x mqqqqqqq + ACCESS qqwq> access-right qqwqqqqqqqqqq> . mqqqqq + ACCESS "DEFINE+CHANGE+DELETE - cont> +CONTROL+OPERATOR+ADMINISTRATOR" Granting or revoking a privilege takes effect after the user detaches and attaches to the database again. You must execute the CHANGE PROTECTION statement in a read/write transaction. If there is no active transaction and you issue this statement, Oracle Rdb starts a read/write transaction implicitly. Other users are allowed to be attached to the database when you issue the CHANGE PROTECTION statement. 2 Examples Example 1 You can change the protection in an access control list entry by specifying an identifier: RDO> CHANGE PROTECTION FOR DATABASE cont> [GROUP1,SMITH] cont> ACCESS NOCONTROL+NOOPERATOR+NOADMINISTRATOR. This statement performs the following actions: o Identifies the user whose protection you want to change. Here, the user is identified by [GROUP1,SMITH]. o Changes the access rights to deny the user CONTROL, OPERATOR, and ADMINISTRATOR privileges. All other privileges remain as you defined them in the previous version of this ACL entry. Example 2 You can identify the ACL entry by a sequence number: RDO> CHANGE PROTECTION FOR DATABASE cont> 4 cont> ACCESS WRITE+MODIFY+ERASE. This statement performs the following actions: o Identifies the entry by specifying a sequence number 4. This means that this statement will change the fourth entry in the access control list for the database PERSONNEL. o Changes the access rights by granting WRITE, MODIFY, and ERASE access. All other rights remain as they were before.