16.4    Summary

Using a user-specific trace to record authorization debug information is an excellent way to determine the permissions that a user is lacking when attempting to perform an action that isn’t authorized. In addition to security tracing, security administrators can also use several security-related views within the SYS schema to list the explicit and effective security for a given user, role, or grantee.