Hitachi

Hitachi Advanced Database Messages


KFAA30556-E

The operation cannot be executed because the authorization identifier "bb....bb" specified in aa....aa is cc....cc. (M+J+O)

The aa....aa operation could not be executed. <SQLSTATE: 42K06>

aa....aa: Operation whose execution was attempted
  • GRANT: Granting of a privilege by a GRANT statement

  • REVOKE: Revocation of a privilege by a REVOKE statement

  • REVOKE CONNECT: Revocation of a CONNECT privilege by a REVOKE statement

  • REVOKE SCHEMA: Revocation of a schema definition privilege by a REVOKE statement

bb....bb:

Authorization identifier specified in the SQL statement

cc....cc:

Cause of the error

S:

Ignores this SQL statement. Alternatively, the system invalidates this transaction.

Action:

The following explains how to handle this:

  • If the owner of the target schema object is displayed for cc....cc

    The authorization identifier whose privilege is to be granted or revoked is the authorization identifier of the schema object owner. Check if the specified authorization identifier and the specified schema object are correct.

  • If connected to the HADB server is displayed for cc....cc

    The CONNECT privileges cannot be revoked for an authorization identifier that is currently connected to the HADB server. Re-execute the REVOKE statement after the target authorization identifier has been disconnected from the HADB server.

    If you want to revoke the CONNECT privilege immediately, use the adbcancel command to forcibly disconnect the target authorization identifier from the HADB server.

  • If a special keyword that can be specified only by the owner of the target schema object is displayed for cc....cc

    To execute the GRANT statement with PUBLIC specified, use the authorization identifier of the owner of the target schema object for access privileges.

  • If a user with privileges on which the privileges you are trying to grant depend is displayed for cc....cc

    An attempt is made to grant access privileges to an HADB user who cannot be granted access privileges. You cannot grant access privileges to the following HADB users:

    • An HADB user who has granted himself or herself the target access privilege

    • An HADB user on the line of users who granted the target access privilege to the above HADB user

    • Yourself

  • If the auditor is displayed for cc....cc

    You cannot revoke the CONNECT privilege and schema definition privilege of an HADB user who has the audit privilege. Revoke the audit privilege, and then revoke the CONNECT privilege or schema definition privilege. An HADB user who has the audit admin privilege must revoke the audit privilege.