AQ_ADMINISTRATOR_ROLE |    Provides   privileges to administer Advanced Queuing. Includes ENQUEUE ANY QUEUE, DEQUEUE ANY QUEUE, and MANAGE ANY QUEUE, SELECT privileges on   Advanced Queuing tables and EXECUTE privileges on Advanced Queuing packages. |   
   AQ_USER_ROLE |    Obsolete,   but kept mainly for release 8.0 compatibility. Provides EXECUTE privileges on the DBMS_AQ and DBMS_AQIN packages. |   
   AUTHENTICATEDUSER |    Used by the   XDB protocols to define any user who has logged in to the system. |   
   CONNECT  |    Provides the   CREATE SESSION system privilege. 
This role is   provided for compatibility with previous releases of Oracle Database. You can   determine the privileges encompassed by this role by querying the DBA_SYS_PRIVS data dictionary   view. 
Note: Oracle recommends that you design your own roles for   database security rather than relying on this role. This role may not be   created automatically by future releases of Oracle Database. |   
   CSW_USR_ROLE |    Provides   user privileges to manage the Catalog Services for the Web (CSW) component of   Oracle Spatial. |   
   CTXAPP |    Provides   privileges to create Oracle Text indexes and index preferences, and to use   PL/SQL packages. This role should be granted to Oracle Text users. |   
   CWM_USER |    Provides   privileges to manage Common Warehouse Metadata (CWM), which is a repository   standard used by Oracle data warehousing and decision support. |   
   DATAPUMP_EXP_FULL_DATABASE |    Provides   privileges to export data from an Oracle database using Oracle Data Pump. |   
   DATAPUMP_IMP_FULL_DATABASE |    Provides   privileges to import data into an Oracle database using Oracle Data Pump. |   
   DBA |    Provides all   system privileges WITH   ADMIN OPTION. 
This role is   provided for compatibility with previous releases of Oracle Database. You can   determine the privileges encompassed by this role by querying the DBA_SYS_PRIVS data dictionary   view. 
Note: Oracle recommends that you design your own roles for   database security rather than relying on this role. This role may not be   created automatically by future releases of Oracle Database. |   
   DELETE_CATALOG_ROLE |    Provides the   DELETE privilege on the   system audit table (AUD$). |   
   EJBCLIENT |    Provides   privileges to connect to EJBs from a Java stored procedure. |   
   EXECUTE_CATALOG_ROLE |    Provides EXECUTE privileges on   objects in the data dictionary. Also provides the HS_ADMIN_ROLE privilege. |   
   EXP_FULL_DATABASE |    Provides the   privileges required to perform full and incremental database exports, and   includes: SELECT ANY   TABLE, BACKUP   ANY TABLE, EXECUTE   ANY PROCEDURE, EXECUTE   ANY TYPE, ADMINISTER   RESOURCE MANAGER, and INSERT, DELETE, and UPDATE on the tables SYS.INCVID, SYS.INCFIL, and SYS.INCEXP. Also the following   roles: EXECUTE_CATALOG_ROLE and SELECT_CATALOG_ROLE. 
This role is   provided for convenience in using the export and import utilities. |   
   GATHER_SYSTEM_STATISTICS |    Provides   privileges to update system statistics, which are collected using the DBMS_STATS.GATHER_SYSTEM_STATISTICS procedure |   
   GLOBAL_AQ_USER_ROLE |    Provides   privileges to establish a connection to an LDAP server, for use with Oracle   Streams AQ. |   
   HS_ADMIN_ROLE |    Provides   privileges for DBAs who need to use the DBA role using Oracle Database Heterogeneous   Services to access appropriate tables in the data dictionary. 
Used to   protect access to the Heterogeneous Services (HS) data dictionary tables   (grants SELECT) and packages   (grants EXECUTE). It is granted to SELECT_CATALOG_ROLE and EXECUTE_CATALOG_ROLE such that users with   generic data dictionary access also can access the HS data dictionary. |   
   IMP_FULL_DATABASE  |    Provides the   privileges required to perform full database imports. Includes an extensive   list of system privileges (use view DBA_SYS_PRIVS to view privileges) and the following roles:   EXECUTE_CATALOG_ROLE and SELECT_CATALOG_ROLE. 
This role is   provided for convenience in using the export and import utilities. |   
   JAVADEBUGPRIV |    Provides   privileges to run the Oracle Database Java applications debugger. |   
   JAVAIDPRIV |    Deprecated   for this release. |   
   JAVASYSPRIV |    Provides   major permissions to use Java2, including updating Oracle JVM-protected   packages. |   
   JAVAUSERPRIV |    Provides   limited permissions to use Java2. |   
   JAVA_ADMIN |    Provides   administrative permissions to update policy tables for Oracle Database Java   applications. |   
   JAVA_DEPLOY |    Provides   privileges to deploy ncomp DLLs into the javavm/admin directory using the ncomp and deployns utilities. Without   this role, the javavm/deploy and javavm/admin directories cannbe   be accessible. |   
   JMXSERVER |    Provides   privileges to start and maintain a JMX agent in a database session. |   
   LBAC_DBA |    Provides   permissions to use the SA_SYSDBA PL/SQL package. |   
   LOGSTDBY_ADMINISTRATOR |    Provides   administrative privileges to manage the SQL Apply (logical standby database)   environment. |   
   MGMT_USER |    Provides   adminstrative privileges to perform various activities with Oracle Enterprise   Manager. |   
   OEM_ADVISOR |    Provides   privileges to create, drop, select (read), load (write), and delete a SQL   tuning set through the DBMS_SQLTUNE PL/SQL package, and   to access to the Advisor framework using the ADVISOR PL/SQL package. |   
   OEM_MONITOR |    Provides   privileges needed by the Management Agent component of Oracle Enterprise   Manager to monitor and manage the database. |   
   OLAPI_TRACE_USER |    Provides   privileges to perform OLAP API tracing. Contact Oracle Support for more   information. |   
   OLAP_DBA |    Provides   administrative privileges to create dimensional objects in different schemas   for Oracle OLAP. |   
   OLAP_USER |    Provides   application developers privileges to create dimensional objects in their own   schemas for Oracle OLAP. |   
   OLAP_XS_ADMIN |    Provides   privileges to administer security for Oracle OLAP. |   
   ORDADMIN |    Provides   privileges to administer Oracle Multimedia DICOM. |   
   OWB$CLIENT |    Provides   privileges to perform standard client-related tasks for Oracle Warehouse   Builder, such as creating projects, modules, tables, views, maps, and so on.   Warehouse Builder automatically grants this role to all workspace owners and   users. (That is, you do not need to explicitly grant it to anyone who needs   to use Warehouse Builder.) For security reasons, the OWB$CLIENT role is not a   default role for Warehouse Builder users: Oracle Warehouse Builder enables   this role only when it is needed. |   
   OWB_DESIGNCENTER_VIEW |    Provides   privileges from the database level for any registered Oracle Warehouse   Builder user to query the Warehouse Builder public views, such as ALL_IV_PROJECTS. A Warehouse Builder   administrator can use the ACCESS_PUBLICVIEW_BROWSER system privilege from the Warehouse   Builder security level to control an Warehouse Builder user's access to those   public views. |   
   OWB_USER |    Provides   privileges to create and own an Oracle Warehouse Builder workspace. When a   workspace owner registers other database users to this workspace, Oracle   Database grants this role to these users. Users with this role also have   access to Warehouse Builder Control   Center public views and other Control Center utilities. Oracle Warehouse   Builder grants this role to all Warehouse Builder users. |   
   RECOVERY_CATALOG_OWNER |    Provides   privileges for owner of the recovery catalog. Includes: CREATE SESSION, ALTER SESSION, CREATE SYNONYM, CREATE VIEW, CREATE DATABASE LINK, CREATE TABLE, CREATE CLUSTER, CREATE SEQUENCE, CREATE TRIGGER, and CREATE PROCEDURE |   
   RESOURCE |    Provides the   following system privileges: CREATE CLUSTER, CREATE INDEXTYPE, CREATE OPERATOR, CREATE PROCEDURE, CREATE SEQUENCE, CREATE TABLE, CREATE TRIGGER, CREATE TYPE. 
This role is   provided for compatibility with previous releases of Oracle Database. You can   determine the privileges encompassed by this role by querying the DBA_SYS_PRIVS data dictionary   view. 
Note: Oracle recommends that you design your own roles for   database security rather than relying on this role. This role may not be   created automatically by future releases of Oracle Database. |   
   SCHEDULER_ADMIN |    Allows the   grantee to execute the procedures of the DBMS_SCHEDULER package. It includes all of the job   scheduler system privileges and is included in the DBA role. |   
   SELECT_CATALOG_ROLE |    Provides SELECT privilege on objects   in the data dictionary. Also provides the HS_ADMIN_ROLE privilege. |   
   SPATIAL_CSW_ADMIN |    Provides   administrative privileges to manage the Catalog Services for the Web (CSW)   component of Oracle Spatial. |   
   SPATIAL_WFS_ADMIN |    Provides   administrative privileges to manage the Web Feature Service (WFS) component   of Oracle Spatial. |   
   WFS_USR_ROLE |    Provides   user privileges for the Web Feature Service (WFS) component of Oracle   Spatial. |   
   WKUSER |    Provides   privileges for users who need to host new Oracle Ultra Search instances. |   
   WM_ADMIN_ROLE |    Provides   administrative privileges for Oracle Workspace Manage. This enables users to   run any DBMS_WM procedures on all   version enabled tables, workspaces, and savepoints regardless of their owner.   It also enables the user to modify the system parameters specific to   Workspace Manager. |   
   XDBADMIN |    Allows the   grantee to register an XML schema globally, as opposed to registering it for   use or access only by its owner. It also lets the grantee bypass access   control list (ACL) checks when accessing Oracle XML DB Repository. |   
   XDB_SET_INVOKER |    Allows the   grantee to define invoker's rights handlers and to create or update the   resource configuration for XML repository triggers. By default, Oracle   Database grants this role to the DBA role but not to the XDBADMIN role. |   
   XDB_WEBSERVICES |    Allows the   grantee to access Oracle Database Web services over HTTPS. However, it does   not provide the user access to objects in the database that are public. To   allow public access, you need to grant the user the XDB_WEBSERVICES_WITH_PUBLIC role. For a user to   use these Web services, SYS must enable the Web service servlets. |   
   XDB_WEBSERVICES_OVER_HTTP |    Allows the   grantee to access Oracle Database Web services over HTTP. However, it does   not provide the user access to objects in the database that are public. To   allow public access, you need to grant the user the XDB_WEBSERVICES_WITH_PUBLIC role. |   
   XDB_WEBSERVICES_WITH_PUBLIC |    Allows the   grantee access to public objects through Oracle Database Web services. |