I *knew* there had to be a valid reason for me to use proxies. Guess I have something to play with now. Thanks, Rich > Instead of tampering with passwords and profiles it's safer to use proxy > authentication like: > > SQL> drop user u1 cascade; > User dropped. > SQL> drop user u2 cascade; > User dropped. > SQL> create user u1 identified by u1; > User created. > SQL> grant create session, create database link to u1; > Grant succeeded. > SQL> create user u2 identified by u2; > User created. > SQL> grant create session to u2; > Grant succeeded. > SQL> alter user u1 grant connect through u2; > User altered. > SQL> connect u2[u1]/u2 > Connected. > SQL> show user > USER is "U1" > SQL> create database link a connect to b identified by c using 'd'; > Database link created. > SQL> > > --romas -- //www.freelists.org/webpage/oracle-l