Skip Headers
Oracle® Database 2 Day + Security Guide
12c Release 1 (12.1)

E17609-17
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Master Index
Master Index
Go to Feedback page
Contact Us

Go to previous page
Previous
PDF · Mobi · ePub

Index

A  C  D  E  F  G  H  I  K  L  M  N  O  P  R  S  T  U  V  W  X 

A

access control
data encryption, 4.2
Oracle Label Security, 8.1
administrative accounts
about, 2.4.2.1
predefined, listed, 2.4.2.1
administrators
restricting access of, 5
separation of duty, 5.1
ANONYMOUS user account, 2.4.2.1
ANY system privilege, protecting data dictionary, 2.2.2.2
application contexts
Oracle Virtual Private Database, used with, 6.1
ASMSNMP user account, 2.4.2.1
auditing
about, 9.1
fine-grained auditing, 9.1
monitoring user actions, 9.1
reasons to audit, 9.2
AUDSYS user account, 2.4.2.1
AUTHID CURRENT USER invoker’s rights clause, 3.5.2.4

C

CONNECT role, privilege available to, 3.3
connections
SYS user, 3.2
CREATE ANY TABLE statement, 3.2
CREATE DATABASE LINK statement, 3.3
CREATE EXTERNAL JOB privilege
default security setting, modified by, 2.2.1
CREATE SESSION statement, 3.3
CTXSYS user account, 2.4.2.1

D

data dictionary
about, 2.2.2.1
securing, 2.2.2.2
data dictionary views
DBA_USERS_WITH_DEFPWD, 2.4.5.2
database
checking compatibility, 4.4.2
database accounts
See user accounts
DBA_USERS_WITH_DEFPWD data dictionary view, 2.4.5.2
DBSNMP user account
about, 2.4.2.1
default passwords
importance of changing, 2.4.5.1
default security settings
about, 2.2.1
DIP user account, 2.4.2.2

E

encryption
about, 4.1
algorithms, described, 2.3.2.2
components, 4.1
network, 2.3.2
reasons not to encrypt, 4.2
reasons to encrypt, 4.2
errors
checking trace files, 3.5.2.4
WHEN NO_DATA_FOUND exception example, 3.5.2.4
examples
user session information, retrieving with SYS_CONTEXT, 6.2.4
See also tutorials
exceptions
WHEN NO_DATA_FOUND example, 3.5.2.4

F

fine-grained auditing, 9.1

G

GRANT ALL PRIVILEGES privilege, 2.2.2.2
guidelines for security
auditing
predefined unified audit policies, 9.1
Oracle Label Security policies, planning, 8.3
passwords
creating, 2.4.4
privileges, granting, 3.2
PUBLIC role, privileges, 3.4
roles, granting to users, 3.3

H

HR user account, 2.4.2.3

I

initialization parameters
configuration related, 2.2.3
default security, modified by, 2.2.1
FAILED_LOGIN_ATTEMPTS, 2.4.6
installation related, 2.2.3
MAX_ENABLED_ROLES, 3.6
modifying, 2.2.3.1
O7_DICTIONARY_ACCESSIBILITY
about, 2.2.3
data dictionary, protecting, 2.2.2.2
default setting, 2.2.2.2
setting in Enterprise Manager, 2.2.2.2
OS_AUTHENT_PREFIX, 2.3.3
OS_ROLES, 3.6
PASSWORD_GRACE_TIME, 2.4.6
PASSWORD_LIFE_TIME, 2.4.6
PASSWORD_LOCK_TIME, 2.4.6
PASSWORD_REUSE_MAX, 2.4.6
PASSWORD_REUSE_TIME, 2.4.6
REMOTE_LISTENER, 2.3.3
REMOTE_OS_AUTHENT, 2.3.3
REMOTE_OS_ROLES, 2.3.3, 3.6
SEC_CASE_SENSITIVE_LOGIN, 2.4.6
SEC_MAX_FAILED_LOGIN_ATTEMPTS, 2.4.6
SEC_RETURN_SERVER_RELEASE_BANNER, 2.2.3
SQL92_SECURITY, 3.6
invoker’s rights, 3.5.2.4
IX user account, 2.4.2.3

K

keystores
closing, 4.4.4
creating, 4.4.1
creating master encryption key, 4.4.5
creating software password keystore, 4.4.3
opening, 4.4.4

L

LBACSYS user account, 2.4.2.1
least privilege principle, 3.2, 3.2

M

master encryption key
creating, 4.4.5
MDDATA user account, 2.4.2.2
MDSYS user account, 2.4.2.1
monitoring
See auditing
multitenant container databases. See CDBs
My Oracle Support
about, Preface
user account for logging service requests, 2.4.2.2

N

network encryption
about, 2.3.2.1
components, 2.3.2.1
configuring, 2.3.2.2
nondatabase users, 6.1

O

object privileges, 3.2
OE user account, 2.4.2.3
OLAPSYS user account, 2.4.2.1
Oracle Data Redaction
about, 7.1
compared with VPD and OLS, 8.2
industry compliance, 7.1
redaction performed in real time, 7.1
tutorial, 7.2
types of redaction, 7.1
Oracle Database Vault
about, 5.1
components, 5.1
registering with database, 5.2.1
regulatory compliances, how meets, 5.1
tutorial, 5.2
Oracle Enterprise Manage
about, 1.3
Oracle Label Security (OLS)
about, 8.1
compared with VPD and Data Redaction, 8.2
components, 8.1
guidelines in planning, 8.3
how it works, 8.1
tutorial, 8.4
used with Oracle Virtual Private Database, 8.2
Oracle MetaLink
See My Oracle Support
Oracle Net
encrypting network traffic, 2.3.2.2
Oracle Virtual Private Database (VPD)
about, 6.1
advantages, 6.1
application contexts, 6.1
compared with OLS and Data Redaction, 8.2
components, 6.1
tutorial, 6.2
used with Oracle Label Security, 8.2
ORACLE_OCM user account, 2.4.2.2
ORDDATA user account, 2.4.2.1
ORDPLUGINS user account, 2.4.2.1
ORDSYS user account, 2.4.2.1

P

passwords
changing, 2.4.5.3
default security setting, modified by, 2.2.1
default user account, 2.4.5.1
passwords for security
requirements, 2.4.4
pluggable databases. See PDBs
PM user account, 2.4.2.3
principle of least privilege, 3.2, 3.2
privileges
about, 3.1
CREATE DATABASE LINK statement, 3.3
system
ANY, 2.2.2.2
SYSTEM and OBJECT, 3.2
PUBLIC role, revoking unnecessary privileges and roles, 3.4

R

roles
CONNECT, 3.3
create your own, 3.3
job responsibility privileges only, 3.3

S

SCOTT user
about, 2.4.2.3
restricting privileges of, 3.3
sec_admin example security administrator
creating, 3.5.2.2
removing, 9.3.6
secure application roles
about, 3.5.1
advantages, 3.5.1
components, 3.5.1
invoker’s rights, 3.5.2.4
tutorial, 3.5.2
user environment information from SYS_CONTEXT SQL function, 3.5.2.4
security administrator
example of creating, 3.5.2.2
removing sec_admin, 9.3.6
security tasks, common, 1.2
SELECT ANY DICTIONARY privilege
GRANT ALL PRIVILEGES privilege, not included in, 2.2.2.2
sensitive data
Oracle Label Security, 8.1
Oracle Virtual Private Database, 6.1
secure application roles, 3.5.1
separation of duty concepts, 3.5.2.2
separation-of-duty principles
about, 5.1
Oracle Database Vault, 5.2.2
session information, retrieving, 6.1
SH user account, 2.4.2.3
SI_INFORMTN_SCHEMA user account, 2.4.2.1
SPATIAL_CSW_ADMIN_USR user account, 2.4.2.2
SPATIAL_WFS_ADMIN_USR user account, 2.4.2.2
standard auditing
tutorial, 9.3
SYS user account
about, 2.4.2.1
SYS_CONTEXT SQL function
example, 6.2.4
validating users, 3.5.2.4
SYSBACKUP user account
about, 2.4.2.1
SYSDG user account
about, 2.4.2.1
SYSKM user account
about, 2.4.2.1
SYS-privileged connections, 3.2
system administrator
See administrative accounts, security administrator
system privileges, 3.2
ANY, 2.2.2.2
SYSTEM user account
about, 2.4.2.1

T

tablespaces
encrypting, 4.4.6.2
TDE
See Transparent Data Encryption (TDE)
trace files
checking for errors, 3.5.2.4
Transparent Data Encryption (TDE)
about, 4.3
advantages, 4.3
closing keystore, 4.4.4
components, 4.3
configuring, 4.4
creating master encryption key, 4.4.5
creating software password keystores, 4.4.3
finding if keystore is open or closed, 4.5.3
finding keystore location, 4.5.2
finding keystore type, 4.5.1
how it works, 4.3
opening keystore, 4.4.4
performance effects, 4.3
storage space, 4.3
table columns
checking in database instances, 4.5.5
checking individual tables, 4.5.4
encrypting, 4.4.6.1
tablespaces
checking, 4.5.6
tablespaces, encrypting, 4.4.6.2
troubleshooting
checking trace files, 3.5.2.4
tutorials
Oracle Database Vault, 5.2
Oracle Label Security, 8.4
Oracle Virtual Private Database, 6.2
secure application roles, 3.5.2
standard auditing, 9.3

U

user accounts
about, 2.4.1
default, changing password, 2.4.5.1
expiring, 2.4.3
locking, 2.4.3
password requirements, 2.4.4
predefined
administrative, 2.4.2.1
non-administrative, 2.4.2.2
sample schema, 2.4.2.3
unlocking, 2.4.3
user accounts, predefined
ANONYMOUS, 2.4.2.1
ASMSNMP, 2.4.2.1
AUDSYS, 2.4.2.1
CTXSYS, 2.4.2.1
DBSNMP, 2.4.2.1
DIP, 2.4.2.2
HR, 2.4.2.3
IX, 2.4.2.3
LBACSYS, 2.4.2.1
MDDATA, 2.4.2.2
MDSYS, 2.4.2.1
OE, 2.4.2.3
OLAPSYS, 2.4.2.1
ORACLE_OCM, 2.4.2.2
ORDDATA, 2.4.2.1
ORDPLUGINS, 2.4.2.1
ORDSYS, 2.4.2.1
PM, 2.4.2.3
SCOTT, 2.4.2.3, 3.3
SH, 2.4.2.3
SI_INFORMTN_SCHEMA, 2.4.2.1
SPATIAL_CSW_ADMIN_USR, 2.4.2.2
SPATIAL_WFS_ADMIN_USR, 2.4.2.2
SYS, 2.4.2.1
SYSBACKUP, 2.4.2.1
SYSDG, 2.4.2.1
SYSKM, 2.4.2.1
SYSTEM, 2.4.2.1
WMSYS, 2.4.2.1
XDB, 2.4.2.1
XS$NULL, 2.4.2.2
user session information, retrieving, 6.1

V

views
See data dictionary views
Virtual Private Database
See Oracle Virtual Private Database
VPD
See Oracle Virtual Private Database

W

WMSYS user account, 2.4.2.1

X

XDB user account, 2.4.2.1
XS$NULL user account, 2.4.2.2