Go to main content

Oracle® Advanced Support Gateway Security Guide

Exit Print View

Updated: March 2024
 
 

Monitoring Access: an Overview

In general, there are three methods for providing Oracle with the necessary access for implementing monitoring:

  • Provide root access to all systems.

  • Enable access using Role-based Access Control (RBAC.) RBAC is a security feature for controlling user access to tasks that would normally be restricted to the root role. By applying security attributes to processes and to users, RBAC can divide superuser capabilities among several administrators. This option is applicable only to systems running the Solaris operating system.

  • Provide access via sudo (superuser do.) sudo is a program for operating systems such as Linux and Solaris that allows users to run programs as another user - normally as the system’s superuser (root) - as specified in the /etc/sudoers file. This section outlines the methods used to provide Oracle with the necessary access for implementing monitoring on the Gateway.

During activation of database services, the following users and accounts are used to monitor the database:

  • For storage/cluster monitoring, the user asmsnmp is used;

  • For database monitoring, the user dbsnmp is used;

  • For standby database monitoring, the user sys is used.


Note -  Passwords for all of the above users must be available during installation. They can be entered by the customer into the Gateway user interface when needed.