You are using an outdated browser. Please upgrade to the latest version for the best experience.
How do I narrow my search results?

After you submit your search query:

  1. On the Refine Search results page, select one or more categories of products or services from the left sidebar.
  2. Then for a category with search results, click Select to choose your product and release filters, and then click OK.

For search queries that contain multiple words, surround the query with quotes, and then resubmit your query. Example: "database cloud service"

How do I find the documentation for my product or service?

From the home page, click the technology categories for your products or services. If you do not know which category to pick, try the following features:

  • Click the Find a product tab and search for your product or service.
  • Click Browse All Products & Services at the bottom of the home page to view an alphabetical listing of products and services.
  • Apple Safari: Version 6
  • Google Chrome: Version 29 and later
  • Mozilla Firefox: Version 24 and later
  • Microsoft Internet Explorer: Version 9 and later
Results for authentication


1 to 20 of 1159 results. Previous page Prev  Next next page
Results per page:   20  | 40 | 60


Database Administrator's Guide, 11g Release 1 (11.1)

Distributed Database Administration

Authentication Without PasswordsWhen using a connected user or current user database link, you can use an external authentication … source such as Kerberos to obtain end-to-end security. In end-to-end authentication, credentials are

Database Administrator's Guide, 11g Release 1 (11.1)

Database Administrator Authentication

Using Operating System AuthenticationThis section describes how to authenticate an administrator using the operating system.

Database Administrator's Guide, 11g Release 1 (11.1)

Database Administrator Authentication

Using Password File AuthenticationThis section describes how to authenticate an administrative user using password file authentication.

Database Administrator's Guide, 11g Release 1 (11.1)

Database Administrator Authentication

Database Administrator Authenticationsecure authentication scheme. This section contains the following topics: Administrative Privileges … Selecting an Authentication Method for Database Administrators Using Operating System Authentication Using Password File Authentication

Database Administrator's Guide, 11g Release 1 (11.1)

Distributed Database Administration

Authentication Through Database LinksDatabase links are either private or public, authenticated or non-authenticated. You create public links by specifying the PUBLIC keyword in the link creation statement. For example, you can issue: CREATE PUBLIC DATABASE LINK foo USING 'sales'; You create authenticated links by specifying the CONNECT TO clause, AUTHENTICATED BY clause, or both clauses together in the database link creation statement.

Database Administrator's Guide, 11g Release 1 (11.1)

Database Administrator Authentication

Connecting Using Operating System AuthenticationWindows platform only, remote operating system authentication over a secure connection is supported

Database Administrator's Guide, 11g Release 1 (11.1)

Database Administrator Authentication

Connecting Using Password File AuthenticationSYSOPER Note: Operating system authentication takes precedence over password file authentication

Database Administrator's Guide, 11g Release 1 (11.1)

Database Administrator Authentication

OSDBA and OSOPERsystem authentication. These groups are generically referred to as OSDBA and OSOPER. The groups are

Database Administrator's Guide, 11g Release 1 (11.1)

Database Administrator Authentication

Local Connections and Secure Remote Connectionstherefore not in the password file, you can use operating system authentication. On most operating … systems, authentication for database administrators involves placing the operating system username

Database Administrator's Guide, 11g Release 1 (11.1)

Database Administrator Authentication

SYSDBA and SYSOPERare authorized to use these privileges depends upon the method of authentication that you use. When

Database Administrator's Guide, 11g Release 1 (11.1)

Database Administrator Authentication

Preparing to Use Password File AuthenticationTo enable authentication of an administrative user using password file authentication you must do

Database Administrator's Guide, 11g Release 1 (11.1)

Database Administrator Authentication

Connecting with Administrative Privileges: ExampleOperating System Authentication\" \"Using Password File Authentication\"

Database Administrator's Guide, 11g Release 1 (11.1)

Database Administrator Authentication

Nonsecure Remote Connectionsauthenticated by a password file. When using password file authentication, the database uses a password … . This form of authentication is discussed in \"Using Password File Authentication\".

Database Administrator's Guide, 11g Release 1 (11.1)

Database Administrator Authentication

Selecting an Authentication Method for Database Administratorsnormal data dictionary authentication, the following methods are available for authenticating database … administrators with the SYSDBA or SYSOPER privilege: Operating system (OS) authentication A password … file Strong authentication with a network-based authentication service, such as Oracle Internet … remainder

Database Administrator's Guide, 11g Release 1 (11.1)

Database Administrator Authentication

Administrative PrivilegesAdministrative privileges that are required for an administrator to perform basic database operations are granted through two special system privileges, SYSDBA and SYSOPER. You must have one of these privileges granted to you, depending upon the level of authorization you require. Note: The SYSDBA and SYSOPER system privileges allow access to a database instance even when the database is not open.

Database Administrator's Guide, 11g Release 1 (11.1)

Database Administrator Authentication

Preparing to Use Operating System AuthenticationTo enable operating system authentication of an administrative user: Create an operating system

Ultra Search Administrator's Guide, 11g Release 1 (11.1)

Understanding the Oracle Ultra Search Administration Tool

AuthenticationUse this page to enter authentication information that applies to all data sources. Note: The data … source specific authentication takes precedence over this global authentication. HTTP Authentication … Oracle Ultra Search supports both basic and digest authentication. Specify the user name and

Database Security Guide, 11g Release 1 (11.1)

Configuring Authentication

About AuthenticationAuthentication means verifying the identity of someone (a user, device, or other entity) who wants … for further interactions. Authentication also enables accountability by making it possible to link … access and actions to specific identities. After authentication, authorization processes can allow or … and nondatabase users

Database Administrator's Guide, 11g Release 1 (11.1)

Creating a Database with the CREATE DATABASE Statement

Step 3: Choose a Database Administrator Authentication Methodpassword file With operating system authentication In this step, you decide on an authenticationauthentication, ensure that you log in to the host computer with a user account that is a member of the … Privileges\" \"Database Administrator Authentication\" for information about password files and operating system

Database Security Guide, 11g Release 1 (11.1)

Configuring Authentication

Creating a User Who Is Authenticated by the DatabaseThe following SQL statement creates a user who is identified and authenticated by Oracle Database. User sebastian must specify the assigned password whenever he connects to Oracle Database. CREATE USER sebastian IDENTIFIED BY password;