You are using an outdated browser. Please upgrade to the latest version for the best experience.
How do I narrow my search results?

After you submit your search query:

  1. On the Refine Search results page, select one or more categories of products or services from the left sidebar.
  2. Then for a category with search results, click Select to choose your product and release filters, and then click OK.

For search queries that contain multiple words, surround the query with quotes, and then resubmit your query. Example: "database cloud service"

How do I find the documentation for my product or service?

From the home page, click the technology categories for your products or services. If you do not know which category to pick, try the following features:

  • Click the Find a product tab and search for your product or service.
  • Click Browse All Products & Services at the bottom of the home page to view an alphabetical listing of products and services.
  • Apple Safari: Version 6
  • Google Chrome: Version 29 and later
  • Mozilla Firefox: Version 24 and later
  • Microsoft Internet Explorer: Version 9 and later
Results for authentication


1 to 20 of 1357 results. Previous page Prev  Next next page
Results per page:   20  | 40 | 60


Database Concepts, 11g Release 2 (11.2)

Topics for Database Administrators and Developers

Authenticationand semantics Authentication In Oracle Database, database authentication is the process by which a … . Authentication also enables accountability by making it possible to link access and actions to specific … identities. Oracle Database provides different authentication methods, including the following … : Authentication

Database Administrator's Guide, 11g Release 2 (11.2)

Getting Started with Database Administration

Database Administrator Authenticationsecure authentication scheme. This section contains the following topics: Administrative Privileges … Selecting an Authentication Method for Database Administrators Using Operating System Authentication Using Password File Authentication

Database Administrator's Guide, 11g Release 2 (11.2)

Getting Started with Database Administration

Using Operating System AuthenticationFigure 1-2 Database Administrator Authentication Methods Description of \"Figure 1-2 Database … Administrator Authentication Methods\" If you are performing remote database administration, consult your … for information about authenticating database administrators with network-based authentication … password file. When using password

Database Administrator's Guide, 11g Release 2 (11.2)

Getting Started with Database Administration

Using Password File Authenticationauthentication. Preparing to Use Password File Authentication To enable authentication of an administrative user … using password file authentication you must do the following: If not already created, create the … . Connecting Using Password File Authentication Administrative users can be connected and

Automatic Storage Management Administrator's Guide, 11g Release 2 (11.2)

Administering Oracle ASM Instances

Authentication for Accessing Oracle ASM Instancesmodes of connecting to Oracle ASM instances: Local connection using operating system authentication … Local connection using password authentication Remote connection by way of Oracle Net Services using … password authentication See Also: Your operating system-specific Oracle Grid Infrastructure … Users with the SYSASM Privilege

Automatic Storage Management Administrator's Guide, 11g Release 2 (11.2)

Administering Oracle ASM Instances

Operating System Authentication for Oracle ASMauthentication for the SYSASM system privilege. OSASM is provided exclusively for Oracle ASM … commands, ASMCMD commands, and ASMCA use operating system authentication. See Also: Oracle Database … Administrator's Guide for more information about using operating system authentication Oracle Grid

Automatic Storage Management Administrator's Guide, 11g Release 2 (11.2)

Administering Oracle ASM Instances

Password File Authentication for Oracle ASMPassword file authentication for Oracle ASM can work both locally and remotely. To enable password … file authentication, you must create a password file for Oracle ASM. A password file is also … Oracle Enterprise Manager use password file authentication. See Also: Oracle Database Administrator's

Database Administrator's Guide, 11g Release 2 (11.2)

Getting Started with Database Administration

Selecting an Authentication Method for Database Administratorsaddition to normal data dictionary authentication, the following methods are available for … ) authentication Password files Strong authentication with a network-based authentication service, such as Oracle … .) The remainder of this section focuses on operating system authentication and password file

Database Security Guide, 11g Release 2 (11.2)

Configuring Authentication

About AuthenticationAuthentication means verifying the identity of someone (a user, device, or other entity) who wants … for further interactions. Authentication also enables accountability by making it possible to link … access and actions to specific identities. After authentication, authorization processes can allow or … and nondatabase users

Database Administrator's Guide, 11g Release 2 (11.2)

Creating and Configuring an Oracle Database

Step 3: Choose a Database Administrator Authentication Method: With a password file With operating system authentication In this step, you decide on an authentication … \"Creating and Maintaining a Password File\". To be authenticated with operating system authentication … \" \"Database Administrator Authentication\" for information about password files and operating system authentication

Database Security Guide, 11g Release 2 (11.2)

Configuring Authentication

Authentication Using Third-Party ServicesYou need to use third-party network authentication services if you want to authenticate Oracle … RADIUS (Remote Authentication Dial-In User Service), and directory-based services, as described in … the following sections. If network authentication services are available to you, then Oracle … Database can accept authentication

Database Security Guide, 11g Release 2 (11.2)

Configuring Authentication

Advantages of External AuthenticationThe advantages of external authentication are as follows: More choices of authentication mechanisms … authentication services, such as Kerberos support single sign-on, enabling users to have fewer … passwords to remember. If you are already using an external mechanism for authentication, such as one of

Database Security Guide, 11g Release 2 (11.2)

Configuring Authentication

Creating a User Who Is Authenticated Externallyauthentication when it provides that specific operating system user with access to the database resources of … a specific user. See Also: Oracle Database Advanced Security Administrator's Guide for more information about external authentication

Database Security Guide, 11g Release 2 (11.2)

Configuring Authentication

Minimum Requirements for PasswordsPasswords must not exceed 30 characters or 30 bytes. For greater security, however, follow the additional guidelines described in \"Guidelines for Securing Passwords\". To create passwords for users, you can use the CREATE USER or ALTER USER SQL statements. SQL statements that accept the IDENTIFIED BY clause also enable you to create passwords. Example 3-1 shows several SQL statements that create

Database Security Guide, 11g Release 2 (11.2)

Configuring Authentication

Using a Password Management PolicyThis section contains: About Managing Passwords Finding User Accounts That Have Default Passwords Configuring Password Settings in the Default Profile Disabling and Enabling the Default Password Security Settings Automatically Locking a User Account After a Failed Login Controlling Password Aging and Expiration Password Change Life Cycle Setting the PASSWORD_LIFE_TIME Profile Parameter to a Low Value

Database Security Guide, 11g Release 2 (11.2)

Configuring Authentication

About Database Authenticationstored in that database itself. To configure Oracle Database to use database authentication, you must … stores user passwords in the data dictionary in an encrypted format. To identify the authentication … , authentication fails with an ORA-28040 No matching authentication protocol error. The parameter can take

Database Security Guide, 11g Release 2 (11.2)

Configuring Authentication

Using the Operating System to Authenticate Users/ With control over user authentication centralized in the operating system, Oracle Database need not … information about authentication, operating systems, distributed database concepts, and distributed data

Database Security Guide, 11g Release 2 (11.2)

Configuring Authentication

Advantages of Global Authentication and Global AuthorizationSome advantages of global user authentication and authorization are as follows: Provides strong … authentication using SSL, Kerberos, or Windows native authentication. Enables centralized management of … . Because global user authentication and authorization provide password-based access, you can migrate … Utility)

Database Security Guide, 11g Release 2 (11.2)

Configuring Authentication

Table 3-3 Data Dictionary Views That Describe User Authenticationlimits. DBA_ROLES Displays the kind of authentication used for a database role to log in to the … information, displays the following: The kind of authentication the user used to log in to the database

Database Security Guide, 11g Release 2 (11.2)

Configuring Authentication

Configuring Password ProtectionThis section contains: What Are the Oracle Database Built-in Password Protections? Minimum Requirements for Passwords Using a Password Management Policy Ensuring Against Password Security Threats by Using the SHA-1 Hashing Algorithm Managing the Secure External Password Store for Password Credentials See also \"Guidelines for Securing Passwords\" for advice on securing passwords. If you want to configure