How do I narrow my search results?
After you submit your search query:
- On the Refine Search results page, select one or more categories of products or services from the left sidebar.
- Then for a category with search results, click Select to choose your product and release filters, and then click OK.
For search queries that contain multiple words, surround the query with quotes, and then resubmit your query. Example: "database cloud service"
How do I find the documentation for my product or service?
From the home page, click the technology categories for your products or services. If you do not know which category to pick, try the following features:
- Click the Find a product tab and search for your product or service.
- Click Browse All Products & Services at the bottom of the home page to view an alphabetical listing of products and services.
- Apple Safari: Version 6
- Google Chrome: Version 29 and later
- Mozilla Firefox: Version 24 and later
- Microsoft Internet Explorer: Version 9 and later
Authentication → and semantics Authentication In Oracle Database, database authentication is the process by which a … . Authentication also enables accountability by making it possible to link access and actions to specific … identities. Oracle Database provides different authentication methods, including the following … : Authentication
Database Administrator Authentication → secure authentication scheme. This section contains the following topics: Administrative Privileges … Selecting an Authentication Method for Database Administrators Using Operating System Authentication Using Password File Authentication
Using Operating System Authentication → Figure 1-2 Database Administrator Authentication Methods Description of \"Figure 1-2 Database … Administrator Authentication Methods\" If you are performing remote database administration, consult your … for information about authenticating database administrators with network-based authentication … password file. When using password
Using Password File Authentication → authentication. Preparing to Use Password File Authentication To enable authentication of an administrative user … using password file authentication you must do the following: If not already created, create the … . Connecting Using Password File Authentication Administrative users can be connected and
Authentication for Accessing Oracle ASM Instances → modes of connecting to Oracle ASM instances: Local connection using operating system authentication … Local connection using password authentication Remote connection by way of Oracle Net Services using … password authentication See Also: Your operating system-specific Oracle Grid Infrastructure … Users with the SYSASM Privilege
Operating System Authentication for Oracle ASM → authentication for the SYSASM system privilege. OSASM is provided exclusively for Oracle ASM … commands, ASMCMD commands, and ASMCA use operating system authentication. See Also: Oracle Database … Administrator's Guide for more information about using operating system authentication Oracle Grid
Password File Authentication for Oracle ASM → Password file authentication for Oracle ASM can work both locally and remotely. To enable password … file authentication, you must create a password file for Oracle ASM. A password file is also … Oracle Enterprise Manager use password file authentication. See Also: Oracle Database Administrator's
Selecting an Authentication Method for Database Administrators → addition to normal data dictionary authentication, the following methods are available for … ) authentication Password files Strong authentication with a network-based authentication service, such as Oracle … .) The remainder of this section focuses on operating system authentication and password file
About Authentication → Authentication means verifying the identity of someone (a user, device, or other entity) who wants … for further interactions. Authentication also enables accountability by making it possible to link … access and actions to specific identities. After authentication, authorization processes can allow or … and nondatabase users
Step 3: Choose a Database Administrator Authentication Method → : With a password file With operating system authentication In this step, you decide on an authentication … \"Creating and Maintaining a Password File\". To be authenticated with operating system authentication … \" \"Database Administrator Authentication\" for information about password files and operating system authentication
Authentication Using Third-Party Services → You need to use third-party network authentication services if you want to authenticate Oracle … RADIUS (Remote Authentication Dial-In User Service), and directory-based services, as described in … the following sections. If network authentication services are available to you, then Oracle … Database can accept authentication
Advantages of External Authentication → The advantages of external authentication are as follows: More choices of authentication mechanisms … authentication services, such as Kerberos support single sign-on, enabling users to have fewer … passwords to remember. If you are already using an external mechanism for authentication, such as one of
Creating a User Who Is Authenticated Externally → authentication when it provides that specific operating system user with access to the database resources of … a specific user. See Also: Oracle Database Advanced Security Administrator's Guide for more information about external authentication
Minimum Requirements for Passwords → Passwords must not exceed 30 characters or 30 bytes. For greater security, however, follow the additional guidelines described in \"Guidelines for Securing Passwords\". To create passwords for users, you can use the CREATE USER or ALTER USER SQL statements. SQL statements that accept the IDENTIFIED BY clause also enable you to create passwords. Example 3-1 shows several SQL statements that create
Using a Password Management Policy → This section contains: About Managing Passwords Finding User Accounts That Have Default Passwords Configuring Password Settings in the Default Profile Disabling and Enabling the Default Password Security Settings Automatically Locking a User Account After a Failed Login Controlling Password Aging and Expiration Password Change Life Cycle Setting the PASSWORD_LIFE_TIME Profile Parameter to a Low Value
About Database Authentication → stored in that database itself. To configure Oracle Database to use database authentication, you must … stores user passwords in the data dictionary in an encrypted format. To identify the authentication … , authentication fails with an ORA-28040 No matching authentication protocol error. The parameter can take
Using the Operating System to Authenticate Users → / With control over user authentication centralized in the operating system, Oracle Database need not … information about authentication, operating systems, distributed database concepts, and distributed data
Advantages of Global Authentication and Global Authorization → Some advantages of global user authentication and authorization are as follows: Provides strong … authentication using SSL, Kerberos, or Windows native authentication. Enables centralized management of … . Because global user authentication and authorization provide password-based access, you can migrate … Utility)
Table 3-3 Data Dictionary Views That Describe User Authentication → limits. DBA_ROLES Displays the kind of authentication used for a database role to log in to the … information, displays the following: The kind of authentication the user used to log in to the database
Configuring Password Protection → This section contains: What Are the Oracle Database Built-in Password Protections? Minimum Requirements for Passwords Using a Password Management Policy Ensuring Against Password Security Threats by Using the SHA-1 Hashing Algorithm Managing the Secure External Password Store for Password Credentials See also \"Guidelines for Securing Passwords\" for advice on securing passwords. If you want to configure