You are using an outdated browser. Please upgrade to the latest version for the best experience.
How do I narrow my search results?

After you submit your search query:

  1. On the Refine Search results page, select one or more categories of products or services from the left sidebar.
  2. Then for a category with search results, click Select to choose your product and release filters, and then click OK.

For search queries that contain multiple words, surround the query with quotes, and then resubmit your query. Example: "database cloud service"

How do I find the documentation for my product or service?

From the home page, click the technology categories for your products or services. If you do not know which category to pick, try the following features:

  • Click the Find a product tab and search for your product or service.
  • Click Browse All Products & Services at the bottom of the home page to view an alphabetical listing of products and services.
  • Apple Safari: Version 6
  • Google Chrome: Version 29 and later
  • Mozilla Firefox: Version 24 and later
  • Microsoft Internet Explorer: Version 9 and later
Results for authentication


1 to 20 of 1357 results. Previous page Prev  Next next page
Results per page:   20  | 40 | 60


Database Concepts, 11g Release 2 (11.2)

Topics for Database Administrators and Developers

Authenticationand semantics Authentication In Oracle Database, database authentication is the process by which a … . Authentication also enables accountability by making it possible to link access and actions to specific … identities. Oracle Database provides different authentication methods, including the following … : Authentication

Database Administrator's Guide, 11g Release 2 (11.2)

Getting Started with Database Administration

Using Operating System AuthenticationFigure 1-2 Database Administrator Authentication Methods Description of \"Figure 1-2 Database … Administrator Authentication Methods\" If you are performing remote database administration, consult your … for information about authenticating database administrators with network-based authentication … password file. When using password

Database Administrator's Guide, 11g Release 2 (11.2)

Getting Started with Database Administration

Using Password File Authenticationauthentication. Preparing to Use Password File Authentication To enable authentication of an administrative user … using password file authentication you must do the following: If not already created, create the … . Connecting Using Password File Authentication Administrative users can be connected and

Database Administrator's Guide, 11g Release 2 (11.2)

Getting Started with Database Administration

Database Administrator Authenticationsecure authentication scheme. This section contains the following topics: Administrative Privileges … Selecting an Authentication Method for Database Administrators Using Operating System Authentication Using Password File Authentication

Automatic Storage Management Administrator's Guide, 11g Release 2 (11.2)

Administering Oracle ASM Instances

Password File Authentication for Oracle ASMPassword file authentication for Oracle ASM can work both locally and remotely. To enable password … file authentication, you must create a password file for Oracle ASM. A password file is also … Oracle Enterprise Manager use password file authentication. See Also: Oracle Database Administrator's

Automatic Storage Management Administrator's Guide, 11g Release 2 (11.2)

Administering Oracle ASM Instances

Authentication for Accessing Oracle ASM Instancesmodes of connecting to Oracle ASM instances: Local connection using operating system authentication … Local connection using password authentication Remote connection by way of Oracle Net Services using … password authentication See Also: Your operating system-specific Oracle Grid Infrastructure … Users with the SYSASM Privilege

Automatic Storage Management Administrator's Guide, 11g Release 2 (11.2)

Administering Oracle ASM Instances

Operating System Authentication for Oracle ASMauthentication for the SYSASM system privilege. OSASM is provided exclusively for Oracle ASM … commands, ASMCMD commands, and ASMCA use operating system authentication. See Also: Oracle Database … Administrator's Guide for more information about using operating system authentication Oracle Grid

Database Administrator's Guide, 11g Release 2 (11.2)

Getting Started with Database Administration

Selecting an Authentication Method for Database Administratorsaddition to normal data dictionary authentication, the following methods are available for … ) authentication Password files Strong authentication with a network-based authentication service, such as Oracle … .) The remainder of this section focuses on operating system authentication and password file

Database Security Guide, 11g Release 2 (11.2)

Configuring Authentication

About AuthenticationAuthentication means verifying the identity of someone (a user, device, or other entity) who wants … for further interactions. Authentication also enables accountability by making it possible to link … access and actions to specific identities. After authentication, authorization processes can allow or … and nondatabase users

Grid Infrastructure Installation Guide for Linux, 11g Release 2 (11.2)

Troubleshooting the Oracle Grid Infrastructure Installation Process

PRVE-0038 : The SSH LoginGraceTime setting, or fatal: Timeout before authenticationavailable space. Oracle recommends that you allocate the entire disk to Oracle ASM. PRVE-0038: The SSH LoginGraceTime setting, or fatal: Timeout before authentication

Database Administrator's Guide, 11g Release 2 (11.2)

Creating and Configuring an Oracle Database

Step 3: Choose a Database Administrator Authentication Method: With a password file With operating system authentication In this step, you decide on an authentication … \"Creating and Maintaining a Password File\". To be authenticated with operating system authentication … \" \"Database Administrator Authentication\" for information about password files and operating system authentication

Database Security Guide, 11g Release 2 (11.2)

Configuring Authentication

Configuring Password ProtectionThis section contains: What Are the Oracle Database Built-in Password Protections? Minimum Requirements for Passwords Using a Password Management Policy Ensuring Against Password Security Threats by Using the SHA-1 Hashing Algorithm Managing the Secure External Password Store for Password Credentials See also \"Guidelines for Securing Passwords\" for advice on securing passwords. If you want to configure

Database Security Guide, 11g Release 2 (11.2)

Configuring Authentication

Strong Authentication and Centralized Management for Database AdministratorsStrong authentication lets you centrally control SYSDBA and SYSOPER access to multiple databases … . Consider using this type of authentication for database administration for the following situations … Authentication for Administrative Users Configuring Kerberos Authentication for Administrative Users … Configuring

Database Security Guide, 11g Release 2 (11.2)

Configuring Authentication

Using the Database to Authenticate UsersThis section contains: About Database Authentication Advantages of Database Authentication Creating a User Who Is Authenticated by the Database

Database Security Guide, 11g Release 2 (11.2)

Configuring Authentication

Using Multitier Authentication and AuthorizationInterface to create lightweight sessions, which enable database password authentication for each

Database Security Guide, 11g Release 2 (11.2)

Configuring Authentication

Using a Middle Tier Server for Proxy AuthenticationThe following sections explain how to use proxy authentication: About Proxy Authentication … Advantages of Proxy Authentication Who Can Create Proxy User Accounts? Creating Proxy User Accounts and … Authorizing Users to Connect Through Them Using Proxy Authentication with the Secure External Password … Store Passing

Database Security Guide, 11g Release 2 (11.2)

Configuring Authentication

Finding Information About User AuthenticationTable 3-3 lists data dictionary views that contain information about user authentication. For

Database Security Guide, 11g Release 2 (11.2)

Configuring Authentication

Authenticating Database Administrators by Using Their PasswordsOracle Database Administrator's Guide for more information. Password file-based authentication is … users that have SYSDBA or SYSOPER system privileges. Password file based authentication is activated as … using password files may pose security risks. For this reason, consider using the authentication … methods described in \"Strong

Database Security Guide, 11g Release 2 (11.2)

Configuring Authentication

Authentication Using Secure Sockets Layerauthentication to a database, and it is independent of global user management in Oracle Internet

Database Security Guide, 11g Release 2 (11.2)

Configuring Authentication

Creating a User Who Is Authorized by a Directory ServiceYou have the following options to specify users who are authorized by a directory service: Creating a Global User Who Has a Private Schema Creating Multiple Enterprise Users Who Share Schemas Creating a Global User Who Has a Private Schema The following statement shows the creation of a global user with a private schema, authenticated by SSL, and authorized by the enterprise directory service: CREATE