How do I narrow my search results?
After you submit your search query:
- On the Refine Search results page, select one or more categories of products or services from the left sidebar.
- Then for a category with search results, click Select to choose your product and release filters, and then click OK.
For search queries that contain multiple words, surround the query with quotes, and then resubmit your query. Example: "database cloud service"
How do I find the documentation for my product or service?
From the home page, click the technology categories for your products or services. If you do not know which category to pick, try the following features:
- Click the Find a product tab and search for your product or service.
- Click Browse All Products & Services at the bottom of the home page to view an alphabetical listing of products and services.
- Apple Safari: Version 6
- Google Chrome: Version 29 and later
- Mozilla Firefox: Version 24 and later
- Microsoft Internet Explorer: Version 9 and later
Authentication → and semantics Authentication In Oracle Database, database authentication is the process by which a … . Authentication also enables accountability by making it possible to link access and actions to specific … identities. Oracle Database provides different authentication methods, including the following … : Authentication
Using Operating System Authentication → Figure 1-2 Database Administrator Authentication Methods Description of \"Figure 1-2 Database … Administrator Authentication Methods\" If you are performing remote database administration, consult your … for information about authenticating database administrators with network-based authentication … password file. When using password
Using Password File Authentication → authentication. Preparing to Use Password File Authentication To enable authentication of an administrative user … using password file authentication you must do the following: If not already created, create the … . Connecting Using Password File Authentication Administrative users can be connected and
Database Administrator Authentication → secure authentication scheme. This section contains the following topics: Administrative Privileges … Selecting an Authentication Method for Database Administrators Using Operating System Authentication Using Password File Authentication
Password File Authentication for Oracle ASM → Password file authentication for Oracle ASM can work both locally and remotely. To enable password … file authentication, you must create a password file for Oracle ASM. A password file is also … Oracle Enterprise Manager use password file authentication. See Also: Oracle Database Administrator's
Authentication for Accessing Oracle ASM Instances → modes of connecting to Oracle ASM instances: Local connection using operating system authentication … Local connection using password authentication Remote connection by way of Oracle Net Services using … password authentication See Also: Your operating system-specific Oracle Grid Infrastructure … Users with the SYSASM Privilege
Operating System Authentication for Oracle ASM → authentication for the SYSASM system privilege. OSASM is provided exclusively for Oracle ASM … commands, ASMCMD commands, and ASMCA use operating system authentication. See Also: Oracle Database … Administrator's Guide for more information about using operating system authentication Oracle Grid
Selecting an Authentication Method for Database Administrators → addition to normal data dictionary authentication, the following methods are available for … ) authentication Password files Strong authentication with a network-based authentication service, such as Oracle … .) The remainder of this section focuses on operating system authentication and password file
About Authentication → Authentication means verifying the identity of someone (a user, device, or other entity) who wants … for further interactions. Authentication also enables accountability by making it possible to link … access and actions to specific identities. After authentication, authorization processes can allow or … and nondatabase users
PRVE-0038 : The SSH LoginGraceTime setting, or fatal: Timeout before authentication → available space. Oracle recommends that you allocate the entire disk to Oracle ASM. PRVE-0038: The SSH LoginGraceTime setting, or fatal: Timeout before authentication
Step 3: Choose a Database Administrator Authentication Method → : With a password file With operating system authentication In this step, you decide on an authentication … \"Creating and Maintaining a Password File\". To be authenticated with operating system authentication … \" \"Database Administrator Authentication\" for information about password files and operating system authentication
Configuring Password Protection → This section contains: What Are the Oracle Database Built-in Password Protections? Minimum Requirements for Passwords Using a Password Management Policy Ensuring Against Password Security Threats by Using the SHA-1 Hashing Algorithm Managing the Secure External Password Store for Password Credentials See also \"Guidelines for Securing Passwords\" for advice on securing passwords. If you want to configure
Strong Authentication and Centralized Management for Database Administrators → Strong authentication lets you centrally control SYSDBA and SYSOPER access to multiple databases … . Consider using this type of authentication for database administration for the following situations … Authentication for Administrative Users Configuring Kerberos Authentication for Administrative Users … Configuring
Using the Database to Authenticate Users → This section contains: About Database Authentication Advantages of Database Authentication Creating a User Who Is Authenticated by the Database
Using Multitier Authentication and Authorization → Interface to create lightweight sessions, which enable database password authentication for each
Using a Middle Tier Server for Proxy Authentication → The following sections explain how to use proxy authentication: About Proxy Authentication … Advantages of Proxy Authentication Who Can Create Proxy User Accounts? Creating Proxy User Accounts and … Authorizing Users to Connect Through Them Using Proxy Authentication with the Secure External Password … Store Passing
Finding Information About User Authentication → Table 3-3 lists data dictionary views that contain information about user authentication. For
Authenticating Database Administrators by Using Their Passwords → Oracle Database Administrator's Guide for more information. Password file-based authentication is … users that have SYSDBA or SYSOPER system privileges. Password file based authentication is activated as … using password files may pose security risks. For this reason, consider using the authentication … methods described in \"Strong
Authentication Using Secure Sockets Layer → authentication to a database, and it is independent of global user management in Oracle Internet
Creating a User Who Is Authorized by a Directory Service → You have the following options to specify users who are authorized by a directory service: Creating a Global User Who Has a Private Schema Creating Multiple Enterprise Users Who Share Schemas Creating a Global User Who Has a Private Schema The following statement shows the creation of a global user with a private schema, authenticated by SSL, and authorized by the enterprise directory service: CREATE