How do I narrow my search results?
After you submit your search query:
- On the Refine Search results page, select one or more categories of products or services from the left sidebar.
- Then for a category with search results, click Select to choose your product and release filters, and then click OK.
For search queries that contain multiple words, surround the query with quotes, and then resubmit your query. Example: "database cloud service"
How do I find the documentation for my product or service?
From the home page, click the technology categories for your products or services. If you do not know which category to pick, try the following features:
- Click the Find a product tab and search for your product or service.
- Click Browse All Products & Services at the bottom of the home page to view an alphabetical listing of products and services.
- Apple Safari: Version 6
- Google Chrome: Version 29 and later
- Mozilla Firefox: Version 24 and later
- Microsoft Internet Explorer: Version 9 and later
Database Authentication → In Oracle Database, database authentication is the process by which a user presents credentials to … identity establishes a trust relationship for further interactions. Authentication also enables … provides different authentication methods, including the following: Authentication by the database Oracle … supports
1.6 Database Administrator Authentication → … Because only a DBA should perform these operations, the database administrator user names require a secure authentication scheme.
Authentication for Accessing Oracle ASM Instances → modes of connecting to Oracle ASM instances: Local connection using operating system authentication … Local connection using password authentication Remote connection by way of Oracle Net Services using … password authentication See Also: Your operating system-specific Oracle Grid Infrastructure … Users with the SYSASM Privilege
Operating System Authentication for Oracle ASM → authentication for the SYSASM system privilege. OSASM is provided exclusively for Oracle ASM … , and ASMCA use operating system authentication. See Also: Oracle Database Administrator's Guide for … more information about using operating system authentication Oracle Grid Infrastructure Installation
Password File Authentication for Oracle ASM → Password file authentication for Oracle ASM can work both locally and remotely. To enable password … file authentication, you must create a password file for Oracle ASM. If you select the Oracle ASM … password file authentication. See Also: Oracle Database Administrator's Guide for information about
1.6.5 Using Password File Authentication → You can use password file authentication for an Oracle database instance and for an Oracle
1.6.4 Using Operating System Authentication → operating system authentication. On most operating systems, authentication for database administrators … privilege to users. 1.6.4 Using Operating System Authentication Membership in special operating system … database user name and password. This is known as operating system authentication.
1.6.3 Authentication Methods for Database Administrators → ) authentication, password files, or strong authentication with a directory-based authentication service, such as Oracle Internet Directory.
About Authentication → Authentication means verifying the identity of a user, device, or other entity who wants to use … interactions. Authentication also enables accountability by making it possible to link access and … actions to specific identities. After authentication, authorization processes can allow or limit the … nondatabase users for an Oracle
PRVE-0038 : The SSH LoginGraceTime setting, or fatal: Timeout before authentication → available space. Oracle recommends that you allocate the entire disk to Oracle ASM. PRVE-0038: The SSH LoginGraceTime setting, or fatal: Timeout before authentication
2.4.4 Step 3: Choose a Database Administrator Authentication Method → … Decide on an authentication method. You can be authenticated as an administrator with the required … privileges in the following ways: With a password file With operating system authentication To be … Maintaining a Database Password File \". To be authenticated with operating system authentication, ensure that … Administrator
Configuring Password Protection → You can secure user passwords in a variety of ways, such as controlling the password creation requirements or using password management policies. Topics: What Are the Oracle Database Built-in Password Protections? Minimum Requirements for Passwords Creating a Password by Using the IDENTIFIED BY Clause Using a Password Management Policy Managing the Complexity of Passwords Managing Password Case Sensitivity
Table 3-1 Password-Specific Settings in the Default Profile → initialization parameter. See Configuration of the Maximum Number of Authentication Attempts for more information
Table 3-2 Parameters Controlling Reuse of a Previous Password → Disabling and Enabling the Default Password Security Settings Oracle provides scripts that you can use to disable and enable the default password security settings. If your applications use the default password security settings from Oracle Database 10 g release 2 (10.2), then you can revert to these settings until you modify the applications to use the default password security settings from Oracle
Ensuring Against Password Security Threats by Using the 12C Password Version → SEC_CASE_SENSITIVE_LOGON Parameter and Password Case Sensitivity The SEC_CASE_SENSITIVE_LOGON initialization parameter controls the use of case sensitivity in passwords. Only users who have the ALTER SYSTEM privilege can set the SEC_CASE_SENSITIVE_LOGON parameter. You should ensure that this parameter is set to TRUE so that case sensitivity is enforced when a user enters a password. However, you should
Managing the Secure External Password Store for Password Credentials → try to provision a fake server in an attempt to downgrade the authentication and trick the client
You can configure a client to use the secure external password store feature by using the mkstore command-line… → Example: Sample SQLNET.ORA File with Wallet Parameters Set You can set special parameters in the sqlnet.ora file to control how wallets are managed. Example 3-2 shows a sample sqlnet.ora file with the WALLET_LOCATION and the SQLNET.WALLET_OVERRIDE parameters set as described in Steps 3 and 4 of Configuring a Client to Use the External Password Store. Example 3-2 Sample SQLNET.ORA File with Wallet
Authentication of User Logins By Using the Operating System → authentication is the default. This restriction prevents a remote user from impersonating another operating … as PCs, are not trusted to perform operating system authentication properly, it is very poor … secure configuration that enforces proper, server-based authentication of clients connecting to an … authentication
The CREATE USER statement enables you to create the several types of user accounts, all of which can… → statement Using Proxy Authentication with the Secure External Password Store Use a secure external … password store if you are concerned about the password used in proxy authentication being obtained by a … authentication to store the password credentials in a wallet. Connecting to Oracle Database using proxy … authentication
User Authentication Data Dictionary Views → : SHUTDOWN IMMEDIATE STARTUP User Authentication Data Dictionary Views Oracle Database provides data … dictionary views that list information about user authentication, such as roles that users have or profiles … Oracle Database Reference. Table 3-3 Data Dictionary Views That Describe User Authentication View … DBA_ROLES Displays