You are using an outdated browser. Please upgrade to the latest version for the best experience.
How do I narrow my search results?

After you submit your search query:

  1. On the Refine Search results page, select one or more categories of products or services from the left sidebar.
  2. Then for a category with search results, click Select to choose your product and release filters, and then click OK.

For search queries that contain multiple words, surround the query with quotes, and then resubmit your query. Example: "database cloud service"

How do I find the documentation for my product or service?

From the home page, click the technology categories for your products or services. If you do not know which category to pick, try the following features:

  • Click the Find a product tab and search for your product or service.
  • Click Browse All Products & Services at the bottom of the home page to view an alphabetical listing of products and services.
  • Apple Safari: Version 6
  • Google Chrome: Version 29 and later
  • Mozilla Firefox: Version 24 and later
  • Microsoft Internet Explorer: Version 9 and later
Results for authentication


1 to 20 of 1441 results. Previous page Prev  Next next page
Results per page:   20  | 40 | 60


Database Concepts, 12c Release 1 (12.1)

Topics for Database Administrators and Developers

Database AuthenticationIn Oracle Database, database authentication is the process by which a user presents credentials to … identity establishes a trust relationship for further interactions. Authentication also enables … provides different authentication methods, including the following: Authentication by the database Oracle … supports

Database Administrator's Guide, 12c Release 1 (12.1)

Getting Started with Database Administration

1.6 Database Administrator Authentication… Because only a DBA should perform these operations, the database administrator user names require a secure authentication scheme.

Automatic Storage Management Administrator's Guide, 12c Release 1 (12.1)

Authentication for Accessing Oracle ASM Instances

Authentication for Accessing Oracle ASM Instancesmodes of connecting to Oracle ASM instances: Local connection using operating system authentication … Local connection using password authentication Remote connection by way of Oracle Net Services using … password authentication See Also: Your operating system-specific Oracle Grid Infrastructure … Users with the SYSASM Privilege

Automatic Storage Management Administrator's Guide, 12c Release 1 (12.1)

Operating System Authentication for Oracle ASM

Operating System Authentication for Oracle ASMauthentication for the SYSASM system privilege. OSASM is provided exclusively for Oracle ASM … , and ASMCA use operating system authentication. See Also: Oracle Database Administrator's Guide for … more information about using operating system authentication Oracle Grid Infrastructure Installation

Automatic Storage Management Administrator's Guide, 12c Release 1 (12.1)

Password File Authentication for Oracle ASM

Password File Authentication for Oracle ASMPassword file authentication for Oracle ASM can work both locally and remotely. To enable password … file authentication, you must create a password file for Oracle ASM. If you select the Oracle ASM … password file authentication. See Also: Oracle Database Administrator's Guide for information about

Database Administrator's Guide, 12c Release 1 (12.1)

Getting Started with Database Administration

1.6.5 Using Password File AuthenticationYou can use password file authentication for an Oracle database instance and for an Oracle

Database Administrator's Guide, 12c Release 1 (12.1)

Getting Started with Database Administration

1.6.4 Using Operating System Authenticationoperating system authentication. On most operating systems, authentication for database administrators … privilege to users. 1.6.4 Using Operating System Authentication Membership in special operating system … database user name and password. This is known as operating system authentication.

Database Administrator's Guide, 12c Release 1 (12.1)

Getting Started with Database Administration

1.6.3 Authentication Methods for Database Administrators) authentication, password files, or strong authentication with a directory-based authentication service, such as Oracle Internet Directory.

Database Security Guide, 12c Release 1 (12.1)

Configuring Authentication

About AuthenticationAuthentication means verifying the identity of a user, device, or other entity who wants to use … interactions. Authentication also enables accountability by making it possible to link access and … actions to specific identities. After authentication, authorization processes can allow or limit the … nondatabase users for an Oracle

Grid Infrastructure Installation Guide for Linux, 12c Release 1 (12.1)

Troubleshooting the Oracle Grid Infrastructure Installation Process

PRVE-0038 : The SSH LoginGraceTime setting, or fatal: Timeout before authenticationavailable space. Oracle recommends that you allocate the entire disk to Oracle ASM. PRVE-0038: The SSH LoginGraceTime setting, or fatal: Timeout before authentication

Database Administrator's Guide, 12c Release 1 (12.1)

Creating and Configuring an Oracle Database

2.4.4 Step 3: Choose a Database Administrator Authentication Method… Decide on an authentication method. You can be authenticated as an administrator with the required … privileges in the following ways: With a password file With operating system authentication To be … Maintaining a Database Password File \". To be authenticated with operating system authentication, ensure that … Administrator

Database Security Guide, 12c Release 1 (12.1)

Configuring Authentication

Configuring Password ProtectionYou can secure user passwords in a variety of ways, such as controlling the password creation requirements or using password management policies. Topics: What Are the Oracle Database Built-in Password Protections? Minimum Requirements for Passwords Creating a Password by Using the IDENTIFIED BY Clause Using a Password Management Policy Managing the Complexity of Passwords Managing Password Case Sensitivity

Database Security Guide, 12c Release 1 (12.1)

Configuring Authentication

Table 3-1 Password-Specific Settings in the Default Profileinitialization parameter. See Configuration of the Maximum Number of Authentication Attempts for more information

Database Security Guide, 12c Release 1 (12.1)

Configuring Authentication

Table 3-2 Parameters Controlling Reuse of a Previous PasswordDisabling and Enabling the Default Password Security Settings Oracle provides scripts that you can use to disable and enable the default password security settings. If your applications use the default password security settings from Oracle Database 10 g release 2 (10.2), then you can revert to these settings until you modify the applications to use the default password security settings from Oracle

Database Security Guide, 12c Release 1 (12.1)

Configuring Authentication

Ensuring Against Password Security Threats by Using the 12C Password VersionSEC_CASE_SENSITIVE_LOGON Parameter and Password Case Sensitivity The SEC_CASE_SENSITIVE_LOGON initialization parameter controls the use of case sensitivity in passwords. Only users who have the ALTER SYSTEM privilege can set the SEC_CASE_SENSITIVE_LOGON parameter. You should ensure that this parameter is set to TRUE so that case sensitivity is enforced when a user enters a password. However, you should

Database Security Guide, 12c Release 1 (12.1)

Configuring Authentication

Managing the Secure External Password Store for Password Credentialstry to provision a fake server in an attempt to downgrade the authentication and trick the client

Database Security Guide, 12c Release 1 (12.1)

Configuring Authentication

You can configure a client to use the secure external password store feature by using the mkstore command-line…Example: Sample SQLNET.ORA File with Wallet Parameters Set You can set special parameters in the sqlnet.ora file to control how wallets are managed. Example 3-2 shows a sample sqlnet.ora file with the WALLET_LOCATION and the SQLNET.WALLET_OVERRIDE parameters set as described in Steps 3 and 4 of Configuring a Client to Use the External Password Store. Example 3-2 Sample SQLNET.ORA File with Wallet

Database Security Guide, 12c Release 1 (12.1)

Configuring Authentication

Authentication of User Logins By Using the Operating Systemauthentication is the default. This restriction prevents a remote user from impersonating another operating … as PCs, are not trusted to perform operating system authentication properly, it is very poor … secure configuration that enforces proper, server-based authentication of clients connecting to an … authentication

Database Security Guide, 12c Release 1 (12.1)

Configuring Authentication

The CREATE USER statement enables you to create the several types of user accounts, all of which can…statement Using Proxy Authentication with the Secure External Password Store Use a secure external … password store if you are concerned about the password used in proxy authentication being obtained by a … authentication to store the password credentials in a wallet. Connecting to Oracle Database using proxy … authentication

Database Security Guide, 12c Release 1 (12.1)

Configuring Authentication

User Authentication Data Dictionary Views: SHUTDOWN IMMEDIATE STARTUP User Authentication Data Dictionary Views Oracle Database provides data … dictionary views that list information about user authentication, such as roles that users have or profiles … Oracle Database Reference. Table 3-3 Data Dictionary Views That Describe User Authentication View … DBA_ROLES Displays