How do I narrow my search results?
After you submit your search query:
- On the Refine Search results page, select one or more categories of products or services from the left sidebar.
- Then for a category with search results, click Select to choose your product and release filters, and then click OK.
For search queries that contain multiple words, surround the query with quotes, and then resubmit your query. Example: "database cloud service"
How do I find the documentation for my product or service?
From the home page, click the technology categories for your products or services. If you do not know which category to pick, try the following features:
- Click the Find a product tab and search for your product or service.
- Click Browse All Products & Services at the bottom of the home page to view an alphabetical listing of products and services.
- Apple Safari: Version 6
- Google Chrome: Version 29 and later
- Mozilla Firefox: Version 24 and later
- Microsoft Internet Explorer: Version 9 and later
Authentication Without Passwords → When using a connected user or current user database link, you can use an external authentication … source such as Kerberos to obtain end-to-end security. In end-to-end authentication, credentials are
Using Operating System Authentication → This section describes how to authenticate an administrator using the operating system.
Using Password File Authentication → This section describes how to authenticate an administrative user using password file authentication.
Database Administrator Authentication → secure authentication scheme. This section contains the following topics: Administrative Privileges … Selecting an Authentication Method for Database Administrators Using Operating System Authentication Using Password File Authentication
Authentication Through Database Links → Database links are either private or public, authenticated or non-authenticated. You create public links by specifying the PUBLIC keyword in the link creation statement. For example, you can issue: CREATE PUBLIC DATABASE LINK foo USING 'sales'; You create authenticated links by specifying the CONNECT TO clause, AUTHENTICATED BY clause, or both clauses together in the database link creation statement.
Connecting Using Operating System Authentication → Windows platform only, remote operating system authentication over a secure connection is supported
Connecting Using Password File Authentication → SYSOPER Note: Operating system authentication takes precedence over password file authentication
OSDBA and OSOPER → system authentication. These groups are generically referred to as OSDBA and OSOPER. The groups are
Local Connections and Secure Remote Connections → therefore not in the password file, you can use operating system authentication. On most operating … systems, authentication for database administrators involves placing the operating system username
SYSDBA and SYSOPER → are authorized to use these privileges depends upon the method of authentication that you use. When
Preparing to Use Password File Authentication → To enable authentication of an administrative user using password file authentication you must do
Connecting with Administrative Privileges: Example → Operating System Authentication\" \"Using Password File Authentication\"
Nonsecure Remote Connections → authenticated by a password file. When using password file authentication, the database uses a password … . This form of authentication is discussed in \"Using Password File Authentication\".
Selecting an Authentication Method for Database Administrators → normal data dictionary authentication, the following methods are available for authenticating database … administrators with the SYSDBA or SYSOPER privilege: Operating system (OS) authentication A password … file Strong authentication with a network-based authentication service, such as Oracle Internet … remainder
Administrative Privileges → Administrative privileges that are required for an administrator to perform basic database operations are granted through two special system privileges, SYSDBA and SYSOPER. You must have one of these privileges granted to you, depending upon the level of authorization you require. Note: The SYSDBA and SYSOPER system privileges allow access to a database instance even when the database is not open.
Preparing to Use Operating System Authentication → To enable operating system authentication of an administrative user: Create an operating system
Authentication → Use this page to enter authentication information that applies to all data sources. Note: The data … source specific authentication takes precedence over this global authentication. HTTP Authentication … Oracle Ultra Search supports both basic and digest authentication. Specify the user name and
About Authentication → Authentication means verifying the identity of someone (a user, device, or other entity) who wants … for further interactions. Authentication also enables accountability by making it possible to link … access and actions to specific identities. After authentication, authorization processes can allow or … and nondatabase users
Step 3: Choose a Database Administrator Authentication Method → password file With operating system authentication In this step, you decide on an authentication … authentication, ensure that you log in to the host computer with a user account that is a member of the … Privileges\" \"Database Administrator Authentication\" for information about password files and operating system
Creating a User Who Is Authenticated by the Database → The following SQL statement creates a user who is identified and authenticated by Oracle Database. User sebastian must specify the assigned password whenever he connects to Oracle Database. CREATE USER sebastian IDENTIFIED BY password;
Using the Operating System to Authenticate Users → / With control over user authentication centralized in the operating system, Oracle Database need not … information about authentication, operating systems, distributed database concepts, and distributed data
Configuring Global User Authentication and Authorization → : \"Strong Authentication and Centralized Management for Database Administrators\" if you want to centralize the management of SYSDBA or SYSOPER access
About External Authentication → When you use external authentication for user accounts, Oracle Database maintains the user account … , but an external service performs the password administration and user authentication. This external … authentication, your database relies on the underlying operating system or network authentication service
Using Client Identifiers to Identify Application Users Not Known to the Database → Oracle Database provides the CLIENT_IDENTIFIER attribute of the built-in USERENV application context namespace for application users. These users are known to an application but unknown to the database. The CLIENT_IDENTIFIER attribute can capture any value that the application uses for identification or access control, and passes it to the database. The CLIENT_IDENTIFIER attribute is supported in
3 Configuring Authentication → This chapter contains: About Authentication Configuring Password Protection Authenticating Database … Users Using the Network to Authenticate Users Configuring Global User Authentication and … Authentication and Authorization Preserving User Identity in Multitiered Environments Finding Information About User Authentication
Table 3-1 Password-Specific Settings in the Default Profile → \"Configuring the Maximum Number of Authentication Attempts\" for more information about this parameter. See
Using Multitier Authentication and Authorization → Interface to create lightweight sessions, which enable database password authentication for each
Finding Information About User Authentication → Table 3-3 lists data dictionary views that contain information about user authentication. For
Configuring Password Protection → This section contains: What Are the Oracle Database Built-in Password Protections? Minimum Requirements for Passwords Using a Password Management Policy Ensuring Against Password Security Threats by Using the SHA-1 Hashing Algorithm Managing the Secure External Password Store for Password Credentials See also \"Guidelines for Securing Passwords\" for advice on securing passwords. If you want to configure
What Are the Oracle Database Built-in Password Protections? → Oracle Database provides a set of built-in password protections designed to protect your users' passwords. These password protections are as follows: Password encryption. Oracle Database automatically and transparently encrypts passwords during network (client-to-server and server-to-server) connections, using Advanced Encryption Standard (AES) before sending them across the network. Password complexity
Minimum Requirements for Passwords → Passwords must not exceed 30 characters. For greater security, however, follow the additional guidelines described in \"Guidelines for Securing Passwords\". To create passwords for users, you can use the CREATE USER or ALTER USER SQL statements. SQL statements that accept the IDENTIFIED BY clause also enable you to create passwords. Example 3-1 shows several SQL statements that create passwords with
Using a Password Management Policy → This section contains: About Managing Passwords Finding User Accounts That Have Default Passwords Configuring Password Settings in the Default Profile Automatically Locking a User Account After a Failed Login Controlling Password Aging and Expiration Password Change Life Cycle Controlling User Ability to Reuse Previous Passwords Enforcing Password Complexity Verification Enabling or Disabling Password
Table 3-2 Parameters Controlling Reuse of a Previous Password → current, correct password before the authentication can proceed. If the user has an Oracle Active Data … Guard configuration, where there is a primary and a stand-by database, and the authentication attempt
Strong Authentication and Centralized Management for Database Administrators → Strong authentication lets you centrally control SYSDBA and SYSOPER access to multiple databases … . Consider using this type of authentication for database administration for the following situations … Authentication for Administrative Users Configuring Kerberos Authentication for Administrative Users … Configuring
Authenticating Database Administrators by Using the Operating System → Operating system authentication for a database administrator typically involves establishing a … Windows native authentication. If these users work with Oracle Database using their domain accounts … : Your Oracle Database operating system-specific documentation for information about configuring operating system authentication of database
Creating a User Who Is Authorized by a Directory Service → You have the following options to specify users who are authorized by a directory service: Creating a Global User Who Has a Private Schema Creating Multiple Enterprise Users Who Share Schemas Creating a Global User Who Has a Private Schema The following statement shows the creation of a global user with a private schema, authenticated by SSL, and authorized by the enterprise directory service: CREATE
Advantages of Global Authentication and Global Authorization → Some advantages of global user authentication and authorization are as follows: Provides strong … authentication using SSL, Kerberos, or Windows native authentication. Enables centralized management of … . Because global user authentication and authorization provide password-based access, you can migrate … Utility)
Authentication User Logins Using Network Authentication → Oracle Advanced Security performs network authentication, which you can configure to use a third … authentication service, then the REMOTE_OS_AUTHENT parameter setting is irrelevant, because Oracle Advanced Security allows only secure connections.
Authenticating Database Administrators on Windows Systems → Windows native authentication. If these users work with Oracle Database using their domain accounts
Authentication Using Third-Party Services → You need to use third-party network authentication services if you want to authenticate Oracle … RADIUS (Remote Authentication Dial-In User Service), and directory-based services, as described in … the following sections. If network authentication services are available to you, then Oracle … Database can accept authentication
Creating a User Who Is Authenticated Externally → authentication when it provides that specific operating system user with access to the database resources of … a specific user. See Also: Oracle Database Advanced Security Administrator's Guide for more information about external authentication
Authenticating User Logins Using the Operating System → system authentication properly, it is very poor security practice to turn on this feature. The default … -based authentication of clients connecting to an Oracle database. Any change to this parameter … takes effect the next time you start the instance and mount the database. Generally, user authentication
Preserving User Identity in Multitiered Environments → Figure 3-2 Multitier Authentication The following actions take place: The user logs on using a … password or Secure Sockets Layer. The authentication information is passed through Oracle Application … the middle tier of an application: Using a Middle Tier Server for Proxy Authentication Using Client
Table 3-3 Data Dictionary Views That Describe User Authentication → View Description DBA_ROLES Displays the kind of authentication used for a database role to log in … user information, displays the following: The kind of authentication the user used to log in to the
Authenticating Database Administrators → following methods to secure the authentication of database administrators who have either SYSDBA or … SYSOPER privileges: Strong Authentication and Centralized Management for Database Administrators
Authentication Using Secure Sockets Layer → authentication to a database, and it is independent of global user management in Oracle Internet
Configuring an External Service to Authenticate Users and Passwords → This section contains: About External Authentication Advantages of External Authentication Creating … a User Who Is Authenticated Externally Authenticating User Logins Using the Operating System Authentication User Logins Using Network Authentication
Administration and Security in Clients, Application Servers, and Database Servers → client. Authentication in a multitier environment is based on trust regions. Client authentication is … connect on behalf of the user and thus to use these roles as the user could Figure 3-2 shows an example of multitier authentication.
Using the Database to Authenticate Users → This section contains: About Database Authentication Advantages of Database Authentication Creating a User Who Is Authenticated by the Database
Advantages of Database Authentication → The advantages of database authentication are as follows: User accounts and all authentication are … authentication. It is easier to administer when there are small user communities.
Advantages of External Authentication → The advantages of external authentication are as follows: More choices of authentication mechanisms … authentication services, such as Kerberos support single sign-on, enabling users to have fewer … passwords to remember. If you are already using an external mechanism for authentication, such as one of
Using a Middle Tier Server for Proxy Authentication → Oracle Database provides proxy authentication in Oracle Call Interface (OCI), JDBC/OCI, or JDBC … how to use proxy authentication: About Proxy Authentication Advantages of Proxy Authentication Who … Them Using Proxy Authentication with the Secure External Password Store Passing Through the … Identity
Ensuring Against Password Security Threats by Using the SHA-1 Hashing Algorithm → intruder learns this secret, then the protection of the authentication is immediately and severely … trustworthy if the integrity of the database password-based authentication is to be preserved. If you cannot
Authenticating Database Administrators by Using Their Passwords → file to SHARED. Password file-based authentication is enabled by default. This means that the … privileges. Password file based authentication is activated as soon as you create a password file using … risks. For this reason, consider using the authentication methods described in \"Strong … Authentication and
Managing the Secure External Password Store for Password Credentials → that stores authentication and signing credentials. This wallet usage can simplify large-scale … : \"Using Proxy Authentication with the Secure External Password Store\" Oracle Database Advanced … the External Password Store If your client is already configured to use external authentication, such … as Windows native authentication
About Database Authentication → stored in that database itself. To configure Oracle Database to use database authentication, you must … stores user passwords in the data dictionary in an encrypted format. To identify the authentication … , authentication fails with an ORA-28040 error. The parameter can take the values 11, 10, 9, or 8. The … Oracle database using
Using the Network to Authenticate Users → … Authentication Using Secure Sockets Layer Authentication Using Third-Party Services
Authentication by Oracle Database → stored in that database. To set up Oracle Database to use database authentication, create each user … . Database authentication includes the following facilities: Password Encryption Account Locking Password
Multitier Authentication and Authorization → authentication for each user. This preserves the identity of the real user through the middle tier without … database connections. Server-side connection pooling supports only password based authentication
Overview of Authentication Methods → Authentication means verifying the identity of someone (a user, device, or other entity) who wants … for further interactions. Authentication also enables accountability by making it possible to link … access and actions to specific identities. After authentication, authorization processes can allow or … authentication