You are using an outdated browser. Please upgrade to the latest version for the best experience.
How do I narrow my search results?

After you submit your search query:

  1. On the Refine Search results page, select one or more categories of products or services from the left sidebar.
  2. Then for a category with search results, click Select to choose your product and release filters, and then click OK.

For search queries that contain multiple words, surround the query with quotes, and then resubmit your query. Example: "database cloud service"

How do I find the documentation for my product or service?

From the home page, click the technology categories for your products or services. If you do not know which category to pick, try the following features:

  • Click the Find a product tab and search for your product or service.
  • Click Browse All Products & Services at the bottom of the home page to view an alphabetical listing of products and services.
  • Apple Safari: Version 6
  • Google Chrome: Version 29 and later
  • Mozilla Firefox: Version 24 and later
  • Microsoft Internet Explorer: Version 9 and later
Results for authentication


21 to 40 of 1159 results. previous page Prev  Next next page
Results per page:   20  | 40 | 60


Database Security Guide, 11g Release 1 (11.1)

Configuring Authentication

Using the Operating System to Authenticate Users/ With control over user authentication centralized in the operating system, Oracle Database need not … information about authentication, operating systems, distributed database concepts, and distributed data

Database Security Guide, 11g Release 1 (11.1)

Configuring Authentication

Configuring Global User Authentication and Authorization: \"Strong Authentication and Centralized Management for Database Administrators\" if you want to centralize the management of SYSDBA or SYSOPER access

Database Security Guide, 11g Release 1 (11.1)

Configuring Authentication

About External AuthenticationWhen you use external authentication for user accounts, Oracle Database maintains the user account … , but an external service performs the password administration and user authentication. This external … authentication, your database relies on the underlying operating system or network authentication service

Database Security Guide, 11g Release 1 (11.1)

Configuring Authentication

Using Client Identifiers to Identify Application Users Not Known to the DatabaseOracle Database provides the CLIENT_IDENTIFIER attribute of the built-in USERENV application context namespace for application users. These users are known to an application but unknown to the database. The CLIENT_IDENTIFIER attribute can capture any value that the application uses for identification or access control, and passes it to the database. The CLIENT_IDENTIFIER attribute is supported in

Database Security Guide, 11g Release 1 (11.1)

Configuring Authentication

3 Configuring AuthenticationThis chapter contains: About Authentication Configuring Password Protection Authenticating Database … Users Using the Network to Authenticate Users Configuring Global User Authentication and … Authentication and Authorization Preserving User Identity in Multitiered Environments Finding Information About User Authentication

Database Security Guide, 11g Release 1 (11.1)

Configuring Authentication

Table 3-1 Password-Specific Settings in the Default Profile\"Configuring the Maximum Number of Authentication Attempts\" for more information about this parameter. See

Database Security Guide, 11g Release 1 (11.1)

Configuring Authentication

Using Multitier Authentication and AuthorizationInterface to create lightweight sessions, which enable database password authentication for each

Database Security Guide, 11g Release 1 (11.1)

Configuring Authentication

Finding Information About User AuthenticationTable 3-3 lists data dictionary views that contain information about user authentication. For

Database Security Guide, 11g Release 1 (11.1)

Configuring Authentication

Configuring Password ProtectionThis section contains: What Are the Oracle Database Built-in Password Protections? Minimum Requirements for Passwords Using a Password Management Policy Ensuring Against Password Security Threats by Using the SHA-1 Hashing Algorithm Managing the Secure External Password Store for Password Credentials See also \"Guidelines for Securing Passwords\" for advice on securing passwords. If you want to configure

Database Security Guide, 11g Release 1 (11.1)

Configuring Authentication

What Are the Oracle Database Built-in Password Protections?Oracle Database provides a set of built-in password protections designed to protect your users' passwords. These password protections are as follows: Password encryption. Oracle Database automatically and transparently encrypts passwords during network (client-to-server and server-to-server) connections, using Advanced Encryption Standard (AES) before sending them across the network. Password complexity

Database Security Guide, 11g Release 1 (11.1)

Configuring Authentication

Minimum Requirements for PasswordsPasswords must not exceed 30 characters. For greater security, however, follow the additional guidelines described in \"Guidelines for Securing Passwords\". To create passwords for users, you can use the CREATE USER or ALTER USER SQL statements. SQL statements that accept the IDENTIFIED BY clause also enable you to create passwords. Example 3-1 shows several SQL statements that create passwords with

Database Security Guide, 11g Release 1 (11.1)

Configuring Authentication

Using a Password Management PolicyThis section contains: About Managing Passwords Finding User Accounts That Have Default Passwords Configuring Password Settings in the Default Profile Automatically Locking a User Account After a Failed Login Controlling Password Aging and Expiration Password Change Life Cycle Controlling User Ability to Reuse Previous Passwords Enforcing Password Complexity Verification Enabling or Disabling Password

Database Security Guide, 11g Release 1 (11.1)

Configuring Authentication

Table 3-2 Parameters Controlling Reuse of a Previous Passwordcurrent, correct password before the authentication can proceed. If the user has an Oracle Active Data … Guard configuration, where there is a primary and a stand-by database, and the authentication attempt

Database Security Guide, 11g Release 1 (11.1)

Configuring Authentication

Strong Authentication and Centralized Management for Database AdministratorsStrong authentication lets you centrally control SYSDBA and SYSOPER access to multiple databases … . Consider using this type of authentication for database administration for the following situations … Authentication for Administrative Users Configuring Kerberos Authentication for Administrative Users … Configuring

Database Security Guide, 11g Release 1 (11.1)

Configuring Authentication

Authenticating Database Administrators by Using the Operating SystemOperating system authentication for a database administrator typically involves establishing a … Windows native authentication. If these users work with Oracle Database using their domain accounts … : Your Oracle Database operating system-specific documentation for information about configuring operating system authentication of database

Database Security Guide, 11g Release 1 (11.1)

Configuring Authentication

Creating a User Who Is Authorized by a Directory ServiceYou have the following options to specify users who are authorized by a directory service: Creating a Global User Who Has a Private Schema Creating Multiple Enterprise Users Who Share Schemas Creating a Global User Who Has a Private Schema The following statement shows the creation of a global user with a private schema, authenticated by SSL, and authorized by the enterprise directory service: CREATE

Database Security Guide, 11g Release 1 (11.1)

Configuring Authentication

Advantages of Global Authentication and Global AuthorizationSome advantages of global user authentication and authorization are as follows: Provides strong … authentication using SSL, Kerberos, or Windows native authentication. Enables centralized management of … . Because global user authentication and authorization provide password-based access, you can migrate … Utility)

Database Security Guide, 11g Release 1 (11.1)

Configuring Authentication

Authentication User Logins Using Network AuthenticationOracle Advanced Security performs network authentication, which you can configure to use a third … authentication service, then the REMOTE_OS_AUTHENT parameter setting is irrelevant, because Oracle Advanced Security allows only secure connections.

Database Security Guide, 11g Release 1 (11.1)

Configuring Authentication

Authenticating Database Administrators on Windows SystemsWindows native authentication. If these users work with Oracle Database using their domain accounts

Database Security Guide, 11g Release 1 (11.1)

Configuring Authentication

Authentication Using Third-Party ServicesYou need to use third-party network authentication services if you want to authenticate Oracle … RADIUS (Remote Authentication Dial-In User Service), and directory-based services, as described in … the following sections. If network authentication services are available to you, then Oracle … Database can accept authentication