You are using an outdated browser. Please upgrade to the latest version for the best experience.
How do I narrow my search results?

After you submit your search query:

  1. On the Refine Search results page, select one or more categories of products or services from the left sidebar.
  2. Then for a category with search results, click Select to choose your product and release filters, and then click OK.

For search queries that contain multiple words, surround the query with quotes, and then resubmit your query. Example: "database cloud service"

How do I find the documentation for my product or service?

From the home page, click the technology categories for your products or services. If you do not know which category to pick, try the following features:

  • Click the Find a product tab and search for your product or service.
  • Click Browse All Products & Services at the bottom of the home page to view an alphabetical listing of products and services.
  • Apple Safari: Version 6
  • Google Chrome: Version 29 and later
  • Mozilla Firefox: Version 24 and later
  • Microsoft Internet Explorer: Version 9 and later
Results for security


1 to 20 of 4163 results. Previous page Prev  Next next page
Results per page:   20  | 40 | 60


Database Security Guide, 11g Release 1 (11.1)

Database Security Guide - Contents

ContentsDocumentation Accessibility Related Documents Conventions What's New in Oracle Database Security … Network Services on the Database Change to AUDIT BY SESSION Oracle XML DB Security Enhancements … Directory Security Enhancements Oracle Call Interface Security Enhancements 1 Introducing Oracle Database … Security

Label Security Administrator's Guide, 11g Release 1 (11.1)

Label Security Administrator's Guide - Contents

ContentsAccessibility Related Documentation Conventions Part I 1 Introduction to Oracle Label Security 1.1 … Computer Security and Data Access Controls 1.1.1 Oracle Label Security and Security Standards 1.1.2 … Security Policies 1.1.3 Access Control 1.1.3.1 Discretionary Access Control 1.1.3.2 Oracle Label Security

Database Administrator's Guide, 11g Release 1 (11.1)

Types of Oracle Database Users

Security OfficersIn some cases, a site assigns one or more security officers to a database. A security officer … enrolls users, controls and monitors user access to the database, and maintains system security. As a DBA … , you might not be responsible for these duties if your site has a separate security officer. Please … refer

Database PL/SQL Language Reference, 11g Release 1 (11.1)

Overview of PL/SQL

Tight SecurityPL/SQL stored subprograms move application code from the client to the server, where you can protect it from tampering, hide the internal details, and restrict who has access. For example, you can grant users access to a subprogram that updates a table, but not grant them access to the table itself or to the text of the UPDATE statement. Triggers written in PL/SQL can control or record changes to

Database Concepts, 11g Release 1 (11.1)

Business Intelligence

Securityserver, load and rebuild the cube. The administrator must take responsibility for the security of the … intervals, and Oracle Database takes care of everything else. Security

Database Administrator's Guide, 11g Release 1 (11.1)

Considerations After Creating a Database

Some Security ConsiderationsIn this release of Oracle Database, several enhancements were made to ensure the security your … database. You can find security guidelines for this release in Oracle Database Security Guide. Oracle … how to do this, please refer to Oracle Database Enterprise User Security Administrator's Guide. A … accounts.

Database Administrator's Guide, 11g Release 1 (11.1)

Distributed Database Administration

Distributed Database SecurityThe database supports all of the security features that are available with a non-distributed … Management Data Encryption See Also: Oracle Database Advanced Security Administrator's Guide for more information about external authentication

Database Administrator's Guide, 11g Release 1 (11.1)

Monitoring and Managing the Scheduler

Managing Scheduler SecurityManaging Sched uler Security You should grant the CREATE JOB system privilege to regular users who … . A particularly important issue from a security point of view is handling external jobs. Only users … . Security for the Scheduler has no other special requirements. See Oracle Database Security Guide … for details

Database SQL Language Reference, 11g Release 1 (11.1)

Datatype Comparison Rules

Security Considerations for Data Conversioncan have a negative impact on database security when conversion without an explicit format model is … avoiding this security risk Note: This security risk also applies to middle-tier applications that

Database Installation Guide for Linux, 11g Release 1 (11.1)

Installing Oracle Database

3.4 Database Security OptionsDuring installation, you are prompted to select a database security configuration. The Secure … security controls, then you can check the Disable security settings box. Oracle Database is then … security settings by starting Database Configuration Assistant and modifying security settings. You can

Database Administrator's Guide, 11g Release 1 (11.1)

About Database Administrator Security and Privileges

About Database Administrator Security and PrivilegesTo perform the administrative tasks of an Oracle Database DBA, you need specific privileges within the database and possibly in the operating system of the server on which the database runs. Access to a database administrator's account should be tightly controlled. This section contains the following topics: The Database Administrator's Operating System Account Administrative User Accounts

OLAP User's Guide, 11g Release 1 (11.1)

Overview

SecurityWith Oracle OLAP, standard Oracle Database security features are used to secure your … multidimensional data. In contrast, with a stand-alone OLAP server, administrators must manage security twice … manage the security of data in transit from the relational system to the stand-alone OLAP system.

Database PL/SQL Packages and Types Reference, 11g Release 1 (11.1)

DBMS_RESOURCE_MANAGER

Security ModelThe invoker must have the ADMINISTER_RESOURCE_MANAGER system privilege to execute these procedures. The procedures to grant and revoke this privilege are in the package Chapter 106, \"DBMS_RESOURCE_MANAGER_PRIVS\".

Database PL/SQL Packages and Types Reference, 11g Release 1 (11.1)

DBMS_LOCK

Security ModelThere might be operating system-specific limits on the maximum number of total locks available. This must be considered when using locks or making this package available to other users. Consider granting the EXECUTE privilege only to specific users or roles. A better alternative would be to create a cover package limiting the number of locks used and grant EXECUTE privilege to specific users. An example

Database PL/SQL Packages and Types Reference, 11g Release 1 (11.1)

UTL_LMS

Security ModelThis package must be created as the user SYS.

Database PL/SQL Packages and Types Reference, 11g Release 1 (11.1)

DBMS_TRACE

Security ModelThis package must be created under SYS.

Database PL/SQL Packages and Types Reference, 11g Release 1 (11.1)

DBMS_SQLTUNE

Security ModelThis package is available to PUBLIC and performs its own security checking: As the SQL Tuning

Database PL/SQL Packages and Types Reference, 11g Release 1 (11.1)

DBMS_SQLPA

Security ModelThis package is available to PUBLIC and performs its own security checking. All analysis task

Database PL/SQL Packages and Types Reference, 11g Release 1 (11.1)

DBMS_TTS

Security ModelOnly users having the execute_catalog_role can execute this procedure. This role is initially only assigned to user SYS.

Database PL/SQL Packages and Types Reference, 11g Release 1 (11.1)

DBMS_PIPE

Security ModelSecurity can be achieved by use of GRANT EXECUTE on the DBMS_PIPE package by creating a pipe using … particular features or pipenames to particular users or roles. Depending upon your security