You are using an outdated browser. Please upgrade to the latest version for the best experience.
How do I narrow my search results?

After you submit your search query:

  1. On the Refine Search results page, select one or more categories of products or services from the left sidebar.
  2. Then for a category with search results, click Select to choose your product and release filters, and then click OK.

For search queries that contain multiple words, surround the query with quotes, and then resubmit your query. Example: "database cloud service"

How do I find the documentation for my product or service?

From the home page, click the technology categories for your products or services. If you do not know which category to pick, try the following features:

  • Click the Find a product tab and search for your product or service.
  • Click Browse All Products & Services at the bottom of the home page to view an alphabetical listing of products and services.
  • Apple Safari: Version 6
  • Google Chrome: Version 29 and later
  • Mozilla Firefox: Version 24 and later
  • Microsoft Internet Explorer: Version 9 and later
Results for security


1 to 20 of 5024 results. Previous page Prev  Next next page
Results per page:   20  | 40 | 60


Database Security Guide, 11g Release 2 (11.2)

Database Security Guide - Contents

ContentsDocumentation Accessibility Related Documents Conventions What's New in Oracle Database Security … ? Oracle Database 11 g Release 2 (11.2.0.2) New Security Features Oracle Database 11 g Release 2 (11.2.0.1 … ) New Security Features Oracle Database 11 g Release 1 (11.1) New Security Features 1 Introducing … Oracle

Label Security Administrator's Guide, 11g Release 2 (11.2)

Label Security Administrator's Guide - Contents

ContentsAccessibility Related Documentation Conventions Part I 1 Introduction to Oracle Label Security 1.1 … Computer Security and Data Access Controls 1.1.1 Oracle Label Security and Security Standards 1.1.2 … Security Policies 1.1.3 Access Control 1.1.3.1 Discretionary Access Control 1.1.3.2 Oracle Label Security

Database Administrator's Guide, 11g Release 2 (11.2)

Getting Started with Database Administration

Security OfficersIn some cases, a site assigns one or more security officers to a database. A security officer … enrolls users, controls and monitors user access to the database, and maintains system security. As a DBA … , you might not be responsible for these duties if your site has a separate security officer. See … Oracle

Automatic Storage Management Administrator's Guide, 11g Release 2 (11.2)

Introduction to Oracle ACFS

Oracle ACFS SecurityOracle ACFS security provides realm-based security for Oracle ACFS file systems, enabling you to … create realms to specify security policies for users and groups to determine access on file system … objects. This security feature provides a finer-grained access control on top of the access control … provided

Database Administrator's Guide, 11g Release 2 (11.2)

Administering Oracle Scheduler

Managing Scheduler SecurityManaging Sched uler Security You should grant the CREATE JOB system privilege to regular users who … particularly important issue from a security point of view is handling external jobs. Only users that … EXTERNAL JOB system privilege to those users. Security for the Scheduler has no other special … requirements. See Oracle Database

Database Administrator's Guide, 11g Release 2 (11.2)

Creating and Configuring an Oracle Database

Some Security ConsiderationsIn this release of Oracle Database, several enhancements were made to ensure the security your … database. You can find security guidelines for this release in Oracle Database Security Guide. Oracle … how to do this, see Oracle Database Enterprise User Security Administrator's Guide. A newly created … Oracle Database

Database Administrator's Guide, 11g Release 2 (11.2)

Distributed Database Concepts

Distributed Database SecurityThe database supports all of the security features that are available with a non-distributed … : Oracle Database Advanced Security Administrator's Guide for more information about external … Authenticated Security Access Private No When connecting to the remote database, the database uses security … obtain end-to-end

Automatic Storage Management Administrator's Guide, 11g Release 2 (11.2)

Oracle ACFS Command-Line Tools for Security

Oracle ACFS Command-Line Tools for SecurityTable 13-40 contains a summary of the commands for Oracle ACFS security. You can run acfsutil help … system can be a drive letter or a directory including the drive letter. Table 13-40 Summary of commands for Oracle ACFS security

Database SQL Language Reference, 11g Release 2 (11.2)

Data Type Comparison Rules

Security Considerations for Data Conversioncan have a negative impact on database security when conversion without an explicit format model is … recommendations on avoiding this security risk Note: This security risk also applies to middle-tier

Automatic Storage Management Administrator's Guide, 11g Release 2 (11.2)

Introduction to Oracle ACFS

Oracle ACFS and File Access and Administration Security) for Linux and UNIX platforms and the Windows Security Model including file access control lists (ACLs … systems with the security infrastructure feature. For information about Oracle ACFS security … infrastructure, refer to \"Oracle ACFS Security\". For information about Oracle ACFS encryption, refer to

Database Installation Guide for Linux, 11g Release 2 (11.2)

Installing Oracle Database

4.4 Database Security OptionsDuring installation, you are prompted to select a database security configuration. The Secure … Release 2 (11.2) includes the Secure Configuration option. To disable these enhanced security … controls you can deselect the Assert all new security settings check box in the Specify Configuration … security settings,

Database Administrator's Guide, 11g Release 2 (11.2)

Getting Started with Database Administration

About Database Administrator Security and PrivilegesTo perform the administrative tasks of an Oracle Database DBA, you need specific privileges within the database and possibly in the operating system of the server on which the database runs. Access to a database administrator's account should be tightly controlled. This section contains the following topics: The Database Administrator's Operating System Account Administrative User Accounts

Application Express Application Builder User's Guide, 11g Release 2 (11.2)

Editing Page Attributes

Securitycurrent page. Table 5-6 describes these attributes. Table 5-6 Page Attributes: Security Attribute … will not display and an error message displays. See Also: \"Providing Security Through Authorization

Application Express Application Builder User's Guide, 11g Release 2 (11.2)

Working with Shared Components

SecurityThe following section describes the links under Security. Authentication Schemes Authentication is … predefined user privileges. See \"Providing Security Through Authorization\". Session State Protection … , and information privacy. See \"Understanding Session State Protection\". Edit Security Attributes Use … the Edit Security

Application Express Application Builder User's Guide, 11g Release 2 (11.2)

Editing a Page Definition

SecuritySecu rity You can provide security for your application by specifying an authorization scheme … . Authorization is a broad term for controlling access to resources based on user privileges. See Also: \"Providing Security Through Authorization\"

OLAP User's Guide, 11g Release 2 (11.2)

Overview

SecurityWith Oracle OLAP, standard Oracle Database security features are used to secure your … multidimensional data. In contrast, with a standalone OLAP server, administrators must manage security twice: once … the security of data in transit from the relational system to the standalone OLAP system.

Database PL/SQL Packages and Types Reference, 11g Release 2 (11.2)

DBMS_XDBZ

Security ModelOwned by XDB, the DBMS_XDBZ package must be created by SYS or XDB. The EXECUTE privilege is granted to PUBLIC. Subprograms in this package are executed using the privileges of the current user.

Database PL/SQL Packages and Types Reference, 11g Release 2 (11.2)

DBMS_WORKLOAD_REPLAY

Security ModelThe following code describes the minimum set of privileges required to Create directory objects Operate the interface provided by the DBMS_WORKLOAD_CAPTURE and DBMS_WORKLOAD_REPLAY packages Act as a replay client user (wrc someuser / somepassword or wrc USER=someuser PASSWORD=somepassword ) DROP USER rom1 CASCADE; CREATE USER rom1 IDENTIFIED BY rom1; GRANT EXECUTE ON DBMS_WORKLOAD_CAPTURE TO rom1;

Database PL/SQL Packages and Types Reference, 11g Release 2 (11.2)

DBMS_STREAMS_HANDLER_ADM

Security ModelSecurity on this package can be controlled in either of the following ways: Granting EXECUTE on

Database PL/SQL Packages and Types Reference, 11g Release 2 (11.2)

DBMS_LIBCACHE

Security Modelobjects with access granted though roles. This is a standard PL/SQL security limitation.