Results for security


1 to 60 of 6784 results. Prev  Next
Results per page:  20 | 40 |  60 


Database Security Guide, 12c Release 1 (12.1)

Database Security Guide - Contents

ContentsDocuments Conventions Changes in This Release for Oracle Database Security Guide Changes in Oracle … Database Security 12c Release 1 (12.1.0.2) New Features SHA-2 Support for 12C Password Version … Algorithm Changes in Oracle Database Security 12 c Release 1 (12.1.0.1) New Features Transparent … Ability to Accommodate Invoker's

Label Security Administrator's Guide, 12c Release 1 (12.1)

Label Security Administrator's Guide - Contents

ContentsConventions Changes in This Release for Oracle Label Security Administrator's Guide Changes in … and Downgrade Requirements for Oracle Database Release 12 c (12.1) Oracle Label Security and the … Oracle Multitenant Option Simplified Oracle Label Security Installation Unified Audit Trail and Oracle … Label Security

Automatic Storage Management Administrator's Guide, 12c Release 1 (12.1)

Undoing Oracle ACFS Security

Undoing Oracle ACFS SecurityTo undo preparation for Oracle ACFS security, follow these steps: From the Oracle ASM home page … to unprepare security. Enterprise Manager displays the ASM Cluster File System page for that mount … point. Click the Security/Encryption tab to display the Security Overview section. This page shows … the security

Automatic Storage Management Administrator's Guide, 12c Release 1 (12.1)

Viewing Security Status

Viewing Security StatusTo view security status, follow these steps: From the Oracle ASM home page, select the ASM Cluster … Management Home Page \". Click Show Security and Encryption to display the Security and Encryption section … . The section displays the mount points and the security and encryption settings for each.

Automatic Storage Management Administrator's Guide, 12c Release 1 (12.1)

Initializing Oracle ACFS Security

Initializing Oracle ACFS SecurityOracle ACFS security provides a unified security infrastructure that allows users to define … security policies and groups for accessing file system objects. Oracle ACFS encryption allows users to … store data on disk in an encrypted format. To initialize Oracle ACFS security, follow these steps: From … . Click

Automatic Storage Management Administrator's Guide, 12c Release 1 (12.1)

Oracle ACFS Security

Oracle ACFS SecurityOracle ACFS security provides realm-based security for Oracle ACFS file systems, enabling you to … create realms to specify security policies for users and groups to determine access on file system … objects. This security feature provides a finer-grained access control on top of the access control … provided

Automatic Storage Management Administrator's Guide, 12c Release 1 (12.1)

Enabling Security on Oracle ACFS

Enabling Security on Oracle ACFSTo enable security on Oracle ACFS, follow these steps: From the Oracle ASM home page, select the … security. Enterprise Manager displays the ASM Cluster File System page for that mount point. Click … the Security/Encryption tab to display the Security Overview section. This page shows the security

Automatic Storage Management Administrator's Guide, 12c Release 1 (12.1)

Disabling Security on Oracle ACFS

Disabling Security on Oracle ACFSTo disable security on an Oracle ACFS, follow these steps: From the Oracle ASM home page, select … disable security. Enterprise Manager displays the ASM Cluster File System page for that mount point … . Click the Security/Encryption tab to display the Security Overview section. This page shows the … security

Automatic Storage Management Administrator's Guide, 12c Release 1 (12.1)

Viewing Oracle ACFS Security Administrators

Viewing Oracle ACFS Security AdministratorsTo view Oracle ACFS security administrators, follow these steps: From the Oracle ASM home page … Automatic Storage Management Home Page \". Click Show Security and Encryption to display the Security … and Encryption section. The list of Oracle ACFS security administrators in this cluster is displayed.

Database Administrator's Guide, 12c Release 1 (12.1)

Creating and Configuring an Oracle Database

2.9.1 Some Security ConsiderationsConfigure your database so that it is secure. You can find security guidelines for this release in … Oracle Database Security Guide. Oracle recommends that you read these guidelines and configure your … users SYS and SYSTEM Oracle Database Enterprise User Security Administrator's Guide for information … about Oracle Identity Management

Database Administrator's Guide, 12c Release 1 (12.1)

Administering Oracle Scheduler

30.2.4 Managing Scheduler Security(log_history => 10, job_name => 'job1, sys.class2'); 30.2.4 Managing Scheduler Security You should grant … powerful roles or users. Handling external job is a particularly important issue from a security point … EXTERNAL JOB system privilege that allows them to do so. Security for the Scheduler has no other special … requirements.

Database Administrator's Guide, 12c Release 1 (12.1)

Getting Started with Database Administration

1.1.2 Security OfficersIn some cases, a site assigns one or more security officers to a database. A security officer … enrolls users, controls and monitors user access to the database, and maintains system security. As a DBA … , you might not be responsible for these duties if your site has a separate security officer. See … Oracle

Database Administrator's Guide, 12c Release 1 (12.1)

Distributed Database Concepts

31.3.2 Distributed Database SecurityThe database supports all of the security features that are available with a non-distributed … . See Also: Oracle Database Enterprise User Security Administrator's Guide for more information about external authentication

Automatic Storage Management Administrator's Guide, 12c Release 1 (12.1)

Oracle ACFS Command-Line Tools for Security

Oracle ACFS Command-Line Tools for SecurityTable 16-48 contains a summary of the commands for Oracle ACFS security. For an overview of Oracle … ACFS security, refer to \" Oracle ACFS Security \". You can run acfsutil help on all platforms to … Oracle ACFS security Command Description acfsutil sec admin add Adds a security administrator. acfsutil

Automatic Storage Management Administrator's Guide, 12c Release 1 (12.1)

Changing an Oracle ACFS Security Administrator Password

Changing an Oracle ACFS Security Administrator PasswordTo change an Oracle ACFS security administrator password, follow these steps: From the Oracle ASM … the Oracle Automatic Storage Management Home Page \". Click Show Security and Encryption to display … the Security and Encryption section. The list of Oracle ACFS security administrators in this cluster … is displayed.

Automatic Storage Management Administrator's Guide, 12c Release 1 (12.1)

Using Replication with Auditing, Encryption, and Security

Using Replication with Auditing, Encryption, and SecurityAudited, encrypted, or security realm-secured file systems can be enabled on an Oracle ACFS file … the same auditing, security, or encryption policies as the primary file system. For this replicated … , or security metadata on it. Oracle ACFS does not support using a standby file system that once had … security

Automatic Storage Management Administrator's Guide, 12c Release 1 (12.1)

Preparing an Oracle ACFS For Security

Preparing an Oracle ACFS For SecurityTo prepare an Oracle ACFS for security, follow these steps: From the Oracle ASM home page, select … prepare security. Enterprise Manager displays the ASM Cluster File System page for that mount point … . Click the Security/Encryption tab to display the Security Overview section. This page shows the … security

Automatic Storage Management Administrator's Guide, 12c Release 1 (12.1)

Adding an Oracle ACFS Security Administrator

Adding an Oracle ACFS Security AdministratorTo add an Oracle ACFS security administrator, follow these steps: From the Oracle ASM home page … Automatic Storage Management Home Page \". Click Show Security and Encryption to display the Security … and Encryption section. The list of Oracle ACFS security administrators in this cluster is displayed

Automatic Storage Management Administrator's Guide, 12c Release 1 (12.1)

Deleting an Oracle ACFS Security Administrator

Deleting an Oracle ACFS Security AdministratorTo delete an Oracle ACFS security administrator, follow these steps: From the Oracle ASM home page … Automatic Storage Management Home Page \". Click Show Security and Encryption to display the … Security and Encryption section. The list of Oracle ACFS security administrators in this cluster is displayed. Click the Delete

Automatic Storage Management Administrator's Guide, 12c Release 1 (12.1)

Managing Security Features with Oracle Enterprise Manager

Managing Security Features with Oracle Enterprise ManagerThis section describes how to manage security with Oracle Enterprise Manager. Initializing Oracle … ACFS Security Preparing an Oracle ACFS For Security Undoing Oracle ACFS Security Enabling Security on … Oracle ACFS Disabling Security on Oracle ACFS Viewing Security

Database Administrator's Guide, 12c Release 1 (12.1)

Distributed Database Concepts

Link Type Authenticated Security AccessAuthenticated Security Access Private No When connecting to the remote database, the database uses security

Database SQL Language Reference, 12c Release 1 (12.1)

Data Type Comparison Rules

Security Considerations for Data Conversioncan have a negative impact on database security when conversion without an explicit format model is … recommendations on avoiding this security risk Note: This security risk also applies to middle-tier

Automatic Storage Management Administrator's Guide, 12c Release 1 (12.1)

Oracle ACFS and File Access and Administration Security

Oracle ACFS and File Access and Administration Security) for Linux environments and the Windows Security Model including file access control lists (ACLs) for … with the security infrastructure feature. For information about Oracle ACFS security infrastructure … , refer to \" Oracle ACFS Security \". For information about Oracle ACFS encryption, refer to \" Oracle

Automatic Storage Management Administrator's Guide, 12c Release 1 (12.1)

Managing Security and Encryption for Oracle ACFS with ASMCA

Managing Security and Encryption for Oracle ACFS with ASMCAOracle ASM Configuration Assistant enables you to configure security and encryption for an Oracle … Security and Encryption Dialog Description of \"Figure 14-5 Oracle ASM Configuration Assistant … Configure Security and Encryption Dialog\" You must initialize the security system as the first step in … configuring

Database Administrator's Guide, 12c Release 1 (12.1)

Getting Started with Database Administration

1.5 About Database Administrator Security and PrivilegesTo perform the administrative tasks of an Oracle Database DBA, you need specific privileges within the database and possibly in the operating system of the server on which the database runs. Ensure that access to a database administrator's account is tightly controlled.

Database Advanced Security Guide, 12c Release 1 (12.1)

Database Advanced Security Guide - Contents

ContentsConventions Changes in This Release for Oracle Database Advanced Security Guide Changes in Oracle … Database Advanced Security 12 c Release 1 (12.1.0.2) New Features Support for OLS_LABEL_DOMINATES in Data … in Oracle Database Advanced Security 12 c Release 1 (12.1.0.1) New Features New Keystore and Keystore … 1 Introduction to

Database Development Guide, 12c Release 1 (12.1)

Security

3.3 Controlling User Access with Fine-Grained Access Controlstatement that is issued against the table, view, or synonym to which an VPD security policy was … Security numbers. You can mask the data in the following ways: Full redaction, in which the entire data … Label Security: Oracle Label Security secures your database tables at the row level, and assigns these … rows

Database Development Guide, 12c Release 1 (12.1)

Security

3.6 Auditing User ActivityReal Application Security, Oracle Recovery Manager, Oracle Database Vault, and Oracle Label Security … written to the unified audit trail. See Also: Oracle Database Security Guide for more information about … creating and managing unified auditing policies Oracle Database Security Guide to find a detailed

Database Development Guide, 12c Release 1 (12.1)

Security

3.4.2 Protecting Users Who Run Invoker's Rights Procedures and Functionsthis privilege only to trusted users. See Also: Oracle Database Security Guide for more information … about managing security for definer's rights and invoker's rights procedures and functions

Database Development Guide, 12c Release 1 (12.1)

Security

3.4.3 How Default Rights Are Handled for Java Stored ProceduresBy default, Java class schema objects run with the privileges of their invoker, not with definer's rights. If you want your Java schema objects to run with definer's rights, then when you load them by using the loadjava tool, specify the -definer option. Example 3-5 shows how to use the -definer option in a loadjava command. Example 3-5 Loading a Java Class with Definer's Rights loadjava -u joe -resolve

Database Development Guide, 12c Release 1 (12.1)

Security

3.4 Using Invoker's and Definer's Rights for Procedures and FunctionsTopics: What Are Invoker's Rights and Definer's Rights? Protecting Users Who Run Invoker's Rights Procedures and Functions How Default Rights Are Handled for Java Stored Procedures

Database Development Guide, 12c Release 1 (12.1)

Security

3.4.1 What Are Invoker's Rights and Definer's Rights?When you create a procedure or function (that is, a program unit), you can design it so that it runs with either the privileges of the owner (you) or the privileges of the person who is invoking it. Definer's rights run the program unit using the owner's privileges and invoker's rights run the program unit using the privileges of the person who runs it. For example, suppose user harold creates a procedure

Database Development Guide, 12c Release 1 (12.1)

Security

3.5 Managing External Procedures for Your ApplicationsFor security reasons, Oracle external procedures run in a process that is physically separate from … CREATE LIBRARY. See Also: Oracle Database Security Guide for more information about securing external procedures

Database Development Guide, 12c Release 1 (12.1)

Security

3.2 Automating Database LoginsSecurity Guide for information about how to create a logon trigger that runs a database session application context package

Database Development Guide, 12c Release 1 (12.1)

Security

3 SecurityThis chapter explains some fundamentals of designing security into the database and database

Database Development Guide, 12c Release 1 (12.1)

Security

3.1 Enabling User Access with Grants, Roles, and Least PrivilegeEXECUTE IMMEDIATE 'SET ROLE hr_admin'; END IF; END; / See Also: Oracle Database Security Guide more … information about privilege and role authorization Oracle Database Security Guide more information about secure application roles

OLAP User's Guide, 12c Release 1 (12.1)

Overview

SecurityWith Oracle OLAP, standard Oracle Database security features are used to secure your … multidimensional data. In contrast, with a standalone OLAP server, administrators must manage security twice: once … the security of data in transit from the relational system to the standalone OLAP system.

Database PL/SQL Packages and Types Reference, 12c Release 1 (12.1)

DBMS_MGWMSG

Security ModelThe EXECUTE privilege is granted to PUBLIC on all types defined in the DBMS_MGWMSG package as well as the canonical types. The DBMS_MGWMSG packages and object types are owned by SYS. Note: You must run the catmgw.sql script to load the Messaging Gateway packages and object types into the database. Refer to the Oracle Database Advanced Queuing User's Guide for information on loading database objects

Database PL/SQL Packages and Types Reference, 12c Release 1 (12.1)

DBMS_APPLICATION_INFO

Security ModelNote: The public synonym for DBMS_APPLICATION_INFO is not dropped before creation so that you can redirect the public synonym to point to your own package. No further privileges are required. The DBMSAPIN.SQL script is already run as a part of standard database creation.

Database PL/SQL Packages and Types Reference, 12c Release 1 (12.1)

DBMS_WORKLOAD_CAPTURE

Security ModelThe following code describes the minimal set of privileges required to: Create directory objects Operate the interface provided by the DBMS_WORKLOAD_CAPTURE and DBMS_WORKLOAD_REPLAY packages Act as a replay client user (wrc someuser / somepassword or wrc USER=someuser PASSWORD=somepassword ) DROP USER rom1 CASCADE; CREATE USER rom1 IDENTIFIED BY rom1; GRANT EXECUTE ON DBMS_WORKLOAD_CAPTURE TO rom1;

Database PL/SQL Packages and Types Reference, 12c Release 1 (12.1)

DBMS_QOPATCH

Security ModelThe DBMS_QOPATCH package is created as part of SYS schema and SYS is the only user who can execute these subprograms.

Database PL/SQL Packages and Types Reference, 12c Release 1 (12.1)

DBMS_REDEFINITION

Security ModelSubprograms in the DBMS_REDEFINTION package are run with invokers' rights (with the privileges of the current user). There are two modes: In USER mode, the user who has the CREATE TABLE and CREATE MVIEW privileges may redefine a table residing in his own schema. In FULL mode, the user who has the ANY privilege may redefine tables in any schema.

Database PL/SQL Packages and Types Reference, 12c Release 1 (12.1)

DBMS_EDITIONS_UTILITIES

Security ModelThis package is owned by SYS with execute access granted to PUBLIC. It runs with invoker's rights, that is, with the security profile of the caller.

Database PL/SQL Packages and Types Reference, 12c Release 1 (12.1)

DBMS_SERVICE

Security ModelPrivileges The client using this package must have the ALTER SYSTEM execution privilege and the V$SESSION table read privilege. Schemas This package must be installed under SYS schema. Roles The EXECUTE privilege of the package is granted to the DBA role only.

Database PL/SQL Packages and Types Reference, 12c Release 1 (12.1)

DBMS_RANDOM

Security ModelThis package should be installed as SYS. By default, the package is initialized with the current user name, current time down to the second, and the current session. Oracle recommends that users who need to execute this package should be given EXECUTE privilege explicitly and should not rely on PUBLIC EXECUTE privilege.

Database PL/SQL Packages and Types Reference, 12c Release 1 (12.1)

DBMS_JOB

Security ModelNo specific system privileges are required to use DBMS_JOB. No system privileges are available to manage DBMS_JOB. Jobs cannot be altered or deleted other than jobs owned by the user. This is true for all users including those users granted DBA privileges. You can execute procedures that are owned by the user or for which the user is explicitly granted EXECUTE. However, procedures for which the user

Database PL/SQL Packages and Types Reference, 12c Release 1 (12.1)

DBMS_PREDICTIVE_ANALYTICS

Security ModelThe DBMS_PREDICTIVE_ANALYTICS package is owned by user SYS and is installed as part of database installation. Execution privilege on the package is granted to public. The routines in the package are run with invokers' rights (run with the privileges of the current user). The DBMS_PREDICTIVE_ANALYTICS package exposes APIs which are leveraged by the Oracle Data Mining option. Users who wish to invoke

Database PL/SQL Packages and Types Reference, 12c Release 1 (12.1)

DBMS_TTS

Security ModelOnly users having the execute_catalog_role can execute this procedure. This role is initially only assigned to user SYS.

Database PL/SQL Packages and Types Reference, 12c Release 1 (12.1)

DBMS_CRYPTO

Security ModelOracle Database installs this package in the SYS schema. You can then grant package access to existing users and roles as needed.

Database PL/SQL Packages and Types Reference, 12c Release 1 (12.1)

DBMS_COMPARISON

Security ModelSecurity on this package can be controlled in either of the following ways: Granting EXECUTE on

Database PL/SQL Packages and Types Reference, 12c Release 1 (12.1)

UTL_INADDR

Security Modelwishes to connect. Note: For more information about managing fine-grained access, see Oracle Database Security Guide.

Database PL/SQL Packages and Types Reference, 12c Release 1 (12.1)

DBMS_LOB

Security Modeland the Oracle Database SQL Language Reference. For information about the security model pertaining to temporary LOBs, see Operational Notes.

Database PL/SQL Packages and Types Reference, 12c Release 1 (12.1)

DBMS_EPG

Security ModelThe XDBADMIN role is required to invoke the configuration interface. It may invoked by the database user \" XDB \". The authorization interface can be invoked by any user.

Database PL/SQL Packages and Types Reference, 12c Release 1 (12.1)

DBMS_XMLQUERY

Security ModelOwned by XDB, the DBMS_XMLQUERY package must be created by SYS or XDB. The EXECUTE privilege is granted to PUBLIC. Subprograms in this package are executed using the privileges of the current user.

Database PL/SQL Packages and Types Reference, 12c Release 1 (12.1)

DBMS_XDBZ

Security ModelOwned by XDB, the DBMS_XDBZ package must be created by SYS or XDB. The EXECUTE privilege is granted to PUBLIC. Subprograms in this package are executed using the privileges of the current user.

Database PL/SQL Packages and Types Reference, 12c Release 1 (12.1)

DBMS_SPD

Security ModelDBMS_SPD is an invoker-rights package. The invoker requires ADMINISTER SQL MANAGEMENT OBJECT privilege for executing most of the subprograms in this package. Also, the subprograms commit the current transaction (if any), perform the operation, and then commit it again.

Database PL/SQL Packages and Types Reference, 12c Release 1 (12.1)

DBMS_SERVER_ALERT

Security ModelThe user needs DBA or IMP_FULL_DATABASE roles to use the DBMS_SERVER_ALERT package.

Database PL/SQL Packages and Types Reference, 12c Release 1 (12.1)

DBMS_LIBCACHE

Security Modelobjects with access granted though roles. This is a standard PL/SQL security limitation.

Database PL/SQL Packages and Types Reference, 12c Release 1 (12.1)

DBMS_PROPAGATION_ADM

Security ModelSecurity on this package can be controlled in either of the following ways: Granting EXECUTE on

Database PL/SQL Packages and Types Reference, 12c Release 1 (12.1)

DBMS_RLS

Security ModelA security check is performed when the transient view is created with a subquery. The schema owning … the policy function, which generates the dynamic predicate, is the transient view's definer for security check and object lookup.





Was this page helpful?

Integrated Cloud Applications & Platform Services