You are using an outdated browser. Please upgrade to the latest version for the best experience.
How do I narrow my search results?

After you submit your search query:

  1. On the Refine Search results page, select one or more categories of products or services from the left sidebar.
  2. Then for a category with search results, click Select to choose your product and release filters, and then click OK.

For search queries that contain multiple words, surround the query with quotes, and then resubmit your query. Example: "database cloud service"

How do I find the documentation for my product or service?

From the home page, click the technology categories for your products or services. If you do not know which category to pick, try the following features:

  • Click the Find a product tab and search for your product or service.
  • Click Browse All Products & Services at the bottom of the home page to view an alphabetical listing of products and services.
  • Apple Safari: Version 6
  • Google Chrome: Version 29 and later
  • Mozilla Firefox: Version 24 and later
  • Microsoft Internet Explorer: Version 9 and later
Results for security


61 to 120 of 4163 results. previous page Prev  Next next page
Results per page:  20 | 40 |  60 


Database PL/SQL Packages and Types Reference, 11g Release 1 (11.1)

DBMS_METADATA

Security ModelThe object views of the Oracle metadata model implement security as follows: Nonprivileged users

Database PL/SQL Packages and Types Reference, 11g Release 1 (11.1)

DBMS_SQL

Security Modelimprove the security of the package. Preventing Malicious or Accidental Access of Open Cursor Numbers … these rules. Preventing Inappropriate Use of a Cursor Cursors are protected from security breaches … . When security_level = 2, the checks are always made. Upgrade Considerations This security regime is … , users of DBMS_SQL

Database PL/SQL Packages and Types Reference, 11g Release 1 (11.1)

DBMS_STREAMS

Security ModelUser group PUBLIC is granted EXECUTE privilege on this package. See Also: Oracle Database Security Guide for more information about user group PUBLIC

Database PL/SQL Packages and Types Reference, 11g Release 1 (11.1)

DBMS_DIMENSION

Security ModelSecurity on this package can be controlled by granting EXECUTE to selected users or roles. A user

Database PL/SQL Packages and Types Reference, 11g Release 1 (11.1)

DBMS_UTILITY

Security ModelDBMS_UTILITY runs with the privileges of the calling user for the NAME_RESOLVE Procedure and the COMPILE_SCHEMA Procedure. This is necessary so that the SQL works correctly. The package does not run as SYS. The privileges are checked using DBMS_DDL.

Database PL/SQL Packages and Types Reference, 11g Release 1 (11.1)

DBMS_SERVICE

Security ModelPrivileges The client using this package should have the ALTER SYSTEM execution privilege and the V$SESSION table read privilege. Schemas This package should be installed under SYS schema. Roles The EXECUTE privilege of the package is granted to the DBA role only.

Database PL/SQL Packages and Types Reference, 11g Release 1 (11.1)

DBMS_CDC_SUBSCRIBE

Security ModelChange Data Capture grants EXECUTE privileges to PUBLIC on the DBMS_CDC_SUBSCRIBE package.

Database PL/SQL Packages and Types Reference, 11g Release 1 (11.1)

DBMS_COMPARISON

Security ModelSecurity on this package can be controlled in either of the following ways: Granting EXECUTE on

Database PL/SQL Packages and Types Reference, 11g Release 1 (11.1)

DBMS_XA

Security ModelThis package is created under SYS. Operations provided by this package are performed under the current calling user, not under the package owner SYS.Any DBMS_XA subprogram called from an anonymous PL/SQL block is executed using the privileges of the current user. Any DBMS_XA subprogram called from a stored procedure is executed using the privileges of the owner of the stored procedure. SELECT privilege

Database PL/SQL Packages and Types Reference, 11g Release 1 (11.1)

DBMS_ROWID

Security ModelThis package runs with the privileges of calling user, rather than the package owner SYS.

Database PL/SQL Packages and Types Reference, 11g Release 1 (11.1)

DBMS_FLASHBACK

Security ModelTo use this package, a database administrator must grant EXECUTE privileges for DBMS_FLASHBACK.

Database PL/SQL Packages and Types Reference, 11g Release 1 (11.1)

UTL_HTTP

Security Modelconnect. Note: For more information, see Managing Fine-grained Access to External Network Services in Oracle Database Security Guide

Database PL/SQL Packages and Types Reference, 11g Release 1 (11.1)

DBMS_DISTRIBUTED_TRUST_ADMIN

Security ModelTo execute DBMS_DISTRIBUTED_TRUST_ADMIN, the EXECUTE_CATALOG_ROLE role must be granted to the DBA. To select from the view TRUSTED_SERVERS, the SELECT_CATALOG_ROLE role must be granted to the DBA. It is important to know whether all servers are trusted or not trusted. Trusting a particular server with the ALLOW_SERVER procedure does not have any effect if the database already trusts all databases,

Database PL/SQL Packages and Types Reference, 11g Release 1 (11.1)

DBMS_RLS

Security ModelA security check is performed when the transient view is created with a subquery. The schema owning … the policy function, which generates the dynamic predicate, is the transient view's definer for security check and object lookup.

Database PL/SQL Packages and Types Reference, 11g Release 1 (11.1)

DBMS_FGA

Security ModelExecute privilege on DBMS_FGA is needed for administering audit policies. Because the audit function can potentially capture all user environment and application context values, policy administration should be executable by privileged users only. The policy event handler module will be executed with the module owner's privilege.

Database PL/SQL Packages and Types Reference, 11g Release 1 (11.1)

DBMS_REPAIR

Security ModelThe package is owned by SYS. Execution privilege is not granted to other users.

Database PL/SQL Packages and Types Reference, 11g Release 1 (11.1)

DBMS_ERRLOG

Security ModelSecurity on this package can be controlled by granting EXECUTE on this package to selected users or

Database Installation Guide for Linux, 11g Release 1 (11.1)

Oracle Database Postinstallation Tasks

4.3.2 Configuring Oracle Label SecurityIf you installed Oracle Label Security, you must configure it in a database before you use it. You … can configure Oracle Label Security in two ways; with Oracle Internet Directory integration and … without Oracle Internet Directory integration. If you configure Oracle Label Security without Oracle … stage. Note: To configure

Database 2 Day + Security Guide, 11g Release 1 (11.1)

Database 2 Day + Security Guide - Contents

ContentsDocuments Conventions 1 Introduction to Oracle Database Security About This Guide Before Using This … Guide What This Guide Is and Is Not Common Database Security Tasks Tools for Securing Your Database … Securing the Database Installation and Configuration Enabling the Default Security Settings Securing the … Run-Time Facilities

Database Advanced Security Administrator's Guide, 11g Release 1 (11.1)

Database Advanced Security Administrator's Guide - Contents

ContentsAdvanced Security? Oracle Database 11 g Release 1 (11.1) New Features in Oracle Advanced Security Part I … Getting Started with Oracle Advanced Security 1 Introduction to Oracle Advanced Security 1.1 Security … Challenges in an Enterprise Environment 1.1.1 Security in Enterprise Grid

Database Administrator's Guide, 11g Release 1 (11.1)

The Importance of Establishing a Security Policy for Your Database

The Importance of Establishing a Security Policy for Your DatabaseIt is important to develop a security policy for every database. The security policy establishes … database infrastructure. Each database can have an administrator, referred to as the security … administrator, who is responsible for implementing and maintaining the database security policy If the … database system

Database Enterprise User Security Administrator's Guide, 11g Release 1 (11.1)

Database Enterprise User Security Administrator's Guide - Contents

ContentsSecurity? Oracle Database 11 g Release 1 (11.1) New Features in Enterprise User Security Oracle Database … 10g Release 2 (10.2) New Features in Enterprise User Security Oracle Database 10 g Release 1 (10.1 … ) New Features in Enterprise User Security Oracle9 i Release 2 (9.2) New Feature in Enterprise User … Security

Database Security Guide, 11g Release 1 (11.1)

Introducing Oracle Database Security

Additional Database Security ResourcesIn addition to the security resources described in this guide, Oracle Database provides the … following database security products: Advanced security features. See Oracle Database Advanced Security … . Oracle Label Security. Oracle Label Security secures database tables at the row level,

Database Concepts, 11g Release 1 (11.1)

Database Security

Introduction to Database SecurityDatabase security entails allowing or disallowing user actions on the database and the objects … within it. Oracle Database uses schemas and security domains to control access to data and to restrict

Database Concepts, 11g Release 1 (11.1)

Database Security

Overview of Security PoliciesThis section contains the following topics: System Security Policy Data Security Policy User … Security Policy Password Management Policy Auditing Policy

Database New Features Guide, 11g Release 1 (11.1)

Oracle 11g Database New Features

1.12.3 Security Manageabilitysecurity layer. Oracle has turned on some auditing settings by default to help customers better … track connections to the database. See Also: Oracle Database Security Guide for details 1.12.2.2 Built … that is documented in the Oracle Database Security Guide. This built-in functionality can be easily … Also: Oracle Database Security

Database Concepts, 11g Release 1 (11.1)

Database Security

System Security Policysecurity policy: the security administrators. If the database system is small, then the database … administrator might have the responsibilities of the security administrator. However, if the database system … security administrator. A security policy must be developed for every database. A security

Database Concepts, 11g Release 1 (11.1)

Database Security

Data Security PolicyData security includes mechanisms that control access to and use of the database at the object … level. Your data security policy determines which users have access to a specific schema object, and the … SELECT and INSERT statements but not DELETE statements using the employees table. Your data securitysecurity

Database Concepts, 11g Release 1 (11.1)

Introduction to Oracle Database

Overview of Security FeaturesSecureFiles encryption is part of the Advanced Security option. File System-like Logging: Modern file … , consistent backup, and point-in-time recovery Fine-grained auditing and label security XML indexing, XML … : Chapter 19, \"Content Management\" for more information about Oracle Spatial Overview of Security Features

Database Security Guide, 11g Release 1 (11.1)

What's New in Oracle Database Security?

Directory Security Enhancementsname lookups, then Oracle Database performs authentication by using wallets. To configure directory security, see Oracle Database Net Services Reference.

Database Security Guide, 11g Release 1 (11.1)

Introducing Oracle Database Security

About Oracle Database SecurityYou can use the default Oracle Database features to configure security in the following areas for … your site. Chapter 2, \"Managing Security for Oracle Database Users\" describes how to manage user … \" describes how to create and manage user privileges and roles. Application security. The first step to … creating a database

Database Security Guide, 11g Release 1 (11.1)

Managing Security for Oracle Database Users

About User Securitydatabase. Oracle Database enables you to set up security for your users in a variety of ways. When you … amount of various system resources available to each user as part of the security domain of that user … share those exact attributes. Another way to manage user security is to assign users privileges and

Database Concepts, 11g Release 1 (11.1)

Database Security

20 Database SecurityThis chapter provides an overview of Oracle Database database security. This chapter contains the … following topics: Introduction to Database Security Overview of Transparent Data Encryption Overview … , Synonyms, or Rows Overview of Security Policies Overview of Database Auditing See Also: Oracle … Database Security

Database Concepts, 11g Release 1 (11.1)

Database Security

User Security PolicyThis section describes aspects of user security policy, and contains the following topics: General … User Security End-User Security Administrator Security Application Developer Security Application … Administrator Security General User Security For all types of database

Database Installation Guide for Microsoft Windows, 11g Release 1 (11.1)

Installing Oracle Database

3.4 Database Security OptionsDuring installation, you are prompted to select a database security configuration. The Secure … security controls, then you can check the Disable security settings check box. Oracle Database is then … change security settings by starting DBCA and modifying security settings. You can enable or disable

Database Installation Guide for Microsoft Windows, 11g Release 1 (11.1)

What's New in Oracle Database 11g

Active Directory Security EnhancementsActive Directory. This data is generally considered to be public, but sites with greater security needs

Database New Features Guide, 11g Release 1 (11.1)

Oracle 11g Database New Features

1.12.1 Oracle Advanced SecurityThe following sections describe Oracle advanced security features.

Database Security Guide, 11g Release 1 (11.1)

Managing Security for Application Developers

About Application Security PoliciesCreating an application security policy is the first step to create a secure database application … . An application security policy is a list of application security requirements and rules that … regulate user access to database objects. You should draft security policies for each database application … different

Database Administrator's Guide, 11g Release 1 (11.1)

About Database Administrator Security and Privileges

The DBA RoleA predefined DBA role is automatically created with every Oracle Database installation. This role contains most database system privileges. Therefore, the DBA role should be granted only to actual database administrators. Note: The DBA role does not include the SYSDBA or SYSOPER system privileges. These are special administrative privileges that allow an administrator to perform basic database administration

Database Administrator's Guide, 11g Release 1 (11.1)

About Database Administrator Security and Privileges

SYSWhen you create an Oracle Database, the user SYS is automatically created and granted the DBA role. All of the base tables and views for the database data dictionary are stored in the schema SYS. These base tables and views are critical for the operation of Oracle Database. To maintain the integrity of the data dictionary, tables in the SYS schema are manipulated only by the database. They should

Database Administrator's Guide, 11g Release 1 (11.1)

About Database Administrator Security and Privileges

The Database Administrator's Operating System AccountTo perform many of the administrative duties for a database, you must be able to execute operating system commands. Depending on the operating system on which Oracle Database is running, you might need an operating system account or ID to gain access to the operating system. If so, your operating system account might require operating system privileges or access rights that other database users do

Database Administrator's Guide, 11g Release 1 (11.1)

About Database Administrator Security and Privileges

Administrative User AccountsRegarding Security Enhancements: In this release of Oracle Database and in subsequent releases … , several enhancements are being made to ensure the security of default database user accounts. You can … find a security checklist for this release in Oracle Database Security Guide. Oracle recommends that

Database Administrator's Guide, 11g Release 1 (11.1)

About Database Administrator Security and Privileges

SYSTEMWhen you create an Oracle Database, the user SYSTEM is also automatically created and granted the DBA role. The SYSTEM username is used to create additional tables and views that display administrative information, and internal tables and views used by various Oracle Database options and tools. Never use the SYSTEM schema to store tables of interest to non-administrative users.

Database Security Guide, 11g Release 1 (11.1)

What's New in Oracle Database Security?

Oracle Call Interface Security EnhancementsThe following security enhancements are available for Oracle Call Interface (OCI): Reporting bad … about the security vulnerabilities present in the database software based on the version Adding … so that clients can display this information Database administrators can manage these security … . See \"Parameters for Enhanced Security

Database Security Guide, 11g Release 1 (11.1)

What's New in Oracle Database Security?

Oracle XML DB Security EnhancementsThis section contains: XML Translation Support for Oracle Database XML Support for Web Services

Database Installation Guide for Microsoft Windows, 11g Release 1 (11.1)

Oracle Database Preinstallation Requirements

2.7.5 Oracle Advanced Security Requirementscomponents. Some Oracle Advanced Security components can use a Lightweight Directory Access Protocol … (LDAP) directory such as Oracle Internet Directory. See Also: Oracle Database Advanced Security Administrator's Guide

Database Data Warehousing Guide, 11g Release 1 (11.1)

Advanced Materialized Views

Security Issues with Materialized ViewsTo create a materialized view in your own schema, you must have the CREATE MATERIALIZED VIEW privilege and the SELECT privilege to any tables referenced that are in another schema. To create a materialized view in another schema, you must have the CREATE ANY MATERIALIZED VIEW privilege and the owner of the materialized view needs SELECT privileges to the tables referenced if they are from another

Database Security Guide, 11g Release 1 (11.1)

Introducing Oracle Database Security

1 Introducing Oracle Database SecurityThis chapter contains: About Oracle Database Security Additional Database Security Resources

Database Installation Guide for Microsoft Windows, 11g Release 1 (11.1)

Oracle Database Postinstallation Tasks

4.7.6 Configuring Oracle Label SecurityIf you installed Oracle Label Security, you must configure it in a database before you use it. You … can configure Oracle Label Security with or without Oracle Internet Directory integration. If you … configure Oracle Label Security without Oracle Internet Directory integration, you cannot configure it … to use Oracle Internet

Database Concepts, 11g Release 1 (11.1)

Database Security

Authentication by Oracle DatabaseAlso: Oracle Database Security Guide for more information about how Oracle Database verifies password complexity

Database Concepts, 11g Release 1 (11.1)

Database Security

Password Management PolicyDatabase security systems dependent on passwords require that passwords be kept secret at all times … database security, the Oracle Database password management policy is controlled by DBAs and securitySecurity Guide for more information on password protection

Database Concepts, 11g Release 1 (11.1)

Database Security

Database Users and Schemasassociated password to prevent unauthorized use. Security Domain Each user has a security domain —a set … , CPU processing time) for the user Each property that contributes to a user's security domain is discussed in the following sections.

Database Concepts, 11g Release 1 (11.1)

Database Security

Multitier Authentication and AuthorizationIn a multitier environment, Oracle Database controls the security of middle-tier applications by … with or without passwords. However, if a middle tier is outside or on a firewall, then security is … . Advanced Security Option (ASO) and enterprise users are currently not supported. See Also: Oracle

Database Concepts, 11g Release 1 (11.1)

Database Security

Secure Application Rolesapplication. Security is strengthened when passwords are not embedded in application source code or stored … restriction that users cannot change security domain inside definer's right procedures, secure … Security Guide for more information about default roles Oracle Database 2 Day + Security Guide for more

Database Concepts, 11g Release 1 (11.1)

Database Security

Overview of Access Restrictions on Tables, Views, Synonyms, or RowsThis section describes restrictions associated not with users, but with objects. The restrictions provide protection regardless of the entity who seeks to access or alter them. You provide this protection by designing and using policies to restrict access to specific tables, views, synonyms, or rows. These policies invoke functions that you design to specify dynamic predicates establishing the restrictions.

Database Concepts, 11g Release 1 (11.1)

Database Security

Overview of Database Auditinginclude name, application, time, and so on. Security policies can cause auditing when specified elements … data from tables, then the security administrator could audit all connections to the database and all

Database Concepts, 11g Release 1 (11.1)

Database Security

Fine-Grained Access ControlFine-grained access control lets you use functions to implement security policies and to associate … those security policies with tables, views, or synonyms. The database server automatically enforces … your security policies, no matter how the data is accessed (for example, by ad hoc queries). You can … : Use different policies

Database Concepts, 11g Release 1 (11.1)

Database Security

Application Contextfunction-based security policies with applications. Each application has its own application-specific … accessible to the functions implementing your security policies. For example, context attributes

Database Concepts, 11g Release 1 (11.1)

Database Security

Storage Settings and Quotas: Oracle Database Security Guide for more information on profiles and resource limits \"Profiles\"

Database Concepts, 11g Release 1 (11.1)

Database Security

Introduction to Rolessecurity domains of all users granted the group's role automatically reflect the changes made to the … application by way of a given user name. Application-specific security You can protect role use with a … role granted to a user is, at a given time, either enabled or disabled. A user's security domain … security