Results for security


81 to 140 of 4163 results. Prev  Next
Results per page:  20 | 40 |  60 


Database Administrator's Guide, 11g Release 1 (11.1)

The Importance of Establishing a Security Policy for Your Database

The Importance of Establishing a Security Policy for Your DatabaseIt is important to develop a security policy for every database. The security policy establishes … database infrastructure. Each database can have an administrator, referred to as the security … administrator, who is responsible for implementing and maintaining the database security policy If the … database system

Database Enterprise User Security Administrator's Guide, 11g Release 1 (11.1)

Database Enterprise User Security Administrator's Guide - Contents

ContentsSecurity? Oracle Database 11 g Release 1 (11.1) New Features in Enterprise User Security Oracle Database … 10g Release 2 (10.2) New Features in Enterprise User Security Oracle Database 10 g Release 1 (10.1 … ) New Features in Enterprise User Security Oracle9 i Release 2 (9.2) New Feature in Enterprise User … Security

Database Security Guide, 11g Release 1 (11.1)

Introducing Oracle Database Security

Additional Database Security ResourcesIn addition to the security resources described in this guide, Oracle Database provides the … following database security products: Advanced security features. See Oracle Database Advanced Security … . Oracle Label Security. Oracle Label Security secures database tables at the row level,

Database Concepts, 11g Release 1 (11.1)

Database Security

Introduction to Database SecurityDatabase security entails allowing or disallowing user actions on the database and the objects … within it. Oracle Database uses schemas and security domains to control access to data and to restrict

Database Concepts, 11g Release 1 (11.1)

Database Security

Overview of Security PoliciesThis section contains the following topics: System Security Policy Data Security Policy User … Security Policy Password Management Policy Auditing Policy

Database New Features Guide, 11g Release 1 (11.1)

Oracle 11g Database New Features

1.12.3 Security Manageabilitysecurity layer. Oracle has turned on some auditing settings by default to help customers better … track connections to the database. See Also: Oracle Database Security Guide for details 1.12.2.2 Built … that is documented in the Oracle Database Security Guide. This built-in functionality can be easily … Also: Oracle Database Security

Database Concepts, 11g Release 1 (11.1)

Database Security

System Security Policysecurity policy: the security administrators. If the database system is small, then the database … administrator might have the responsibilities of the security administrator. However, if the database system … security administrator. A security policy must be developed for every database. A security

Database Concepts, 11g Release 1 (11.1)

Database Security

Data Security PolicyData security includes mechanisms that control access to and use of the database at the object … level. Your data security policy determines which users have access to a specific schema object, and the … SELECT and INSERT statements but not DELETE statements using the employees table. Your data securitysecurity

Database Concepts, 11g Release 1 (11.1)

Introduction to Oracle Database

Overview of Security FeaturesSecureFiles encryption is part of the Advanced Security option. File System-like Logging: Modern file … , consistent backup, and point-in-time recovery Fine-grained auditing and label security XML indexing, XML … : Chapter 19, \"Content Management\" for more information about Oracle Spatial Overview of Security Features

Database Security Guide, 11g Release 1 (11.1)

What's New in Oracle Database Security?

Directory Security Enhancementsname lookups, then Oracle Database performs authentication by using wallets. To configure directory security, see Oracle Database Net Services Reference.

Database Security Guide, 11g Release 1 (11.1)

Introducing Oracle Database Security

About Oracle Database SecurityYou can use the default Oracle Database features to configure security in the following areas for … your site. Chapter 2, \"Managing Security for Oracle Database Users\" describes how to manage user … \" describes how to create and manage user privileges and roles. Application security. The first step to … creating a database

Database Security Guide, 11g Release 1 (11.1)

Managing Security for Oracle Database Users

About User Securitydatabase. Oracle Database enables you to set up security for your users in a variety of ways. When you … amount of various system resources available to each user as part of the security domain of that user … share those exact attributes. Another way to manage user security is to assign users privileges and

Database Concepts, 11g Release 1 (11.1)

Database Security

20 Database SecurityThis chapter provides an overview of Oracle Database database security. This chapter contains the … following topics: Introduction to Database Security Overview of Transparent Data Encryption Overview … , Synonyms, or Rows Overview of Security Policies Overview of Database Auditing See Also: Oracle … Database Security

Database Concepts, 11g Release 1 (11.1)

Database Security

User Security PolicyThis section describes aspects of user security policy, and contains the following topics: General … User Security End-User Security Administrator Security Application Developer Security Application … Administrator Security General User Security For all types of database

Database Installation Guide for Microsoft Windows, 11g Release 1 (11.1)

Installing Oracle Database

3.4 Database Security OptionsDuring installation, you are prompted to select a database security configuration. The Secure … security controls, then you can check the Disable security settings check box. Oracle Database is then … change security settings by starting DBCA and modifying security settings. You can enable or disable

Database Installation Guide for Microsoft Windows, 11g Release 1 (11.1)

What's New in Oracle Database 11g

Active Directory Security EnhancementsActive Directory. This data is generally considered to be public, but sites with greater security needs

Database New Features Guide, 11g Release 1 (11.1)

Oracle 11g Database New Features

1.12.1 Oracle Advanced SecurityThe following sections describe Oracle advanced security features.

Database Security Guide, 11g Release 1 (11.1)

Managing Security for Application Developers

About Application Security PoliciesCreating an application security policy is the first step to create a secure database application … . An application security policy is a list of application security requirements and rules that … regulate user access to database objects. You should draft security policies for each database application … different

Database Administrator's Guide, 11g Release 1 (11.1)

About Database Administrator Security and Privileges

The DBA RoleA predefined DBA role is automatically created with every Oracle Database installation. This role contains most database system privileges. Therefore, the DBA role should be granted only to actual database administrators. Note: The DBA role does not include the SYSDBA or SYSOPER system privileges. These are special administrative privileges that allow an administrator to perform basic database administration

Database Administrator's Guide, 11g Release 1 (11.1)

About Database Administrator Security and Privileges

SYSWhen you create an Oracle Database, the user SYS is automatically created and granted the DBA role. All of the base tables and views for the database data dictionary are stored in the schema SYS. These base tables and views are critical for the operation of Oracle Database. To maintain the integrity of the data dictionary, tables in the SYS schema are manipulated only by the database. They should

Database Administrator's Guide, 11g Release 1 (11.1)

About Database Administrator Security and Privileges

The Database Administrator's Operating System AccountTo perform many of the administrative duties for a database, you must be able to execute operating system commands. Depending on the operating system on which Oracle Database is running, you might need an operating system account or ID to gain access to the operating system. If so, your operating system account might require operating system privileges or access rights that other database users do

Database Administrator's Guide, 11g Release 1 (11.1)

About Database Administrator Security and Privileges

Administrative User AccountsRegarding Security Enhancements: In this release of Oracle Database and in subsequent releases … , several enhancements are being made to ensure the security of default database user accounts. You can … find a security checklist for this release in Oracle Database Security Guide. Oracle recommends that

Database Administrator's Guide, 11g Release 1 (11.1)

About Database Administrator Security and Privileges

SYSTEMWhen you create an Oracle Database, the user SYSTEM is also automatically created and granted the DBA role. The SYSTEM username is used to create additional tables and views that display administrative information, and internal tables and views used by various Oracle Database options and tools. Never use the SYSTEM schema to store tables of interest to non-administrative users.

Database Security Guide, 11g Release 1 (11.1)

What's New in Oracle Database Security?

Oracle Call Interface Security EnhancementsThe following security enhancements are available for Oracle Call Interface (OCI): Reporting bad … about the security vulnerabilities present in the database software based on the version Adding … so that clients can display this information Database administrators can manage these security … . See \"Parameters for Enhanced Security

Database Security Guide, 11g Release 1 (11.1)

What's New in Oracle Database Security?

Oracle XML DB Security EnhancementsThis section contains: XML Translation Support for Oracle Database XML Support for Web Services

Database Installation Guide for Microsoft Windows, 11g Release 1 (11.1)

Oracle Database Preinstallation Requirements

2.7.5 Oracle Advanced Security Requirementscomponents. Some Oracle Advanced Security components can use a Lightweight Directory Access Protocol … (LDAP) directory such as Oracle Internet Directory. See Also: Oracle Database Advanced Security Administrator's Guide

Database Data Warehousing Guide, 11g Release 1 (11.1)

Advanced Materialized Views

Security Issues with Materialized ViewsTo create a materialized view in your own schema, you must have the CREATE MATERIALIZED VIEW privilege and the SELECT privilege to any tables referenced that are in another schema. To create a materialized view in another schema, you must have the CREATE ANY MATERIALIZED VIEW privilege and the owner of the materialized view needs SELECT privileges to the tables referenced if they are from another

Database Security Guide, 11g Release 1 (11.1)

Introducing Oracle Database Security

1 Introducing Oracle Database SecurityThis chapter contains: About Oracle Database Security Additional Database Security Resources

Database Installation Guide for Microsoft Windows, 11g Release 1 (11.1)

Oracle Database Postinstallation Tasks

4.7.6 Configuring Oracle Label SecurityIf you installed Oracle Label Security, you must configure it in a database before you use it. You … can configure Oracle Label Security with or without Oracle Internet Directory integration. If you … configure Oracle Label Security without Oracle Internet Directory integration, you cannot configure it … to use Oracle Internet

Database Concepts, 11g Release 1 (11.1)

Database Security

Authentication by Oracle DatabaseAlso: Oracle Database Security Guide for more information about how Oracle Database verifies password complexity

Database Concepts, 11g Release 1 (11.1)

Database Security

Password Management PolicyDatabase security systems dependent on passwords require that passwords be kept secret at all times … database security, the Oracle Database password management policy is controlled by DBAs and securitySecurity Guide for more information on password protection

Database Concepts, 11g Release 1 (11.1)

Database Security

Database Users and Schemasassociated password to prevent unauthorized use. Security Domain Each user has a security domain —a set … , CPU processing time) for the user Each property that contributes to a user's security domain is discussed in the following sections.

Database Concepts, 11g Release 1 (11.1)

Database Security

Multitier Authentication and AuthorizationIn a multitier environment, Oracle Database controls the security of middle-tier applications by … with or without passwords. However, if a middle tier is outside or on a firewall, then security is … . Advanced Security Option (ASO) and enterprise users are currently not supported. See Also: Oracle

Database Concepts, 11g Release 1 (11.1)

Database Security

Secure Application Rolesapplication. Security is strengthened when passwords are not embedded in application source code or stored … restriction that users cannot change security domain inside definer's right procedures, secure … Security Guide for more information about default roles Oracle Database 2 Day + Security Guide for more

Database Concepts, 11g Release 1 (11.1)

Database Security

Overview of Access Restrictions on Tables, Views, Synonyms, or RowsThis section describes restrictions associated not with users, but with objects. The restrictions provide protection regardless of the entity who seeks to access or alter them. You provide this protection by designing and using policies to restrict access to specific tables, views, synonyms, or rows. These policies invoke functions that you design to specify dynamic predicates establishing the restrictions.

Database Concepts, 11g Release 1 (11.1)

Database Security

Overview of Database Auditinginclude name, application, time, and so on. Security policies can cause auditing when specified elements … data from tables, then the security administrator could audit all connections to the database and all

Database Concepts, 11g Release 1 (11.1)

Database Security

Fine-Grained Access ControlFine-grained access control lets you use functions to implement security policies and to associate … those security policies with tables, views, or synonyms. The database server automatically enforces … your security policies, no matter how the data is accessed (for example, by ad hoc queries). You can … : Use different policies

Database Concepts, 11g Release 1 (11.1)

Database Security

Application Contextfunction-based security policies with applications. Each application has its own application-specific … accessible to the functions implementing your security policies. For example, context attributes

Database Concepts, 11g Release 1 (11.1)

Database Security

Storage Settings and Quotas: Oracle Database Security Guide for more information on profiles and resource limits \"Profiles\"

Database Concepts, 11g Release 1 (11.1)

Database Security

Introduction to Rolessecurity domains of all users granted the group's role automatically reflect the changes made to the … application by way of a given user name. Application-specific security You can protect role use with a … role granted to a user is, at a given time, either enabled or disabled. A user's security domain … security

Database Concepts, 11g Release 1 (11.1)

Database Security

Auditing PolicySecurity administrators should define a policy for the auditing procedures of each database. You

Database Concepts, 11g Release 1 (11.1)

Database Security

Tablespace Encryptiondata. This leads to improved performance. See Also: Oracle Database Advanced Security

Database Concepts, 11g Release 1 (11.1)

Database Security

Overview of Authentication Methodsencrypts passwords during transmission to ensure the security of network authentication. To validate the … Administrators See Also: Oracle Database Security Guide for more information about authentication methods

Database Concepts, 11g Release 1 (11.1)

Database Security

Authentication by the Operating SystemSome operating systems let Oracle Database use information they maintain to authenticate users, with the following benefits: Once authenticated by the operating system, users can connect to Oracle Database more conveniently, without specifying a user name or password. For example, an operating-system-authenticated user can invoke SQL*Plus and skip the user name and password prompts by entering the

Database Concepts, 11g Release 1 (11.1)

Database Security

Authentication by the Secure Socket Layer ProtocolThe Secure Socket Layer (SSL) protocol is an application layer protocol. Users identified either externally or globally (external or global users) can authenticate to a database through SSL.

Database Concepts, 11g Release 1 (11.1)

Database Security

Overview of Transparent Data EncryptionOracle Database provides security in the form of authentication, authorization, and auditing … accountability when users access protected resources. Although these security mechanisms effectively protect … encryption keys in a security module external to the database. Using an external security module … separates

Database Concepts, 11g Release 1 (11.1)

Database Security

Authentication by the NetworkNote: These methods require Oracle Database Enterprise Edition with the Oracle Advanced Security option … and edit the security credentials in Oracle wallets. X.509v3 certificates obtained from (and signed … to manage security attributes and privileges for users, including users authenticated by X.509 … Enterprise Security

Database Concepts, 11g Release 1 (11.1)

Database Security

Authentication of Database Administratorstype of authentication for database administration when password file security is a concern, if the … site has very strict security requirements, or you want to separate the identity management from your … authentication and distributed database concepts Oracle Database Advanced Security Administrator's Guide for … information

Database Concepts, 11g Release 1 (11.1)

Database Security

Overview of AuthorizationAuthorization primarily includes two processes: Permitting only certain users to access, process, or alter data Applying varying limitations on users' access or actions. The limitations placed on (or removed from) users can apply to objects, such as schemas, tables, or rows; or to resources, such as time (CPU, connect, or idle times). This section introduces the basic concepts and mechanisms for placing

Database Concepts, 11g Release 1 (11.1)

Database Security

Types and Records of Auditingsecurity administrator creates an audit policy on the target table. If any rows returned from a DML … creating and using predefined views Oracle Database Security Guide for more information on auditing … at any time, but the recording of audit information is enabled or disabled by the security … provides for greater auditing security.

Database Concepts, 11g Release 1 (11.1)

Database Security

Privilegesrows from someone else's table Run someone else's stored procedure See Also: Oracle Database Security

Database Concepts, 11g Release 1 (11.1)

Database Security

RolesOracle Database provides for easy and controlled privilege management through roles. Roles are named groups of related privileges that you grant to users or other roles. See Also: \"Introduction to Roles\" information about role properties

Database Concepts, 11g Release 1 (11.1)

Database Security

User Resource Limits and Profilesuser's security domain. By doing so, you can prevent the uncontrolled consumption of valuable system … can have an unlimited number of profiles. The security administrator can enable or disable the … Administrator's Guide for information about security administrators Oracle Database Security Guide for more … user

Database Concepts, 11g Release 1 (11.1)

Database Security

Introduction to Privilegescompromise security. A user can receive a privilege in two different ways: You can grant privileges to … . See Also: Oracle Database Security Guide for more information about schema object privileges

Database Concepts, 11g Release 1 (11.1)

Database Security

Fine-Grained Auditingapplications using the DBMS_FGA package or by using database triggers. See Also: Oracle Database Security Guide for more information on fine-grained auditing

OLAP User's Guide, 11g Release 1 (11.1)

Security

Using Analytic Workspace Manager to Set Object SecurityAnalytic Workspace Manager provides a graphical interface for setting object security. It also … displays the SQL commands, so that you can cut-and-paste them into a script. Setting Object Security on … an Analytic Workspace Take these steps to set object security on an analytic workspace in Analytic … Workspace Object Security.

OLAP User's Guide, 11g Release 1 (11.1)

Security

Creating Data Security Policies on Dimensions and CubesData security policies enable you to grant users and roles privileges on a selection of dimension … districts instead of all geographic areas. You can create a data security policy on dimensions, cubes, or … both: When you create a data security policy on a dimension, the policy extends to all cubes with … security

OLAP User's Guide, 11g Release 1 (11.1)

Security

8 SecurityOracle OLAP secures your data using the standard security mechanisms of Oracle Database. This … chapter contains the following topics: Security of Multidimensional Data in Oracle Database Setting … Object Security Creating Data Security Policies on Dimensions and Cubes

OLAP User's Guide, 11g Release 1 (11.1)

Security

Types of Securityaccess privileges. Oracle OLAP provides two types of security: Object security and data security … . Object security provides access to dimensional objects. You must set object security before other users … can access them. Object security is implemented using SQL GRANT and REVOKE. Data

OLAP User's Guide, 11g Release 1 (11.1)

Security

Security of Multidimensional Data in Oracle Databasedatabase. It has the security benefits of Oracle Database, which leads the industry in security. You do … administer security on a separate system. And you do not need to compromise your data by storing it in a less secure environment than Oracle Database.





Was this page helpful?

Integrated Cloud Applications & Platform Services