Security Guide Managing User Authentication and Authorization Part I Managing User Authentication and Authorization Part I describes how to manage user authentication and authorization. Managing Security for Oracle Database UsersYou can manage the security for Oracle Database users in many ways, such as enforcing restrictions on the way that passwords are created. Configuring AuthenticationAuthentication means to verify the identity of users or other entities that connect to the database. Configuring Privilege and Role AuthorizationPrivilege and role authorization controls the permissions that users have to perform day-to-day tasks. Performing Privilege Analysis to Identify Privilege UsePrivilege analysis dynamically analyzes the privileges and roles that users use and do not use. Configuring Centrally Managed Users with Microsoft Active DirectoryOracle Database can authenticate and authorize Microsoft Active Directory users with the database directly without intermediate directories or Oracle Enterprise User Security. Authenticating and Authorizing IAM Users for Oracle DBaaS DatabasesIdentity and Access Management (IAM) users can be configured to connect to an Oracle Database as a service (Oracle DBaaS) instance. Authenticating and Authorizing Microsoft Azure Active Directory Users for Oracle DatabasesAn Oracle Database can be configured for Microsoft Azure AD users to connect using single-sign on. Managing Security for Definer's Rights and Invoker's RightsInvoker’s rights and definer’s rights have several security advantages when used to control access to privileges during user-defined procedure executions. Managing Fine-Grained Access in PL/SQL Packages and TypesOracle Database provides PL/SQL packages and types for fine-grained access to control access to external network services and wallets. Managing Security for a Multitenant Environment in Enterprise ManagerYou can manage common and local users and roles for a multitenant environment by using Oracle Enterprise Manager.