Security Guide Managing User Authentication and Authorization Part I Managing User Authentication and Authorization Part I describes how to manage user authentication and authorization. Managing Security for Oracle Database UsersYou can manage the security for Oracle Database users in many ways, such as enforcing restrictions on the way that passwords are created. Configuring AuthenticationAuthentication means to verify the identity of users or other entities that connect to the database. Configuring Privilege and Role AuthorizationPrivilege and role authorization controls the permissions that users have to perform day-to-day tasks. Performing Privilege Analysis to Find Privilege UsePrivilege analysis dynamically analyzes the privileges and roles that users use and do not use. Configuring Centrally Managed Users with Microsoft Active DirectoryOracle Database can authenticate and authorize Microsoft Active Directory users with the database directly without intermediate directories or Oracle Enterprise User Security. Managing Security for Definer's Rights and Invoker's RightsInvoker’s rights and definer’s rights have several security advantages when used to control access to privileges during user-defined procedure executions. Managing Fine-Grained Access in PL/SQL Packages and TypesOracle Database provides PL/SQL packages and types for fine-grained access to control access to external network services and wallets. Managing Security for a Multitenant Environment in Enterprise ManagerYou can manage common and local users and roles by using Oracle Enterprise Manager.