Table of Contents
- List of Examples
- List of Figures
- List of Tables
- Title and Copyright Information
- Preface
- Changes in This Release for Oracle Database Enterprise User Security Administrator's Guide
-
1
Introducing Enterprise User Security
-
1.1
Introduction to Enterprise User Security
- 1.1.1 The Challenges of User Management
- 1.1.2 Enterprise User Security: The Big Picture
- 1.1.3 About Enterprise User Security Directory Entries
- 1.2 About Using Shared Schemas for Enterprise User Security
- 1.3 Enterprise User Proxy
-
1.4
Enterprise User Security Deployment Considerations
- 1.4.1 Security Aspects of Centralizing Security Credentials
- 1.4.2 Security of Password-Authenticated Enterprise User Database Login Information
- 1.4.3 Considerations for Defining Database Membership in Enterprise Domains
- 1.4.4 Choosing Authentication Types between Clients, Databases, and Directories for Enterprise User Security
-
1.1
Introduction to Enterprise User Security
-
2
Getting Started with Enterprise User Security
- 2.1 Configuring Your Database to Use the Directory
- 2.2 Registering Your Database with the Directory
- 2.3 Registering an Oracle RAC Database with the Directory
- 2.4 Creating a Shared Schema in the Database
- 2.5 Mapping Enterprise Users to the Shared Schema
- 2.6 Connecting to the Database as an Enterprise User
- 2.7 Using Enterprise Roles
- 2.8 Using Proxy Permissions
- 2.9 Using Pluggable Databases
- 3 Configuration and Administration Tools Overview
-
4
Enterprise User Security Configuration Tasks and Troubleshooting
- 4.1 Enterprise User Security Configuration Overview
- 4.2 Enterprise User Security Configuration Roadmap
- 4.3 Preparing the Directory for Enterprise User Security (Phase One)
- 4.4 Configuring Enterprise User Security Objects in the Database and the Directory (Phase Two)
- 4.5 Configure Enterprise User Security for the Authentication Method You Require (Phase Three)
- 4.6 Troubleshooting Enterprise User Security
-
5
Administering Enterprise User Security
- 5.1 Administering Identity Management Realms
- 5.2 Administering Enterprise Users
- 5.3 Configuring User-Defined Enterprise Groups
- 5.4 Configuring Databases for Enterprise User Security
- 5.5 Administering Enterprise Domains
-
6
Enterprise User Security Manager (EUSM) Command Reference
- 6.1 About Using a Secure External Password Store
- 6.2 About SSL Port Connectivity through EUSM to OID
-
6.3
Enterprise User Security Manager (EUSM) Command Summary
- 6.3.1 createDomain
- 6.3.2 deleteDomain
- 6.3.3 listDomains
- 6.3.4 listDomainInfo
- 6.3.5 addDomainAdmin
- 6.3.6 removeDomainAdmin
- 6.3.7 listDomainAdmins
- 6.3.8 addDatabase
- 6.3.9 removeDatabase
- 6.3.10 addDBAdmin
- 6.3.11 listDBAdmins
- 6.3.12 listDBInfo
- 6.3.13 removeDBAdmin
- 6.3.14 createMapping
- 6.3.15 deleteMapping
- 6.3.16 listMappings
- 6.3.17 setAuthTypes
- 6.3.18 createRole
- 6.3.19 deleteRole
- 6.3.20 addGlobalRole
- 6.3.21 removeGlobalRole
- 6.3.22 grantRole
- 6.3.23 revokeRole
- 6.3.24 listEnterpriseRoles
- 6.3.25 listEnterpriseRolesOfUser
- 6.3.26 listEnterpriseRoleInfo
- 6.3.27 listGlobalRolesInDB
- 6.3.28 listSharedSchemasInDB
- 6.3.29 createProxyPerm
- 6.3.30 deleteProxyPerm
- 6.3.31 addTargetUser
- 6.3.32 removeTargetUser
- 6.3.33 grantProxyPerm
- 6.3.34 revokeProxyPerm
- 6.3.35 listProxyPermissions
- 6.3.36 listProxyPermissionsOfUser
- 6.3.37 listProxyPermissionInfo
- 6.3.38 listTargetUsersInDB
- 6.3.39 setDBOIDAuth
- 6.3.40 listDBOIDAuth
- 6.3.41 addToPwdAccessibleDomains
- 6.3.42 removeFromPwdAccessibleDomains
- 6.3.43 listPwdAccessibleDomains
- 6.3.44 listRealmCommonAttr
- 6.3.45 createAppCtxNamespace
- 6.3.46 deleteAppCtxNamespace
- 6.3.47 listAppCtxNamespaces
- 6.3.48 createAppCtxAttribute
- 6.3.49 deleteAppCtxAttribute
- 6.3.50 listAppCtxAttributes
- 6.3.51 createAppCtxAttributeValue
- 6.3.52 deleteAppCtxAttributeValue
- 6.3.53 listAppCtxAttributeValues
- 6.3.54 createAppCtxUsers
- 6.3.55 deleteAppCtxUsers
- 6.3.56 listAppCtxUsers
- A SSL External Users Conversion Script
-
B
Integrating Enterprise User Security with Microsoft Active Directory
- B.1 About Direct Integration with Microsoft Active Directory
- B.2 Set Up Synchronization Between Active Directory and Oracle Internet Directory
- B.3 Set Up Active Directory to Interoperate with Oracle Client
- B.4 Set Up Oracle Database to Interoperate with Microsoft Active Directory
- B.5 Set Up Oracle Database Client to Interoperate with Microsoft Active Directory
- B.6 Obtain an Initial Ticket for the Client
- B.7 Configure Enterprise User Security for Kerberos Authentication
- Glossary
- Index