2 Oracle Deep Data Security Fundamentals
Before you begin configuring Oracle Deep Data Security (Deep Sec), develop a clear understanding of its core concepts, components, and security model.
This chapter introduces key terminology and explains how IAM registrations and database entities (such as data roles and application identities) converge into a runtime end-user security context. It also details how the fine-grained authorization model enforces row-level and column-level security through data grants, access check functions, and mandatory access controls.