3 User Security on Exadata Database Machine
Increase the security of your data and system by limiting user access and developing strong password security policies.
- Default User Accounts for Oracle Exadata
Several user accounts regularly manage the components of Oracle Exadata. - Default Password Requirements
Oracle Exadata Deployment Assistant (OEDA) implements a default password policy on Oracle Exadata Database Machine. - Default Security Settings Enacted by OEDA
Oracle Exadata Deployment Assistant (OEDA) includes a step to increase hardware security on Exadata Database Machine. - Modifying Password Policies on the Database Servers
The password policies can be modified for only database servers. - Creating Oracle Exadata System Software Users and Roles
You can control which Oracle Exadata System Software commands users can run by granting privileges to roles, and granting roles to users. - Security Policies for Oracle Exadata Storage Server Operating System Users
User access to the operating system can be secured by the use of secure, hardened passwords.
3.1 Default User Accounts for Oracle Exadata
Several user accounts regularly manage the components of Oracle Exadata.
In addition to the root
user, Oracle Exadata Storage Servers have two users, celladmin
and cellmonitor
. The celladmin
user is used to run all services on the cell. The cellmonitor
user is used for monitoring purposes. The cellmonitor
user cannot run services on the cell. Other Oracle Exadata components have users for the management of the component.
Note:
After Oracle Exadata has been deployed, the installation process disables all root SSH keys and expires all user passwords as a security measure for your system. If you do not want the SSH keys disabled or the passwords expired, advise the installation engineer before the deployment.Starting with Oracle Exadata System Software release 19.1.0, two new users are created, to improve security of specific actions. The cellofl
user runs query offload processes on the storage servers as a non-root
user. The exawatch
user is responsible for collecting and archiving system statistics on both the database servers and the storage servers.
The following table lists the default users and passwords for the Oracle Exadata components. All default passwords should be changed after installation of Oracle Exadata. Refer to My Oracle Support note 1291766.1 for information about changing the default user accounts passwords.
Table 3-1 Default Oracle Exadata Users and Passwords
Account | Default Password | Account Type | Component(s) |
---|---|---|---|
|
|
Operating system user |
Oracle Exadata Database Servers Oracle Exadata Storage Servers RDMA Network Fabric switches Database server ILOMs Oracle Exadata Storage Server ILOMs RDMA Network Fabric ILOMs |
|
|
Operating system user |
Oracle Exadata Database Servers |
Note: This account exists only if role separation is chosen during deployment. |
|
Operating system user |
Oracle Exadata Database Servers |
|
Note: Commencing with the Oracle Exadata
Deployment Assistant (OEDA) November 2019
release, the password of the |
Operating system user |
Oracle Exadata Storage Servers |
|
Note: The password of the
|
Oracle Exadata System Software user |
Oracle Exadata Storage Servers |
|
Note: Commencing with the OEDA November 2019 release, the password of the
|
Operating system user |
Oracle Exadata Storage Servers |
Note: This account has no login privileges and exists only in release 19.1.0 and later. |
Operating system user |
Oracle Exadata Storage Servers |
|
|
Note: Commencing with the OEDA November 2019 release, the password of the
|
Operating system user |
Oracle Exadata Database Servers |
|
Note: Commencing with the OEDA November 2019 release, the password of the
|
Operating system user |
Oracle Exadata Database Servers |
Note: This account has no login privileges and exists only in release 12.1.2.1.0 and later. |
Operating system user |
Oracle Exadata Database Servers |
|
Note: This account has no login privileges and exists only in release 19.1.0 and later. |
Operating system user |
Oracle Exadata Database Servers Oracle Exadata Storage Servers |
|
|
|
Oracle Database user |
Oracle Exadata Database Servers |
|
|
Oracle Database user |
Oracle Exadata Database Servers |
Grub boot loader |
|
Operating system user |
Oracle Exadata Database Servers Oracle Exadata Storage Servers |
|
|
Firmware user |
InfiniBand Network Fabric switches |
|
|
ILOM user |
InfiniBand Network Fabric switches |
|
|
ILOM user |
InfiniBand Network Fabric switches |
|
|
Firmware/switch administrator |
RoCE Network Fabric switches |
|
Note: You should secure the |
Firmware user |
Ethernet switches |
|
Note: The password for the |
Firmware user |
Power distribution units (PDUs) Keyboard, video, mouse (KVM) |
Note: Management Server (MS) uses this account to manage ILOM and reset it if it detects a hang. Do not modify this account. This account is to be used by MS only. |
The |
ILOM user |
Database server ILOMs Oracle Exadata Storage Server ILOMs |
Note: Management Server (MS) uses this account for hardware monitoring and failure handling using an automatic ILOM SNMP notification rule. Do not modify this account or the associated ILOM SNMP notification rule. This account is to be used by MS only. |
The |
ILOM SNMP version 3 user |
Database server ILOMs Oracle Exadata Storage Server ILOMs |
Note: By default, this account is disabled and cannot be used to log in to the RoCE Network Fabric switch. Do not delete this account. Otherwise, verification of the switch configuration will fail. |
RoCE Network Fabric switch user |
RoCE Network Fabric switches |
3.2 Default Password Requirements
Oracle Exadata Deployment Assistant (OEDA) implements a default password policy on Oracle Exadata Database Machine.
The last step of OEDA, "Secure Oracle Exadata Database Machine", implements the following password requirements:
- Dictionary words are not valid or accepted.
- Character classes for passwords are uppercase letters, lowercase letters, digits, and special characters.
- Passwords must contain characters from all four character classes. Passwords using only one, two, or three character classes are not allowed.
- The minimum length of a password is eight characters.
- Pass-phrases are allowed. A pass-phrase should contain at least three words, be 16 to 40 characters in length, and contain different character classes.
- A new password cannot be similar to old passwords. There must be at least eight characters in the new password that were not present in the old password.
- A maximum of three consecutive characters of the same value can be used in a password.
- A maximum of four consecutive characters of the same character class can be used in a password. For example,
abcde1#6B
cannot be used as a password because it uses five consecutive lower case letters.
Parent topic: User Security on Exadata Database Machine
3.3 Default Security Settings Enacted by OEDA
Oracle Exadata Deployment Assistant (OEDA) includes a step to increase hardware security on Exadata Database Machine.
The last step of OEDA, Secure Oracle Exadata Database Machine
, implements the following security policies:
- For all newly created operating system users on the database servers and storage servers, the following password-aging values are set:
- The maximum number of days for a password is 60 days. Starting with Oracle Exadata System Software release 19.1.0, this value was reduced from 90 days to 60 days.
- The minimum amount of time between password changes is 24 hours.
- The number of days of alerts before a password change is seven days.
- All non-root users must change their password at their next log in.
- An operating system user account is temporarily locked for 10 minutes after one failed log in attempt.
- An operating system user account is locked after five failed attempts.
- A log-in session terminates after 14400 seconds of no input.
-
With Oracle Exadata System Software release 19.1.0 or later, SSH sessions automatically terminate after 600 seconds of inactivity. With older releases, SSH sessions automatically end after 7200 seconds of inactivity.
-
For the
root
user, SSH equivalency is removed for all database servers and Oracle Exadata Storage Servers. -
The following permissions are set by OEDA:
- The Automatic Diagnostic Repository (ADR) base directory,
$ADR_BASE
, has SUID (Set owner User ID) on thediag
directory and its sub-directories. - The
celladmin
user group has read and write permissions on the$ADR_BASE
.
- The Automatic Diagnostic Repository (ADR) base directory,
Parent topic: User Security on Exadata Database Machine
3.4 Modifying Password Policies on the Database Servers
The password policies can be modified for only database servers.
Related Topics
See Also:
Refer to thelogin.defs
and passwdqc.conf
man pages for additional information
Parent topic: User Security on Exadata Database Machine
3.5 Creating Oracle Exadata System Software Users and Roles
You can control which Oracle Exadata System Software commands users can run by granting privileges to roles, and granting roles to users.
For example, you can specify that a user can run the LIST GRIDDISK
command but not ALTER GRIDDISK
. This level of control is useful in Oracle Cloud environments, where you might want to allow full access to the system to only a few users.
- Overview of Creating Exadata System Software Users
To set up users and roles, you execute a series of commands. - Creating Roles and Getting Information about Roles
Use theCREATE ROLE
command to create roles for Oracle Exadata System Software users. - Granting and Revoking Privileges
Use theGRANT PRIVILEGE
command to grant privileges to roles for Oracle Exadata System Software users. - Creating Users
Use theCREATE USER
command to create Oracle Exadata System Software users. - Configuring Password Expiration for Users Accessing the Server Remotely
You can configureCELL
attributes to expire user passwords. - Granting and Revoking Roles
Use theGRANT ROLE
command to create roles to Oracle Exadata System Software users.
Related Topics
Parent topic: User Security on Exadata Database Machine
3.5.1 Overview of Creating Exadata System Software Users
To set up users and roles, you execute a series of commands.
Oracle Exadata System Software users are required when running ExaCLI in on-premise or Oracle Cloud environments. ExaCLI enables you to manage cells remotely from compute nodes. When you run ExaCLI on a compute node, you need to specify a user name to use to connect to the cell node. The Management Server (MS) authenticates the user credentials, then performs authorization checks on the commands issued by the user. If the user does not have the proper privileges to run a command, MS returns an error.
The password security key is encrypted using Password-Based Key Derivation Function 2 (PBKDF2) with HMAC-SHA1.
The high-level steps for creating users and roles for use with Oracle Exadata System Software are:
- Create roles using the CREATE ROLE command.
- Grant privileges to roles using the GRANT PRIVILEGE command.
- Create users using the CREATE USER command.
- Grant roles to users using the GRANT ROLE command.
You can also revoke privileges from roles using the REVOKE PRIVILEGE command. To revoke roles from users, use the REVOKE ROLE command.
Parent topic: Creating Oracle Exadata System Software Users and Roles
3.5.2 Creating Roles and Getting Information about Roles
Use the CREATE ROLE
command to create roles for Oracle Exadata System Software users.
For example, to create a role for administrators, you could use the following command:
CellCLI> CREATE ROLE admin
After you have created a role, you can then grant privileges to the role using the GRANT PRIVILEGE
command. You can also grant the role to users, for example:
CellCLI> GRANT PRIVILEGE ALL ACTIONS ON ALL OBJECTS TO ROLE admin
CellCLI> GRANT ROLE admin TO USER username
To get detailed information about a role, use the LIST ROLE
command. The following command returns all the attributes for the admin
role.
CellCLI> LIST ROLE admin DETAIL
name: admin
privileges: object=all objects, verb=all actions,
attributes=all attributes, options=all options
Related Topics
Parent topic: Creating Oracle Exadata System Software Users and Roles
3.5.3 Granting and Revoking Privileges
Use the GRANT PRIVILEGE
command to grant privileges to roles for Oracle Exadata System Software users.
Related Topics
Parent topic: Creating Oracle Exadata System Software Users and Roles
3.5.4 Creating Users
Use the CREATE USER
command to create Oracle Exadata System Software users.
A newly created user does not have any privileges. The Oracle Exadata System Software user is granted privileges through roles granted to the user.
Parent topic: Creating Oracle Exadata System Software Users and Roles
3.5.5 Configuring Password Expiration for Users Accessing the Server Remotely
You can configure CELL
attributes to expire user passwords.
In Oracle Exadata System Software release 19.1.0, there are new CELL
attributes for configuring password security for users that access Oracle Exadata System Software servers remotely, such as with REST API or ExaCLI. These attributes determine if the user is able to change the password remotely, the amount of time before a user password expires, and the number of days prior to password expiration that the user receives warning messages. In the default configuration, user passwords do not expire.
Note:
The CELL attributes for password expiration apply only to users created with Oracle Exadata System Software. Password expiration applies only to users that are displayed with theLIST USER
command and does not apply to operating system users like celladmin
or oracle
.
Parent topic: Creating Oracle Exadata System Software Users and Roles
3.5.6 Granting and Revoking Roles
Use the GRANT ROLE
command to create roles to Oracle Exadata System Software users.
Related Topics
Parent topic: Creating Oracle Exadata System Software Users and Roles
3.6 Security Policies for Oracle Exadata Storage Server Operating System Users
User access to the operating system can be secured by the use of secure, hardened passwords.
The passwords for operating system users who administer Oracle Exadata System Software adhere to the security guidelines enacted by Oracle Exadata Deployment Assistant (OEDA). See Default Security Setting Enacted by OEDA for more information.
- Changing a Password
Use the operating system commandpasswd
to change user passwords. - Enabling the Security Policies for Operating System Users
The/opt/oracle.cellos/RESECURED_NODE
file enables the security policies. - Viewing Failed Operating System Password Attempts
Use thepam_tally2
operating system utility to view log in attempts with incorrect passwords. - Resetting a Locked Operating System User Account
If an operating system user account has 5 failed log in attempts, then the account is locked.
Parent topic: User Security on Exadata Database Machine
3.6.1 Changing a Password
Use the operating system command passwd
to change user passwords.
Operating system users are notified of the need to change their passwords 7 days before the expiration date.
3.6.2 Enabling the Security Policies for Operating System Users
The /opt/oracle.cellos/RESECURED_NODE
file enables the security policies.
If the file does not exist, then you can reset the security policies for all operating system users by performing the following steps:
3.6.3 Viewing Failed Operating System Password Attempts
Use the pam_tally2
operating system utility to view log in attempts with incorrect passwords.