Chapter 4. Authentication and User Security

In this chapter we will cover:

  • Performing a security evaluation using Oracle Enterprise Manager
  • Using an offline Oracle password cracker
  • Using user profiles to enforce password policies
  • Using secure application roles
  • How to perform authentication using external password stores
  • Using SSL authentication

Introduction

Account security probably raises the most controversies and is the most difficult aspect of database security. For example your database could have third-party applications schemas that have more privileges than they actually need.I have seen during my experience many application schema users with all ANY type privileges or DBA and SYSDBA role granted due to a misguided application design. In such ...

Get Oracle 11g Anti-hacker's Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.