Chapter 4. Authentication and User Security
In this chapter we will cover:
- Performing a security evaluation using Oracle Enterprise Manager
- Using an offline Oracle password cracker
- Using user profiles to enforce password policies
- Using secure application roles
- How to perform authentication using external password stores
- Using SSL authentication
Introduction
Account security probably raises the most controversies and is the most difficult aspect of database security. For example your database could have third-party applications schemas that have more privileges than they actually need.I have seen during my experience many application schema users with all ANY
type privileges or DBA
and SYSDBA
role granted due to a misguided application design. In such ...
Get Oracle 11g Anti-hacker's Cookbook now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.