Chapter 1. Basic Database Security
In this chapter, we will cover the following tasks:
- Creating a password profile
- Creating password-authenticated users
- Changing a user's password
- Creating a user with the same credentials on another database
- Locking a user account
- Expiring a user's password
- Creating and using OS-authenticated users
- Creating and using proxy users
- Creating and using database roles
- The
sysbackup
privilege - how, when, and why should you use it? - The
syskm
privilege - how, when, and why should you use it? - The
sysdg
privilege - how, when, and why should you use it?
Introduction
Authentication is a very important process, whose purpose is to determine whether someone or something is, in fact, who or what it claims to be.
In this chapter, you'll learn ...
Get Oracle Database 12c Security Cookbook now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.