Chapter 1. Basic Database Security

In this chapter, we will cover the following tasks:

  • Creating a password profile
  • Creating password-authenticated users
  • Changing a user's password
  • Creating a user with the same credentials on another database
  • Locking a user account
  • Expiring a user's password
  • Creating and using OS-authenticated users
  • Creating and using proxy users
  • Creating and using database roles
  • The sysbackup privilege - how, when, and why should you use it?
  • The syskm privilege - how, when, and why should you use it?
  • The sysdg privilege - how, when, and why should you use it?

Introduction

Authentication is a very important process, whose purpose is to determine whether someone or something is, in fact, who or what it claims to be.

In this chapter, you'll learn ...

Get Oracle Database 12c Security Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.