Index
A B C D E F G H I J K L M N O P Q R S T U V W X
A
- access control
-
- encryption, problems not solved by, 9.2.1
- enforcing, 10.8.1
- object privileges, 4.5.1
- password encryption, 3.2.1
- access control list (ACL)
-
- about, 4.11.1
- advantages, 4.11
- affect of upgrade from earlier release, 4.11.2
- creating, 4.11.3
- DBMS_NETWORK_ACL package
-
- using, 4.11.3.1
- DBMS_NETWORK_ACL_ADMIN package
-
- using, 4.11.3
- examples, 4.11.4
- finding information about, 4.11.10
- hosts, assigning, 4.11.3.2
- network hosts, using wildcards to specify, 4.11.5
- ORA-24247 errors, 4.11.2
- order of precedence
-
- hosts, 4.11.6
- port ranges, 4.11.7
- privilege assignments
-
- about, 4.11.8
- database administrators checking, 4.11.8.1
- users checking, 4.11.8.2
- setting precedence
-
- multiple roles, 4.11.9
- multiple users, 4.11.9
- syntax for creating, 4.11.3.1
- account locking
-
- example, 3.2.2.3
- explicit, 3.2.2.3
- password management, 3.2.2.3
- PASSWORD_LOCK_TIME initialization parameter, 3.2.2.3
- ADMIN OPTION
-
- about, 4.6.1.1
- revoking privileges, 4.7.1
- revoking roles, 4.7.1
- roles, 4.4.5.1
- system privileges, 4.3.4
- administrative user passwords
-
- default, importance of changing, 10.5
- administrator privileges
-
- access, 10.8.2
- operating system authentication, 3.3.2
- passwords, 3.3.3, 10.5
- SYSDBA and SYSOPER access, centrally controlling, 3.3.1, 3.3.1
- write, on listener.ora file, 10.8.2
- adump audit files directory, 6.6.1
- "all permissions", 10.3
- ALTER privilege statement
-
- SQL statements permitted, 5.7.2
- ALTER PROFILE statement
-
- password management, 3.2.2.1
- ALTER RESOURCE COST statement, 2.4.4.2
- ALTER ROLE statement
-
- changing authorization method, 4.4.3
- ALTER SESSION statement
-
- schema, setting current, 5.6.1
- ALTER USER privilege, 2.3
- ALTER USER statement
-
- default roles, 4.10.2
- explicit account unlocking, 3.2.2.3
- GRANT CONNECT THROUGH clause, 3.10.1.3
- passwords, changing, 2.3.1
- passwords, expiring, 3.2.2.4
- profiles, changing, 3.2.2.4
- REVOKE CONNECT THROUGH clause, 3.10.1.3
- user profile, 3.2.2.1
- altering users, 2.3
- anonymous PL/SQL blocks, 5.5.3
- ANY system privilege
-
- guidelines for security, 10.6
- application contexts
-
- about, 7.1
- as secure data cache, 7.1
- bind variables, 8.1.3
- client session-based
-
- about, 7.5.1
- CLIENTCONTEXT namespace, clearing value from, 7.5.4
- CLIENTCONTEXT namespace, setting value in, 7.5.2
- retrieving client session ID, 7.5.3
- database session-based
-
- about, 7.3.1
- cleaning up after user exits, 7.3.1
- components, 7.3.1
- creating, 7.3.2
- database links, 7.3.3.5
- dynamic SQL, 7.3.3.3
- example, 7.3.5
- externalized, using, 7.3.8
- how to use, 7.3
- initializing externally, 7.3.6
- initializing globally, 7.3.7
- ownership, 7.3.2
- parallel queries, 7.3.3.4
- PL/SQL package creation, 7.3.3
- running package, 7.3.4
- session information, setting, 7.3.3.6
- SYS_CONTEXT function, 7.3.3.2
- trusted procedure, 7.1
- DBMS_SESSION.SET_CONTEXT procedure, 7.3.3.6, 7.3.3.6
- driving context, 7.6
- finding information about, 7.6
- global
-
- about, 7.4.1
- authenticating nondatabase users, 7.4.3.5
- authenticating user for multiple applications, 7.4.3.4
- components, 7.4.1
- creating, 7.4.2
- example for client session IDs, 7.4.5
- example of authenticating nondatabase users, 7.4.3.5
- example of authenticating user moving to different application, 7.4.3.4
- example of setting values for all users, 7.4.3.3
- ownership, 7.4.2
- PL/SQL package creation, 7.4.3.1
- process, lightweight users, 7.4.6.2
- process, standard, 7.4.6.1
- reasons for using, 7.4.1
- sharing values globally for all users, 7.4.3.3
- used for One Big Application User scenarios, 8.5.5
- user name retrieval with USER function, 7.4.3.2
- uses for, 8.5.5
- global application context
-
- system global area, 7.4.1
- performance, 8.4.2.7
- policy groups, used in, 8.3.5.1
- returning predicate, 8.1.3
- session information, retrieving, 7.3.3.2
- support for database links, 7.3.6
- types, 7.2
- users, nondatabase connections, 7.4.1, 7.4.3.5
- Virtual Private Database, used with, 8.1.3
- application developers
-
- CONNECT role change, 10.10.3.2
- application security
-
- specifying attributes, 7.3.2
- application users who are database users
-
- Oracle Virtual Private Database, how it works with, 8.5.5
- applications
-
- about security policies for, 5.1
- database users, 5.2.1
- enhancing security with, 4.4.1.1
- object privileges, 5.7.1
- object privileges permitting SQL statements, 5.7.2
- One Big Application User model, 5.2.2
-
- about, 5.2.1
- security risks of, 5.2.1
- Oracle Virtual Private Database, how it works with, 8.5.1
- privileges, managing, 5.3
- roles
-
- multiple, 4.4.1.2.1
- privileges, associating with database roles, 5.5
- security, 4.4.7, 5.2.2
- security considerations for use, 5.2
- security limitations, 8.5.1
- security policies, 8.3.5.4
- validating with security policies, 8.3.5.6
- AQ_ADMINISTRATOR_ROLE role
-
- about, 4.4.2
- AQ_USER_ROLE role
-
- about, 4.4.2
- attacks
-
- Denial of Service, 10.8.2
-
- bad packets, addressing, 5.8.1
- See also intruders
- audit files
-
- activities always written to, 6.2.2
- archiving, 6.5.3.6.1
- directory, 6.6.1
- file names, form of, 6.6.1
- fine-grained audit trail, 6.8.4
- operating system file, contents, 6.5.4.1
- security guidelines, 10.9.3
- where written to, 6.6.1
- AUDIT statement
-
- about, 6.5.3.4
- schema objects, 6.5.9.3
- statement auditing, 6.5.6.2
- system privileges, 6.5.6.2
- audit trail
-
- about, 6.2.1
- archiving, 6.9
- deleting views, 6.10.3
- finding information about, 6.10.1
- interpreting, 6.10.2
- types of, 6.2.1
- See also standard audit trail
- AUDIT_FILE_DEST initialization parameter
-
- about, 6.5.4.3
- setting for OS auditing, 6.5.4.3
- AUDIT_SYS_OPERATIONS initialization parameter
-
- auditing SYS, 6.6.1
- AUDIT_TRAIL initialization parameter
-
- about, 6.5.3.3
- auditing SYS, 6.6.1
- database, starting in read-only mode, 6.5.3.3
- DB (database) setting, 6.5.3.3
- DB, EXTENDED setting, 6.5.3.3
- disabling, 6.5.3.3
- OS (operating system) setting, 6.5.3.3
- OS setting, Windows impact, 6.5.4.3
- setting, 6.5.3.3
- XML setting, 6.5.3.3
- XML, EXTENDED setting, 6.5.3.3
- auditing
-
- administrators
-
- See standard auditing
- audit options, 6.1.2
- audit records, 6.2.1
- audit trails, 6.2.1
- database audit trail, using, 6.5.5
- database user names, 3.5
- default auditing, enabling, 6.4
- finding information about, 6.10.1
- fine-grained
-
- See fine-grained auditing
- guidelines for security, 10.9
- historical information, 10.9.3
- keeping information manageable, 10.9.2
- LOBs, auditing
-
- user-defined columns, 6.8.1
- middle-tier systems, real user actions, 3.10.1.9
- multitier environments
-
- See standard auditing
- network
-
- See standard auditing
- object columns, 6.8.1
- objects
-
- See standard auditing
- One Big Application User, compromised by, 5.2.1
- operating-system user names, 3.5
- privileges
-
- See standard auditing
- range of focus, 6.1.2
- Sarbanes-Oxley Act
-
- auditing, meeting compliance through, 6.4
- meeting compliance through auditing, 10.9.1
- schema objects
-
- See standard auditing
- SQL statements
-
- See standard auditing
- standard
-
- See standard audit trail, standard auditing
- statements
-
- See standard auditing
- suspicious activity, 10.9.4
- views
-
- active object options, 6.10.2.3
- active privilege options, 6.10.2.2
- active statement options, 6.10.2.1
- default object options, 6.10.2.4
- when audit options take effect, 6.5.3.1
- See also standard auditing, standard audit trail, fine-grained auditing
- authentication
-
- about, 3.1
- administrators
-
- operating system, 3.3.2
- passwords, 3.3.3
- SYSDBA and SYSOPER access, centrally controlling, 3.3.1
- by database, 3.4
- by SSL, 3.7.1.1
- certificate, 10.8.1
- client, 10.8.1, 10.8.1
- client-to-middle tier process, 3.10.1.4.1
- database administrators, 3.3
- databases, using
-
- about, 3.4.1
- advantages, 3.4.2
- procedure, 3.4.3
- directory service, 3.7.1
- directory-based services, 3.6.2
- external authentication
-
- about, 3.8.1
- advantages, 3.8.2
- operating system authentication, 3.8.4
- user creation, 3.8.3
- global authentication
-
- about, 3.7
- advantages, 3.7.2
- user creation for private schemas, 3.7.1.1
- user creation for shared schemas, 3.7.1.2
- middle-tier authentication
-
- Kerberos proxy, 3.10.1.4.2
- proxies, example, 3.10.1.6
- multitier, 3.9
- network authentication
-
- Secure Sockets Layer, 3.6.1
- third-party services, 3.6.2
- One Big Application User, compromised by, 5.2.1
- operating system authentication
-
- about, 3.5
- advantages, 3.5
- disadvantages, 3.5
- proxy user authentication
-
- about, 3.10.1
- expired passwords, 3.10.1.3
- public key infrastructure, 3.6.2
- RADIUS, 3.6.2
- remote, 10.8.1, 10.8.1
- specifying when creating a user, 2.2.3
- strong, 10.5
- user, 10.8.1
- See also passwords, proxy authentication
- authorization
-
- about, 4
- changing for roles, 4.4.3
- global
-
- about, 3.7
- advantages, 3.7.2
- multitier, 3.9
- omitting for roles, 4.4.3
- operating system, 4.4.4.3.1
- roles, about, 4.4.4
- automatic reparse
-
- Oracle Virtual Private Database, how it works with, 8.5.2
- Automatic Storage Management (ASM)
-
- SYSASM privilege, Preface
B
- banners
-
- auditing user actions, configuring, 5.8.5
- unauthorized access, configuring, 5.8.5
- batch jobs, authenticating users in, 3.2.4.1
- BFILEs
-
- guidelines for security, 10.6
- bind variables
-
- application contexts, used with, 8.1.3
- BLOBS
-
- encrypting, 9.3.6
C
- cascading revokes, 4.7.3
- CATNOAUD.SQL script
-
- about, 6.10.3
- audit trail views, deleting with, 6.10.3
- certificate authentication, 10.8.1
- certificate key algorithm
-
- Secure Sockets Layer, 10.8.3
- certificates for user and server authentication, 10.8.1
- change_on_install default password, 10.5
- character sets
-
- role names, multibyte characters in, 4.4.3
- role passwords, multibyte characters in, 4.4.4.1
- cipher suites
-
- Secure Sockets Layer, 10.8.3
- client connections
-
- guidelines for security, 10.8.1
- securing, 10.8.1
- client identifiers
-
- about, 3.10.2
- global application context, independent of, 3.10.2.3
- CLIENT_IDENTIFIER USERENV attribute
-
- JDBC applications, setting for, 3.10.2.3
- setting and clearing with DBMS_SESSION package, 3.10.2.3
- setting for applications that use JDBC, 3.10.2.3
- setting with OCI user session handle attribute, 3.10.2.3
- See also USERENV namespace
- column masking behavior, 8.3.4.3
-
- column specification, 8.3.4.3
- restrictions, 8.3.4.3
- columns
-
- granting privileges for selected, 4.6.2.3
- granting privileges on, 4.6.2.3
- INSERT privilege and, 4.6.2.3
- listing users granted to, 4.12.3
- privileges, 4.6.2.3
- pseudo columns
-
- USER, 4.5.5.3
- revoking privileges on, 4.7.2.2
- configuration
-
- guidelines for security, 10.7
- configuration files
-
- listener.ora, 10.8.2
- sample listener.ora file, 10.8.2
- server.key encryption file, 10.8.3
- tsnames.ora, 10.8.3
- typical directory, 10.8.3, 10.8.3
- CONNECT role
-
- about, 10.10
- applications
-
- account provisioning, 10.10.2.2
- affects of, 10.10.2
- database upgrades, 10.10.2.1
- installation of, 10.10.2.3
- script to create, 4.4.2
- users
-
- application developers, impact, 10.10.3.2
- client-server applications, impact, 10.10.3.3
- general users, impact, 10.10.3.1
- how affects, 10.10.3
- why changed, 10.10.1
- connection pooling
-
- about, 3.9
- global application contexts, 7.4.1
- nondatabase users, 7.4.3.5
- proxy authentication, 3.10.1.4
- connections
-
- SYS privilege, 10.3
- CPU time limit, 2.4.2.3
- CREATE ANY TABLE statement
-
- non-administrative users, 10.3
- CREATE CONTEXT statement
-
- about, 7.3.2
- example, 7.3.2
- CREATE EXTERNAL JOB privilege
-
- scheduling job in grantee schema, 4.3.2.2
- CREATE PROFILE statement
-
- account locking period, 3.2.2.3
- failed login attempts, 3.2.2.3
- password aging and expiration, 3.2.2.4
- password management, 3.2.2.1
- passwords, example, 3.2.2.4
- CREATE ROLE statement
-
- IDENTIFIED BY option, 4.4.4.1
- IDENTIFIED EXTERNALLY option, 4.4.4.3
- CREATE SCHEMA statement
-
- securing, 5.6.1
- CREATE SESSION statement
-
- CONNECT role privilege, 10.4
- securing, 5.6.1
- CREATE USER statement
-
- explicit account locking, 3.2.2.3
- IDENTIFIED BY option, 2.2.3
- IDENTIFIED EXTERNALLY option, 2.2.3
- passwords, expiring, 3.2.2.4
- user profile, 3.2.2.1
- cursors
-
- reparsing, for application contexts, 7.3.4
- shared, used with Virtual Private Database, 8.1.3
- custom installation, 10.7, 10.7
D
- data definition language (DDL)
-
- roles and privileges, 4.4.1.5
- standard auditing, 6.5.6.1
- data dictionary
-
- protecting, 10.6
- securing with O7_DICTIONARY_ACCESSIBILITY, 4.3.2.1
- data dictionary views
-
- See views
- data files, 10.6
-
- guidelines for security, 10.6
- data manipulation language (DML)
-
- privileges controlling, 4.5.4.1
- standard auditing, 6.5.6.1
- data security
-
- encryption, problems not solved by, 9.2.3
- database administrators (DBAs)
-
- access, controlling, 9.2.2
- authentication, 3.3
- malicious, encryption not solved by, 9.2.2
- Database Configuration Assistant (DBCA)
-
- default passwords, changing, 10.5
- password settings in default profile, 3.2.3
- user accounts, automatically locking and expiring, 10.3
- database links
-
- application context support, 7.3.6
- application contexts, 7.3.3.5
- auditing, 6.5.9.1
- authenticating with Kerberos, 3.6.2
- authenticating with third-party services, 3.6.2
- global user authentication, 3.7.2
- object privileges, 4.5.3
- operating system accounts, care needed, 3.5
- session-based application contexts, accessing, 7.3.3.5
- database upgrades and CONNECT role, 10.10.2.1
- databases
-
- access control
-
- password encryption, 3.2.1
- additional security resources, 1.2
- authentication, 3.4
- database user and application user, 5.2.1
- default security features, summary, 1.1
- granting privileges, 4.6
- granting roles, 4.6
- limitations on usage, 2.4.1
- read-only mode, starting in, 6.5.3.3
- security and schemas, 5.6
- security embedded, advantages of, 5.2.2
- security policies based on, 8.1.2.1
- DBA role
-
- about, 4.4.2
- DBA_NETWORK_ACL_PRIVILEGES view, 4.11.8
- DBA_ROLE_PRIVS view
-
- application privileges, finding, 5.3
- DBCA
-
- See Database Configuration Assistant (DBCA)
- DBMS_CRYPTO package
-
- about, 9.4
- encryption algorithms supported, 9.4
- examples, 9.6.1
- DBMS_FGA package
-
- about, 6.8.5.1
- ADD_POLICY procedure, 6.8.5.2
- DISABLE_POLICY procedure, 6.8.5.4
- DROP_POLICY procedure, 6.8.5.5
- ENABLE_POLICY procedure, 6.8.5.4
- DBMS_OBFUSCATION_TOOLKIT package
-
- backward compatibility, 9.4
- See also DBMS_CRYPTO package
- DBMS_RLS package
-
- about, 8.3.1
- DBMS_RLS.ADD_CONTEXT procedure, 8.3.1
- DBMS_RLS.ADD_GROUPED_POLICY procedure, 8.3.1
- DBMS_RLS.ADD_POLICY
-
- sec_relevant_cols parameter, 8.3.4.1
- sec_relevant_cols_opt parameter, 8.3.4.3
- DBMS_RLS.ADD_POLICY procedure
-
- about, 8.3.1
- DBMS_RLS.CREATE_POLICY_GROUP procedure, 8.3.1
- DBMS_RLS.DELETE_POLICY_GROUPS procedure, 8.3.1
- DBMS_RLS.DISABLE_GROUPED_POLICY procedure, 8.3.1
- DBMS_RLS.DROP_CONTEXT procedure, 8.3.1
- DBMS_RLS.DROP_GROUPED_POLICY procedure, 8.3.1
- DBMS_RLS.DROP_POLICY procedure, 8.3.1
- DBMS_RLS.ENABLE_GROUPED_POLICY procedure, 8.3.1
- DBMS_RLS.ENABLE_POLICY procedure, 8.3.1
- DBMS_RLS.REFRESH_GROUPED_POLICY procedure, 8.3.1
- DBMS_RLS.REFRESH_POLICY procedure, 8.3.1
- DBMS_SESSION package
-
- client identifiers, using, 3.10.2.3
- global application context, used in, 7.4.3
- SET_CONTEXT procedure
-
- about, 7.3.3.6
- application context name-value pair, setting, 7.3.3.1
- SET_ROLE procedure, 5.5.3, 5.5.3
- DBMS_SESSION.SET_CONTEXT procedure
-
- about, 7.3.3.6
- syntax, 7.3.3.6
- username and client_id settings, 7.4.3.2
- DBMS_SESSION.SET_ROLE procedure, 5.5.3
-
- secure application roles, 5.4.2
- DBMS_SQL package
-
- SET_ROLE procedure, 5.5.4
- DBMS_SQLHASH encryption package
-
- about, 9.5.1
- GETHASH function, 9.5.2
- DBSEG60064|Using Default Auditing for Security-Relevant SQL Statements and Privileges, 6.4
- DBSNMP user account
-
- password usage, 10.5
- DDL
-
- See data definition language
- default passwords, 10.5, 10.5, 10.5, 10.5
-
- change_on_install or manager passwords, 10.5
- changing, importance of, 3.2.2.2
- finding, 3.2.2.2
- default permissions, 10.6
- default profiles
-
- about, 3.2.3
- default roles
-
- setting for user, 2.2.8
- specifying, 4.10.2
- default user
-
- accounts, 10.3
- default users
-
- accounts, 10.3
- Enterprise Manager accounts, 10.3
- passwords, 10.5
- defaults
-
- tablespace quota, 2.2.5
- user tablespaces, 2.2.4
- definer's rights
-
- about, 4.5.6.2
- procedure privileges, used with, 4.5.6.2
- procedure security, 4.5.6.2
- secure application roles, 5.4.2
- DELETE privilege
-
- SQL statements permitted, 5.7.2
- DELETE_CATALOG_ROLE role
-
- about, 4.4.2
- SYS schema objects, enabling access to, 4.3.2.3
- Denial of Service (DoS) attacks
-
- audit trail, writing to operating system file, 6.5.3.3
- bad packets, preventing, 5.8.1
- networks, securing, 10.8.2
- dictionary protection mechanism, 4.3.2.1
- directory authentication, configuring for SYSDBA or SYSOPER access, 3.3.1.1
- directory-based services authentication, 3.6.2
- disabling unnecessary services
-
- FTP, TFTP, TELNET, 10.8.2
- dispatcher processes (Dnnn)
-
- limiting SGA space for each session, 2.4.2.5
- DML
-
- See data manipulation language
- driving context, 7.6
- DROP PROFILE statement
-
- example, 2.4.4.2
- DROP ROLE statement
-
- example, 4.4.6
- security domain, affected, 4.4.6
- DROP USER statement
-
- about, 2.5
- schema objects of dropped user, 2.5
- DUAL table
-
- about, 7.3.3.2
- dynamic Oracle Virtual Private Database policy types, 8.3.6.1
- DYNAMIC policy type, 8.3.6.1
E
- eavesdropping
-
- preventing by using SSL, 10.8.1
- encryption
-
- access control, 9.2.1
- BLOBS, 9.3.6
- challenges, 9.3
- data security, problems not solved by, 9.2.3
- DBMS_CRYPTO encryrption package, 9.4
- DBMS_CRYPTO package, 9.4
- examples, 9.6.1
- finding information about, 9.7
- indexed data, 9.3.1
- intruders, 9.2.2
- key generation, 9.3.2
- key storage, 9.3.4
- key transmission, 9.3.3
- keys, changing, 9.3.5
- malicious database administrators, 9.2.2
- network data encryption, 10.8.2
- network traffic, 10.8.2
- problems not solved by, 9.2
- transparent data encryption, 9.3.4.4
- transparent tablespace encryption, 9.3.4.4
- enterprise directory service, 4.4.4.4
- Enterprise Edition, 10.5
- Enterprise Manager
-
- granting roles, 4.4.5
- statistics monitor, 2.4.3
- enterprise roles, 3.7, 4.4.4.4
- enterprise user management, 5.2.1
- Enterprise User Security
-
- application context, globally initialized, 7.3.7.2
- proxy authentication
-
- Oracle Virtual Private Database, how it works with, 8.5.5
- enterprise users
-
- centralized management, 3.7
- global role, creating, 4.4.4.4
- One Big Application User, compromised by, 5.2.1
- proxy authentication, 3.10.1
- shared schemas, protecting users, 5.6.2
- examples
-
- access control lists, 4.11.4
- account locking, 3.2.2.3
- application context, database session-based, 7.3.5
- data encryption
-
- encrypting and decrypting BLOB data, 9.6.3
- encrypting and decrypting procedure with AES 256-Bit, 9.6.2
- encrypting procedure, 9.6.1
- global application context with client session ID, 7.4.5
- locking an account with CREATE PROFILE, 3.2.2.3
- login attempt grace period, 3.2.2.4
- O7_DICTIONARY_ACCESSIBILITY initialization parameter, setting, 4.3.2.1
- Oracle Virtual Private Database
-
- policy groups, 8.3.5.3
- policy implementing, 8.4.2
- simple example, 8.4.1
- passwords
-
- aging and expiration, 3.2.2.4
- changing, 2.3.1
- creating for user, 2.2.3
- privileges
-
- granting ADMIN OPTION, 4.6.1.1
- views, 4.12
- procedure privileges affecting packages, 4.5.6.4, 4.5.6.4
- profiles, assigning to user, 2.2.7
- roles
-
- altering for external authorization, 4.4.3
- applications, assignment in, 5.5.4
- creating for application authorization, 4.4.4.2
- creating for external authorization, 4.4.4.3
- creating for password authorization, 4.4.3
- default, setting, 4.10.2
- views, 4.12
- session ID of user
-
- finding, 2.5
- terminating, 2.5
- standard auditing
-
- BY SESSION, 6.5.10.2.2
- SYS.AUD$ auditing table, changes to, 6.3.2
- system privilege and role, granting, 4.6.1
- tablespaces
-
- assigning default to user, 2.2.4
- quota, assigning to user, 2.2.5
- temporary, 2.2.6
- type creation, 4.5.7.5
- users
-
- account creation, 2.2.1
- creating with GRANT statement, 4.6.1.2
- dropping, 2.5
- middle-tier server proxying a client, 3.10.1.3
- naming, 2.2.2
- object privileges granted to, 4.6.2
- proxy user, connecting as, 3.10.1.3
- EXECUTE privilege
-
- SQL statements permitted, 5.7.2
- EXECUTE_CATALOG_ROLE role
-
- about, 4.4.2
- SYS schema objects, enabling access to, 4.3.2.3
- execution time for statements, measuring, 8.3.6.1
- EXEMPT ACCESS POLICY privilege
-
- Oracle Virtual Private Database enforcements, exemption, 8.5.4
- EXP_FULL_DATABASE role
-
- about, 4.4.2
- expiring a password
-
- explicitly, 3.2.2.4
- exporting data
-
- direct path export impact on Oracle Virtual Private Database, 8.5.4
- policy enforcement, 8.5.4
- external authentication
-
- about, 3.8.1
- advantages, 3.8.2
- network, 3.8.5
- operating system, 3.8.4, 3.8.4
- user creation, 3.8.3
- external network services, fine-grained access to
-
- See access control list (ACL)
- external tables, 10.6
F
- failed login attempts
-
- account locking, 3.2.2.3
- password management, 3.2.2.3
- resetting, 3.2.2.3
- features, new security
-
- See new features, security
- files
-
- BFILEs
-
- operating system access, restricting, 10.6
- BLOB, 9.3.6
- data
-
- operating system access, restricting, 10.6
- external tables
-
- operating system access, restricting, 10.6
- keys, 9.3.4.2
- listener.ora file
-
- guidelines for security, 10.8.2, 10.8.3
- log
-
- audit file location for Windows, 6.6.1
- audit file locations, 6.5.4.3
- operating system access, restricting, 10.6
- restrict listener access, 10.8.2
- server.key encryption file, 10.8.3
- symbolic links, restricting, 10.6
- tnsnames.ora, 10.8.3
- trace
-
- operating system access, restricting, 10.6
- fine-grained access control
-
- See Oracle Virtual Private Database (VPD)
- fine-grained auditing
-
- about, 6.8
- activities always recorded, 6.8.3
- adding alerts to policy, 6.8.5.3
- advantages, 6.8.1, 6.8.1
- archiving audit trail, 6.9
- audit record locations, 6.2.1
- columns, specific, 6.8.5.2
- DBMS_FGA package, 6.8.5.1
- how to use, 6.8.1
- policies
-
- adding, 6.8.5.2
- disabling, 6.8.5.4
- dropping, 6.8.5.5
- enabling, 6.8.5.4
- privileges needed, 6.8.2
- records
-
- archiving, 6.8.4
- purging, 6.8.4
- firewalls
-
- advice about using, 10.8.2
- database server location, 10.8.2
- ports, 10.8.3
- supported types, 10.8.2
- flashback query
-
- auditing, used with, 6.3.1
- Oracle Virtual Private Database, how it works with, 8.5.3
- foreign keys
-
- privilege to use parent key, 4.5.4.2
- FTP service, 10.8.2
- functions
-
- PL/SQL
-
- privileges for, 4.5.6.1
- roles, 4.4.1.4
G
- global application contexts
-
- See application contexts, global
- global authentication
-
- advantages, 3.7.2
- user creation for private schemas, 3.7.1.1
- user creation for shared schemas, 3.7.1.2
- global authentication and authorization, 3.7
- global authorization
-
- advantages, 3.7.2
- role creation, 4.4.4.4
- roles, 3.7
- global roles
-
- about, 4.4.4.4
- global users, 3.7
- grace period for login attempts
-
- example, 3.2.2.4
- grace period for password expiration, 3.2.2.4
- GRANT ALL PRIVILEGES statement
-
- SELECT ANY DICTIONARY privilege, exclusion of, 10.6
- GRANT ANY OBJECT PRIVILEGE system privilege, 4.6.2.2, 4.7.2.1
- GRANT ANY PRIVILEGE system privilege, 4.3.4
- GRANT CONNECT THROUGH clause
-
- for proxy authorization, 3.10.1.3
- GRANT statement, 4.6.1
-
- ADMIN OPTION, 4.6.1.1
- creating a new user, 4.6.1.2
- object privileges, 4.6.2, 5.7.1
- system privileges and roles, 4.6
- when takes effect, 4.10
- WITH GRANT OPTION, 4.6.2.1
- granting privileges and roles
-
- about, 4.3.3
- finding information about, 4.12
- specifying ALL, 4.5.2
- guidelines for security
-
- auditing, 10.9
- custom installation, 10.7, 10.7
- data files and directories, 10.6
- installation and configuration, 10.7
- networking security, 10.8
- operating system accounts, limiting privileges, 10.6
- operating system users, limiting number of, 10.6
- Oracle home default permissions, disallowing modification, 10.6
- passwords, 10.5
- Secure Sockets Layer
-
- mode, 10.8.3
- TCPS protocol, 10.8.3
- symbolic links, restricting, 10.6
- user accounts and privileges, 10.3
H
- hackers
-
- See intruders
- HS_ADMIN_ROLE role
-
- about, 4.4.2
- HTTPS
-
- port, correct running on, 10.8.3
I
- IMP_FULL_DATABASE role
-
- about, 4.4.2
- INDEX privilege
-
- SQL statements permitted, 5.7.2
- indexed data
-
- encryption, 9.3.1
- initialization parameters
-
- application protection, 5.8
- AUDIT_FILE_DEST, 6.2.2, 6.6.1
- AUDIT_SYS_OPERATIONS, 6.2.1, 6.6.1
- AUDIT_SYSLOG_LEVEL, 6.2.1, 6.6.2.3
- AUDIT_TRAIL, 6.5.3.3
- current value, checking, 6.5.3.3
- FAILED_LOGIN_ATTEMPTS, 3.2.3
- MAX_ENABLED_ROLES, 4.10.3
- O7_DICTIONARY_ACCESSIBILITY, 4.3.2.1
- OS_AUTHENT_PREFIX, 3.8.1
- OS_ROLES, 4.4.4.3.1
- PASSWORD_GRACE_TIME, 3.2.2.4, 3.2.3
- PASSWORD_LIFE_TIME, 3.2.2.4, 3.2.3
- PASSWORD_LOCK_TIME, 3.2.2.3, 3.2.3
- PASSWORD_REUSE_MAX, 3.2.2.5, 3.2.3
- PASSWORD_REUSE_TIME, 3.2.2.5, 3.2.3
- REMOTE_OS_AUTHENT, 10.8.1
- RESOURCE_LIMIT, 2.4.4
- SEC_CASE_SENSITIVE_LOGIN, 3.2.2.7
- SEC_MAX_FAILED_LOGIN_ATTEMPTS, 5.8.3
- SEC_PROTOCOL_ERROR_FURTHER_ACTION, 5.8.2
- SEC_PROTOCOL_ERROR_TRACE_ACTION, 5.8.1
- SEC_RETURN_SERVER_RELEASE_BANNER, 5.8.4
- SEC_USER_AUDIT_ACTION_BANNER, 5.8.5
- SEC_USER_UNAUTHORIZED_ACCESS_BANNER, 5.8.5
- INSERT privilege
-
- granting, 4.6.2.3
- revoking, 4.7.2.2
- SQL statements permitted, 5.7.2
- installation
-
- guidelines for security, 10.7
- intruders
-
- access to server after protocol errors, preventing, 5.8.2
- application context values, attempts to change, 7.3.2
- Denial of Service attacks through listener, 10.8.2
- disk flooding, preventing, 5.8.1
- eavesdropping, preventing by using SSL, 10.8.1
- encryption, problems not solved by, 9.2.2
- falsified IP addresses, 10.8.1
- falsified or stolen client system identities, 10.8.1
- hacked operating systems or applications, 10.8.1
- password cracking, 3.2.1
- password protections against, 3.2.1
- preventing malicious attacks from clients, 5.8
- session ID, need for encryption, 7.4.4.3
- unlimited authenticated requests, preventing, 5.8.3
- invoker's rights
-
- about, 4.5.6.2
- procedure privileges, used with, 4.5.6.2
- procedure security, 4.5.6.2
- secure application roles, requirement for enabling, 5.4.2
- stored procedures, 5.5.3
- IP addresses
-
- falsifying, 10.8.2
- guidelines for security, 10.8.1
J
- JDBC
-
- proxy authentication
-
- Oracle Virtual Private Database, how it works with, 8.5.5
- JDBC (thick or thin)
-
- proxy authentication with real user, 3.10.1.4
- JDBC (thick)
-
- proxy authentication, 3.10.1
K
- Kerberos authentication, 3.6.2
-
- configuring for SYSDBA or SYSOPER access, 3.3.1.2
- password management, 10.5
- process, 3.10.1.4.2
- key generation
-
- encryption, 9.3.2
- key storage
-
- encryption, 9.3.4
- key transmission
-
- encryption, 9.3.3
L
- least privilege principle, 10.3
-
- about, 10.3
- granting user privileges, 10.3
- middle-tier privileges, 3.10.1.5
- lightweight users
-
- example using a global application context, 7.4.5
- Lightweight Directory Access Protocol (LDAP), 8.4.2.7
- listener
-
- establish password, 10.8.2
- not an Oracle owner, 10.8.2
- preventing online administration, 10.8.2
- restrict privileges, 10.8.2, 10.8.2
- secure administration, 10.8.2
- listener.ora file
-
- administering remotely, 10.8.2, 10.8.2
- default location, 10.8.3
- online administration, preventing, 10.8.2
- TCPS, securing, 10.8.3
- LOBS
-
- auditing, 6.8.1
- lock and expire
-
- default accounts, 10.3
- predefined user accounts, 10.3
- log files
-
- auditing, default location, 6.5.4.3
- owned by trusted user, 10.6
- Windows Event Viewer, 6.6.1
- logical reads limit, 2.4.2.4
- logon triggers
-
- example, 7.3.4
- externally initialized application contexts, 7.3.4
M
- malicious database administrators
-
- See also intruders
- manager default password, 10.5
- mandatory auditing, 6.2.3
- MAX_ENABLED_ROLES initialization parameter
-
- enabling roles and, 4.10.3
- memory
-
- users, viewing, 2.6.5
- methods
-
- privileges on, 4.5.7
- middle-tier systems
-
- auditing real user actions, 3.10.1.9
- client identifiers, 3.10.2.1
- enterprise user connections, 3.10.1.8.2
- Kerberos authentication process, 3.10.1.4.2
- password-based proxy authentication, 3.10.1.8.1
- privileges, limiting, 3.10.1.5
- proxies authenticating users, 3.10.1.6
- proxying but not authenticating users, 3.10.1.7
- reauthenticating user to database, 3.10.1.8
- USERENV namespace attributes, accessing, 7.3.6.3
- monitoring user actions
-
- See also auditing, standard auditing, fine-grained auditing
- multiplex multiple-client network sessions, 10.8.2
N
- Net8
-
- See Oracle Net
- network auditing
-
- about, 6.5.11
- disabling, 6.5.11.3
- network authentication
-
- external authentication, 3.8.5
- guidelines for securing, 10.5
- roles, granting using, 4.9
- Secure Sockets Layer, 3.6.1
- smart cards, 10.5
- third-party services, 3.6.2
- token cards, 10.5
- X.509 certificates, 10.5
- network connections
-
- Denial of Service attacks, addressing, 10.8.2
- guidelines for security, 10.8, 10.8.1, 10.8.2
- securing, 10.8.2
- network IP addresses
-
- guidelines for security, 10.8.2
- new features, security, Preface
- NOAUDIT statement
-
- audit options, disabling, 6.5.3.5
- default object audit options, disabling, 6.5.9.4
- network auditing, disabling, 6.5.11.3
- object auditing, disabling, 6.5.9.4
- privilege auditing, disabling, 6.5.7.3
- statement auditing, disabling, 6.5.6.3, 6.5.6.3
O
- O7_DICTIONARY_ACCESSIBILITY initialization parameter
-
- about, 4.3.2.1
- auditing privileges on SYS objects, 6.5.2
- data dictionary protection, 10.6
- default setting, 10.6
- securing data dictionary with, 4.3.2.1
- object auditing
-
- disabling, 6.5.9.4
- enabling, 6.5.9.3
- object columns
-
- auditing, 6.8.1
- object privileges, 10.3
-
- about, 4.5.3
- granting on behalf of the owner, 4.6.2.2
- managing, 5.7
- revoking, 4.7.2
- revoking on behalf of owner, 4.7.2.1
- schema object privileges, 4.5.3
- See also schema object privileges
- objects
-
- applications, managing privileges in, 5.7
- granting privileges, 5.7.2
- privileges
-
- applications, 5.7.1
- managing, 4.5.7
- protecting in shared schemas, 5.6.2
- protecting in unique schemas, 5.6.1
- SYS schema, access to, 4.3.2.3
- One Big Application User
-
- about, 8.5.5
- application context, global, 8.5.5
- global application contexts, 7.4.1
- global application contexts, nondatabase, 7.4.3.5
- Oracle Virtual Private Database, how works with, 8.5.5
- operating systems
-
- accounts, 4.9.2
- authentication
-
- about, 3.5
- advantages, 3.5
- disadvantages, 3.5
- roles, using, 4.9
- authentication, external, 3.8.4
- default permissions, 10.6
- enabling and disabling roles, 4.9.5
- operating system account privileges, limiting, 10.6
- role identification, 4.9.2
- roles and, 4.4.1.6
- roles, granting using, 4.9
- users, limiting number of, 10.6
- Oracle Advanced Security
-
- network authentication services, 10.5
- network traffic encryption, 10.8.2
- user access to application schemas, 5.6.2
- Oracle Call Interface (OCI)
-
- application contexts, client session-based, 7.5.1
- proxy authentication, 3.10.1
-
- Oracle Virtual Private Database, how it works with, 8.5.5
- proxy authentication with real user, 3.10.1.4
- security-related initialization parameters, 5.8
- Oracle Connection Manager
-
- securing client networks with, 10.8.2
- Oracle Enterprise Security Manager
-
- role management with, 3.6.2
- Oracle home
-
- default permissions, disallowing modification, 10.6
- Oracle Internet Directory (OID)
-
- authenticating with directory-based service, 3.6.2
- SYSDBA and SYSOPER access, controlling, 3.3.1
- Oracle Java Virtual Machine (OJVM)
-
- permissions, restricting, 10.3
- Oracle Net
-
- firewall support, 10.8.2
- Oracle Technology Network
-
- security alerts, 10.2.1
- Oracle Virtual Private Database (VPD)
-
- about, 8.1.1
- application contexts
-
- example, 8.4.2
- used with, 8.1.3
- applications
-
- how it works with, 8.5.1
- users who are database users, how it works with, 8.5.5
- applications using for security, 5.2.2
- automatic reparsing, how it works with, 8.5.2
- benefits, 8.1.2
- column level, 8.3.4.1
- column masking behavior
-
- enabling, 8.3.4.3
- restrictions, 8.3.4.3
- column-level display, 8.3.4.1
- components, 8.2
- configuring, 8.3
- cursors, shared, 8.1.3
- Enterprise User Security proxy authentication, how it works with, 8.5.5
- example, simple, 8.4.1
- exceptions in behavior, 8.5.4
- exporting data, 8.5.4
- finding information about, 8.6
- flashback query, how it works with, 8.5.3
- function
-
- components, 8.2.1
- JDBC proxy authentication, how it works with, 8.5.5
- OCI proxy authentication, how it works with, 8.5.5
- One Big Application User, how works with, 8.5.5
- performance benefit, 8.1.2.2
- policies, Oracle Virtual Private Database
-
- about, 8.3.1
- applications, validating, 8.3.5.6
- attaching to database object, 8.3.2
- column display, 8.3.4.1
- column-level display, default, 8.3.4.2
- dynamic, 8.3.6.1
- multiple, 8.3.5.5
- optimizing performance, 8.3.6
- SQL statements, specifying, 8.3.3
- policy groups
-
- about, 8.3.5.1
- benefits, 8.3.5.1
- creating, 8.3.5.2
- default, 8.3.5.4
- example implementation, 8.3.5.3
- policy types
-
- context sensitive, about, 8.3.6.5
- context sensitive, when to use, 8.3.6.7
- DYNAMIC, 8.3.6.1
- shared context sensitive, about, 8.3.6.6
- shared context sensitive, when to use, 8.3.6.7
- shared static, about, 8.3.6.3
- shared static, when to use, 8.3.6.4
- static, about, 8.3.6.2
- static, when to use, 8.3.6.4
- summary of features, 8.3.6.8
- user models, 8.5.5
- Web-based applications, how it works with, 8.5.5
- Oracle Wallet Manager
-
- X.509 Version 3 certificates, 3.6.2
- Oracle wallets
-
- authentication method, 3.6.2
- OracleMetaLink
-
- security patches, downloading, 10.2.1
- ORAPWD password utility
-
- case sensitivity in passwords, 3.2.2.7
- password file authentication, 3.3.3
- permissions to run, 3.3.3
- OS_ROLES initialization parameter
-
- operating system role grants, 4.9.5
- operating-system authorization and, 4.4.4.3.1
- REMOTE_OS_ROLES and, 4.9.6
- using, 4.9.2
P
- packages
-
- auditing, 6.5.9.1
- examples, 4.5.6.4
- examples of privilege use, 4.5.6.4
- privileges
-
- divided by construct, 4.5.6.4
- executing, 4.5.6.1, 4.5.6.4
- parallel execution servers, 7.3.3.4
- parallel query, and SYS_CONTEXT, 7.3.3.4
- pass phrase
-
- read and parse server.key file, 10.8.3
- password files, 3.3.3
- PASSWORD statement
-
- about, 2.3.1
- PASSWORD_LIFE_TIME initialization parameter, 3.2.2.4
- PASSWORD_LOCK_TIME initialization parameter, 3.2.2.3
- PASSWORD_REUSE_MAX initialization parameter, 3.2.2.5
- PASSWORD_REUSE_TIME initialization parameter, 3.2.2.5
- passwords
-
- about managing, 3.2.2.1
- account locking, 3.2.2.3
- administrator
-
- authenticating with, 3.3.3
- guidelines for securing, 10.5
- aging and expiration, 3.2.2.4
- ALTER PROFILE statement, 3.2.2.1
- altering, 2.3.1
- brute force attacks, 3.2.1
- case sensitivity setting, SEC_CASE_SENSITIVE_LOGIN, 3.2.2.7
- case sensitivity, configuring, 3.2.2.7
- changing for roles, 4.4.3
- complexity verification
-
- about, 3.2.2.6
- guidelines for security, 10.5
- complexity, guidelines for enforcing, 10.5
- connecting without, 3.5
- CREATE PROFILE statement, 3.2.2.1
- danger in storing as clear text, 10.5
- database user authentication, 3.4.1
- default profile settings
-
- about, 3.2.3
- enabling using DBCA, 3.2.3
- enabling using SQL statements, 3.2.3
- default user account, 10.5
- default, finding, 3.2.2.2
- delays for incorrect passwords, 3.2.1
- duration, 10.5
- encrypting, 3.2.1, 10.5
- expiring
-
- explicitly, 3.2.2.4
- procedure for, 3.2.2.4
- proxy account passwords, 3.10.1.3
- with grace period, 3.2.2.4
- failed logins, resetting, 3.2.2.3
- grace period, example, 3.2.2.4
- guidelines for security, 10.5
- history, 3.2.2.5, 3.2.2.5, 10.5
- length, 10.5
- lifetime for, 3.2.2.4
- listener, establishing for, 10.8.2
- lock time, 3.2.2.3
- management rules, 10.5
- managing, 3.2.2
- maximum reuse time, 3.2.2.5
- ORAPWD password utility, 3.2.2.7
- password complexity verification, 3.2.2.6
- password file risks, 3.3.3
- PASSWORD_LOCK_TIME initialization parameter, 3.2.2.3
- PASSWORD_REUSE_MAX initialization parameter, 3.2.2.5
- PASSWORD_REUSE_TIME initialization parameter, 3.2.2.5
- policies, 3.2.2
- privileges for changing for roles, 4.4.3
- privileges to alter, 2.3
- protections, built-in, 3.2.1
- proxy authentication, 3.10.1.8.1
- reusing, 3.2.2.5, 10.5
- reusing passwords, 3.2.2.5
- roles, 4.4.4.1
- security risks, 3.3.3
- SYS and SYSTEM, 10.5, 10.5
- used in roles, 4.4.1.1
- UTLPWDMG.SQL password script
-
- password management, 3.2.2.6
- verfied using SHA-1 cryptographic hagh function, 3.2.1
- See also authentication
- performance
-
- application contexts, 7.1
- Oracle Virtual Private Database policies, 8.1.2.2
- Oracle Virtual Private Database policy types, 8.3.6
- resource limits and, 2.4.1
- permissions
-
- default, 10.6
- run-time facilities, 10.3
- PKI
-
- See public key infrastructure (PKI)
- PL/SQL
-
- anonymous blocks, 5.5.3
- auditing of statements within, 6.5.3.1
- roles in procedures, 4.4.1.4
- PL/SQL procedures
-
- setting application context, 7.3.3.1
- PMON background process
-
- application contexts, cleaning up, 7.3.1
- principle of least privilege, 10.3
-
- about, 10.3
- granting user privileges, 10.3
- middle-tier privileges, 3.10.1.5
- privileges
-
- about, 4.1
- access control lists, checking, 4.11.8
- altering
-
- passwords, 2.3.1
- users, 2.3
- altering role authentication method, 4.4.3
- applications, managing, 5.3
- auditing system, 6.5.7.2
- auditing use of, 6.5.7, 6.5.7.2
- cascading revokes, 4.7.3
- column, 4.6.2.3
- creating users, 2.2.1
- dropping profiles, 2.4.4.2
- finding information about, 4.12
- granting
-
- about, 4.3.3, 4.6
- examples, 4.5.6.4, 4.5.6.4
- object privileges, 4.6.2
- schema object privileges, 4.5.3.1
- system, 4.6.1
- system privileges, 4.6
- grants, listing, 4.12.1
- grouping with roles, 4.4
- managing, 5.7
- middle tier, 3.10.1.5
- object, 4.5.1, 4.5.2, 5.7.2
- on selected columns, 4.7.2.2
- procedures, 4.5.6.1
-
- creating and altering, 4.5.6.3
- executing, 4.5.6.1
- in packages, 4.5.6.4
- reasons to grant, 4.2
- revoking privileges
-
- about, 4.3.3
- object, 4.7.2
- object privileges, cascading effect, 4.7.3.2
- object privileges, requirements for, 4.7.2
- schema object, 4.5.3.1
- revoking system privileges, 4.7.1
- roles
-
- creating, 4.4.3
- dropping, 4.4.6
- restrictions on, 4.4.1.5
- roles, why better to grant, 4.2
- schema object, 4.5.3
-
- DML and DDL operations, 4.5.4
- granting and revoking, 4.5.3.1
- packages, 4.5.6.4
- procedures, 4.5.6.1
- SQL statements permitted, 5.7.2
- system
-
- granting and revoking, 4.3.3
- SELECT ANY DICTIONARY, 10.6
- SYSTEM and OBJECT, 10.3
- system privileges
-
- about, 4.3.1
- trigger privileges, 4.5.6.2
- view privileges
-
- creating a view, 4.5.5.2
- using a view, 4.5.5.3
- views, 4.5.5.1
- See also system privileges.
- procedures
-
- auditing, 6.5.9.1, 6.5.9.2
- definer's rights
-
- about, 4.5.6.2
- roles disabled, 4.4.1.4.1
- examples of, 4.5.6.4
- examples of privilege use, 4.5.6.4
- invoker's rights
-
- about, 4.5.6.2
- roles used, 4.4.1.4.2
- privileges for procedures
-
- create or alter, 4.5.6.3
- executing, 4.5.6.1
- executing in packages, 4.5.6.4
- security enhanced by, 4.5.6.2
- process monitor process (PMON)
-
- cleans up timed-out sessions, 2.4.2.5
- PRODUCT_USER_PROFILE table, 4.4.7.2
-
- SQL commands, disabling with, 4.4.7.2
- products and options
-
- install only as necessary, 10.7
- profiles, 2.4.4
-
- about, 2.4.4
- creating, 2.4.4.1
- dropping, 2.4.4.2, 2.4.4.2
- finding information about, 2.6.1
- managing, 2.4.4
- password management, 3.2.2.1
- privileges for dropping, 2.4.4.2
- specifying for user, 2.2.7
- viewing, 2.6.4
- program global area (PGA)
-
- effect of MAX_ENABLED_ROLES on, 4.10.3
- proxy authentication
-
- about, 3.10.1, 3.10.1.1
- advantages, 3.10.1.2
- auditing operatings, 3.9.1
- passwords, expired, 3.10.1.3
- security benefits, 3.10.1.2
- users, passing real identity of, 3.10.1.4
- PROXY_USER attribute, 7.3.6.3
- PROXY_USERS view, 3.10.1.3
- pseudo columns
-
- USER, 4.5.5.3
- PUBLIC
-
- procedures and, 4.8
- user group, 4.8
- public key infrastructure (PKI)
-
- about, 3.6.2
- PUBLIC privilege
-
- guidelines for security, 10.3
- PUBLIC user group
-
- about, 4.4.1.3
- granting and revoking privileges to, 4.8
- security domain of users, 4.4.1.3
- security guideline, 10.3
- PUBLIC_DEFAULT profile
-
- profiles, dropping, 2.4.4.2
Q
- quotas
-
- revoking from users, 2.2.5.1
- setting to zero, 2.2.5.1
- tablespace, 2.2.5
- temporary segments and, 2.2.5
- unlimited, 2.2.5.2
- viewing, 2.6.3
R
- RADIUS authentication, 3.6.2
- read-only mode, affect on AUDIT_TRAIL parameter, 6.5.3.3
- reads
-
- limitis on data blocks, 2.4.2.4
- RECOVERY_CATALOG_OWNER role
-
- about, 4.4.2
- REFERENCES privilege
-
- CASCADE CONSTRAINTS option, 4.7.2.3
- revoking, 4.7.2.2, 4.7.2.3
- SQL statements permitted, 5.7.2
- when granted through a role, 4.4.1.5
- remote authentication, 10.8.1, 10.8.1
- REMOTE_OS_AUTHENT initialization parameter
-
- guideline for securing, 10.8.1
- setting, 3.8.4
- remote_os_authentication, 10.8.1
- REMOTE_OS_ROLES initialization parameter
-
- OS role management risk on network, 4.9.6
- setting, 4.4.4.3.2
- resource limits
-
- about, 2.4.1
- call level, limiting, 2.4.2.2
- connection time for each session, 2.4.2.5
- CPU time, limiting, 2.4.2.3
- determining values for, 2.4.3
- idle time in each session, 2.4.2.5
- logical reads, limiting, 2.4.2.4
- private SGA space for each session, 2.4.2.5
- profiles, 2.4.4, 2.4.4
- session level, limiting, 2.4.2.1
- sessions
-
- concurrent for user, 2.4.2.5
- elapsed connection time, 2.4.2.5
- idle time, 2.4.2.5
- SGA space, 2.4.2.5
- types, 2.4.2
- RESOURCE privilege
-
- CREATE SCHEMA statement, needed for, 5.6.1
- RESOURCE role, 4.5.7.1
-
- about, 4.4.2
- REVOKE CONNECT THROUGH clause
-
- revoking proxy authorization, 3.10.1.3
- REVOKE statement
-
- system privileges and roles, 4.7.1
- when takes effect, 4.10
- revoking privileges and roles
-
- cascading effects, 4.7.3
- on selected columns, 4.7.2.2
- REVOKE statement, 4.7.1
- specifying ALL, 4.5.2
- when using operating-system roles, 4.9.4
- role identification
-
- operating system accounts, 4.9.2
- ROLE_SYS_PRIVS view
-
- application privileges, 5.3
- ROLE_TAB_PRIVS view
-
- application privileges, finding, 5.3
- roles
-
- about, 4.1, 4.4.1
- ADMIN OPTION and, 4.6.1.1
- advantages in application use, 5.3
- application, 4.4.1.2.1, 4.4.7, 5.5, 5.5, 5.7
- application privileges, 5.3
- applications, for user, 5.5
- AQ_ADMINISTRATOR_ROLE role, 4.4.2
- AQ_USER_ROLE role, 4.4.2
- audited when default auditing is enabled, 6.4
- authorization, 4.4.4
- authorized by enterprise directory service, 4.4.4.4
- changing authorization for, 4.4.3
- changing passwords, 4.4.3
- CONNECT role
-
- about, 4.4.2
- create your own, 10.4
- database authorization, 4.4.4.1
- database role, users, 5.5.1
- DBA role, 4.4.2
- DDL statements and, 4.4.1.5
- default, 4.10.2
- default, setting for user, 2.2.8
- definer's rights procedures disable, 4.4.1.4.1
- DELETE_CATALOG_ROLE role, 4.4.2
- dependency management in, 4.4.1.5
- disabling, 4.10.1
- dropping, 4.4.6
- dynamic SQL, assigned with, 5.5.4
- enabled or disabled, 4.4.5
- enabling, 4.10.1, 5.5
- enterprise, 3.7, 4.4.4.4
- EXECUTE_CATALOG_ROLE role, 4.4.2
- EXP_FULL_DATABASE role, 4.4.2
- finding information about, 4.12
- functionality, 4.2
- global, 3.7
- global authorization, 4.4.4.4
-
- about, 4.4.4.4
- global roles
-
- creating, 4.4.4.4
- GRANT statement, 4.9.5
- granting roles
-
- about, 4.6
- methods for, 4.4.5
- system, 4.6.1
- system privileges, 4.3.3
- guidelines for security, 10.4
- HS_ADMIN_ROLE role, 4.4.2
- IMP_FULL_DATABASE role, 4.4.2
- in applications, 4.4.1.1
- invoker's rights procedures use, 4.4.1.4.2
- job responsibility privileges only, 10.4
- listing grants, 4.12.2
- listing privileges and roles in, 4.12.6
- listing roles, 4.12.5
- management using the operating system, 4.9
- managing roles
-
- about, 4.4
- categorizing users, 5.7
- managing through operating system, 4.4.1.6
- maximum, 4.10.3
- multibyte characters in names, 4.4.3
- multibyte characters in passwords, 4.4.4.1
- naming, 4.4.1
- network authorization, 4.4.4.3.2
- network client authorization, 4.4.4.3.2
- One Big Application User, compromised by, 5.2.1
- operating system, 4.9.2
- operating system authorization, 4.4.4.3.1
- operating system granting of, 4.9.5
- operating system identification of, 4.9.2
- operating system management and the shared server, 4.9.6
- operating system-managed, 4.9.3, 4.9.4
- operating-system authorization, 4.4.4.3
- passwords for enabling, 4.4.4.1
- predefined, 4.4.2
- privileges for creating, 4.4.3
- privileges for dropping, 4.4.6
- privileges, changing authorization method for, 4.4.3
- privileges, changing passwords, 4.4.3
- RECOVERY_CATALOG_OWNER role, 4.4.2
- RESOURCE role, 4.4.2
- restricting from tool users, 4.4.7
- restrictions on privileges of, 4.4.1.5
- REVOKE statement, 4.9.5
- revoking, 4.4.5, 4.7.1
- revoking ADMIN OPTION, 4.7.1
- SCHEDULER_ADMIN role, 4.4.2
- schemas do not contain, 4.4.1
- security domains of, 4.4.1.3
- SELECT_CATALOG_ROLE role, 4.4.2
- SET ROLE statement, 4.9.5
- setting in PL/SQL blocks, 4.4.1.4.2
- static SQL, assigned with, 5.5.4
- unique names for, 4.4.3
- use of passwords with, 4.4.1.1
- user, 4.4.1.2.2, 5.7
- users capable of granting, 4.4.5.1
- uses of, 4.4.1.2
- WITH GRANT OPTION and, 4.6.2.1
- without authorization, 4.4.3
- XDB_SET_INVOKER roles, 4.4.2
- XDB_WEBSERVICES role, 4.4.2
- XDB_WEBSERVICES_OVER_HTTP role, 4.4.2
- XDB_WEBSERVICES_WITH_PUBLIC role, 4.4.2
- XDBADMIN role, 4.4.2
- See also secure application roles
- root file paths
-
- for files and packages outside the database, 10.3
- row-level security
-
- See fine-grained access control, Oracle Virtual Private Database (VPD)
- RSA private key, 10.8.3
- run-time facilities, 10.3
-
- restriction permissions, 10.3
S
- Sample Schemas
-
- remove or relock for production, 10.7
- test database, 10.7
- sample schemas, 10.7
- Sarbanes-Oxley Act
-
- auditing to meet compliance, 6.4, 10.9.1
- scheduler jobs and CREATE EXTERNAL JOB privilege, 4.3.2.2
- SCHEDULER_ADMIN role
-
- about, 4.4.2
- schema object privileges, 4.5.3
- schema objects
-
- audit options, disabling, 6.5.9.4
- auditing, 6.5.9
- cascading effects on revoking, 4.7.3.2
- default audit options, 6.5.9.3
- default tablespace for, 2.2.4
- disabling audit options, 6.5.7.3
- dropped users, owned by, 2.5
- enabling audit options on, 6.5.9.3
- granting privileges, 4.6.2
- in a revoked tablespace, 2.2.5.1
- privileges
-
- DML and DDL operations, 4.5.4
- granting and revoking, 4.5.3.1
- view privileges, 4.5.5.1
- privileges on, 4.5.3
- privileges to access, 4.5.2
- privileges with, 4.5.2
- revoking privileges, 4.7.2
- schema-independent users, 5.6.2
- schemas
-
- private, 3.7.1.1
- shared among enterprise users, 3.7.1.2
- shared, protecting objects in, 5.6.2
- unique, 5.6
- unique, protecting objects in, 5.6.1
- SCOTT user account
-
- restricting privileges of, 10.4
- script files
-
- audit trail views, removing, 6.10.3
- CATNOAUD.SQL, 6.10.3
- scripts, authenticating users in, 3.2.4.1
- SEC_CASE_SENSITIVE_LOGIN initialization parameter, 3.2.2.7
- SEC_MAX_FAILED_LOGIN_ATTEMPTS initialization parameter, 5.8.3
- SEC_PROTOCOL_ERROR_FURTHER_ACTION initialization parameter, 5.8.2
- SEC_PROTOCOL_ERROR_TRACE_ACTION initialization parameter, 5.8.1
- sec_relevant_cols_opt parameter, 8.3.4.3
- SEC_RETURN_SERVER_RELEASE_BANNER initialization parameter, 5.8.4
- SEC_USER_AUDIT_ACTION_BANNER initialization parameter, 5.8.5
- SEC_USER_UNAUTHORIZED_ACCESS_BANNER initialization parameter, 5.8.5
- secure application roles
-
- about, 5.4
- creating, 5.4.1
- creating PL/SQL package, 5.4.2
- DBMS_SESSION.SET_ROLE procedure, 5.4.2
- invoker's rights requirement, 5.4.2
- package for, 5.4.2
- user environment information from SYS_CONTEXT SQL function, 5.4.2, 5.4.2
- using to ensure database connection, 4.4.8
- Secure Sockets Layer (SSL)
-
- about, 3.6.1
- certificate key algorithm, 10.8.3
- certificates, enabling for user and server, 10.8.1
- cipher suites, 10.8.3
- configuration files, securing, 10.8.3
- configuring for SYSDBA or SYSOPER access, 3.3.1.3
- global users with private schemas, 3.7.1.1
- guidelines for security, 10.8.3, 10.8.3
- listener, administering, 10.8.2
- mode, 10.8.3
- pass phrase, 10.8.3
- RSA private key, 10.8.3
- securing SSL connection, 10.8.3
- server.key file, 10.8.3
- TCPS, 10.8.3
- security
-
- application enforcement of, 4.4.1.1
- default user accounts
-
- locked and expired automatically, 10.3
- locking and expiring, 10.3
- domains, enabled roles and, 4.4.5
- enforcement in application, 5.2.2
- enforcement in database, 5.2.2
- multibyte characters in role names, 4.4.3
- multibyte characters in role passwords, 4.4.4.1
- passwords, 3.4.1
- policies
-
- applications, 5.1
- SQL*Plus users, restricting, 4.4.7
- tables or views, 8.1.2.1
- procedures enhance, 4.5.6.2
- resources, additional, 1.2
- roles, advantages in application use, 5.3
- See also security risks
- security alerts, 10.2.1
- security patches
-
- about, 10.2.1
- downloading, 10.2.1
- security policies
-
- See Oracle Virtual Private Database, policies
- security risks
-
- ad hoc tools, 4.4.7.1
- application users not being database users, 5.2.1
- applications enforcing rather than database, 5.2.2
- audit records being tampered with, 6.6.2.1
- bad packets to server, 5.8.1
- database version displaying, 5.8.4
- encryption keys, users managing, 9.3.4.3
- password files, 3.3.3
- passwords exposed in large deployments, 3.2.4.1
- privileges carelessly granted, 4.3.5
- PUBLIC privilege, objects created with, 4.3.5
- remote user impersonating another user, 4.4.4.3.2
- server falsifying identities, 10.8.3
- standard audit trail, protecting, 6.5.3.7
- users with multiple roles, 5.5.1
- SELECT ANY DICTIONARY privilege
-
- data dictionary, accessing, 10.6
- exclusion from GRANT ALL PRIVILEGES privilege, 10.6
- SELECT privilege
-
- SQL statements permitted, 5.7.2
- SELECT_CATALOG_ROLE role
-
- about, 4.4.2
- SYS schema objects, enabling access to, 4.3.2.3
- sequences
-
- auditing, 6.5.9.1
- server.key file
-
- pass phrase to read and parse, 10.8.3
- service-oriented architecture (SOA)
-
- security enhancements for Oracle XML DB, Preface
- SESSION_ROLES view
-
- queried from PL/SQL block, 4.4.1.4.1
- sessions
-
- about, 6.5.10.2.2
- auditing by, 6.5.3.4, 6.5.10.2.2
- listing privilege domain of, 4.12.4
- memory use, viewing, 2.6.5
- time limits on, 2.4.2.5
- when auditing options take effect, 6.5.3.1
- SET ROLE statement
-
- application code, including in, 5.5.2
- associating privileges with role, 5.5.1
- disabling roles with, 4.10.1
- enabling roles with, 4.10.1
- equivalent to SET_ROLE, 5.5.3
- how password is set, 4.4.4.1
- when using operating-system roles, 4.9.5
- SGA
-
- See System Global Area (SGA)
- Shared Global Area (SGA)
-
- See System Global Area (SGA)
- shared server
-
- limiting private SQL areas, 2.4.2.5
- operating system role management restrictions, 4.9.6
- SHOW PARAMETERS statement, 6.5.3.3
- smart cards
-
- guidelines for security, 10.5
- SOA
-
- See service-oriented architecture
- SQL statements
-
- audit options, 6.5.6.2
- auditing
-
- about, 6.5.6
- disabling, 6.5.6.3
- enabling, 6.5.6.2
- executions, 6.5.10.1
- when records generated, 6.5.3.1
- dynamic, 7.3.3.3
- object privileges permitting in applications, 5.7.2
- privileges required for, 4.5.3, 5.7.2
- resource limits and, 2.4.2.2
- restricting ad hoc use, 4.4.7.1, 4.4.7.1
- SQL*Net
-
- See Oracle Net
- SQL*Plus
-
- connecting with, 3.5
- restricting ad hoc use, 4.4.7.1, 4.4.7.1
- statistics monitor, 2.4.3
- SSL
-
- See Secure Sockets Layer
- standard audit trail
-
- activities always recorded, 6.5.3.2
- archiving, 6.5.3.6.1
- AUDIT SQL statement, 6.5.3.4
- auditing standard audit trail, 6.5.3.8
- controlling size of, 6.5.3.6
- disabling, 6.5.3.3
- enabling, 6.5.3.3
- maximum size of, 6.5.3.6
- NOAUDIT SQL statement, 6.5.3.5
- operating system, 6.2.3
- protecting, 6.5.3.7
- records, archiving, 6.5.3.6.1
- records, purging, 6.5.3.6.2
- size, reducing, 6.5.3.6.2
- transaction independence, 6.5.3.1
- when created, 6.5.3.1
- standard auditing
-
- about, 6.5.1
- administrative users on all platforms, 6.6.1
- administrators on UNIX systems, 6.6.2
- archiving audit trail, 6.9
- audit option levels, 6.5.3.4
- audit trails
-
- database, 6.3.1
- auditing
-
- default auditing, enabling, 6.4
- by access
-
- about, 6.5.10.2.1
- setting, 6.5.3.4
- by session
-
- about, 6.5.10.2.2
- prohibited with, 6.5.10.2
- setting, 6.5.3.4
- customized, 6.7
- database audit trail records, 6.3.1
- DDL statement auditing, 6.5.6.1
- default options, 6.5.9.3
- default options, disabling, 6.5.9.4
- disabling, 6.5.3.5
- disabling options versus auditing, 6.5.3.5
- DML statements, 6.5.6.1
- enabling options versus auditing, 6.5.3.4
- executions, 6.5.10.1
- information stored in OS file, 6.5.4.1
- managing audit trail, 6.5.3
- mandatory auditing, 6.2.3
- network auditing, 6.1.2
-
- about, 6.5.11
- disabling, 6.5.11.3
- enabling, 6.5.11.1
- error types recorded, 6.5.11.2
- object auditing
-
- See standard auditing, schema object
- operating system audit trail, 6.5.4
-
- file location, 6.5.4.3
- operating system audit trail using, 6.5.5
- privilege auditing
-
- about, 6.5.7
- disabling, 6.5.7.3
- enabling, 6.5.7.2
- multitier environment, 6.5.8
- options, 6.5.7.2
- system privileges, 6.5.7.2
- types, 6.5.7.1
- privileges needed, 6.5.2
- range of focus, 6.5.10
- schema object auditing
-
- about, 6.5.9
- disabling, 6.5.9.4
- enabling, 6.5.9.3
- example, 6.5.9.3
- options, 6.5.9.2
- types, 6.5.9.1
- SQL statement
-
- See standard auditing, statement auditing
- statement auditing
-
- about, 6.5.6
- disabling, 6.5.6.3
- enabling, 6.5.6.2
- multitier environment, 6.5.8
- statement level, 6.5.6.2
- successful, 6.5.3.4
- types you can audit, 6.5.6.1
- unsuccessful, 6.5.3.4
- SYS users, 6.6.1, 6.6.1
- system privileges, 6.5.6.2
- trigger use for customized auditing, 6.7
- user, 6.5.10.3
- See also auditing, standard audit trail
- storage
-
- quotas and, 2.2.5
- revoking tablespaces and, 2.2.5.1
- unlimited quotas, 2.2.5.2
- stored procedures
-
- invoker's rights, 5.5.3
- using privileges granted to PUBLIC, 4.8
- strong authentication
-
- centrally controlling SYSDBA and SYSOPER access to multiple databases, 3.3.1
- guideline, 10.5
- symbolic links
-
- restricting, 10.6
- synonyms
-
- inheriting privileges from object, 4.5.3.3
- SYS account
-
- policy enforcement, 8.5.4
- SYS and SYSTEM
-
- passwords, 10.5, 10.5
- SYS schema
-
- objects, access to, 4.3.2.3
- SYS_CONTEXT function
-
- about, 7.3.3.2
- database links, 7.3.3.5
- dynamic SQL statements, 7.3.3.3
- example, 7.3.3.6
- parallel query, 7.3.3.4
- STATIC policies, 8.3.6.4
- syntax, 7.3.3.2
- SYS_CONTEXT SQL function, 5.4.2
-
- validating users, 5.4.2
- SYS_DEFAULT Oracle Virtual Private Database policy group, 8.3.5.4
- SYSASM privilege, Preface
- SYS.AUD$ table
-
- audit records, writing to, 6.5.3.3
- XML, EXTENDED audit trail, 6.5.3.3
- syslog audit trail
-
- about, 6.6.2.1
- configuring, 6.6.2.3
- format, 6.6.2.2
- SYSMAN user account, 10.5, 10.5
- SYS-privileged connections, 10.3
- System Global Area (SGA)
-
- application contexts, storing in, 7.1
- global application context information location, 7.4.1
- limiting private SQL areas, 2.4.2.5
- system privileges, 10.3
-
- about, 4.3.1
- ADMIN OPTION, 4.3.4
- ANY
-
- guidelines for security, 10.6
- ANY system privileges, 4.3.2
- GRANT ANY OBJECT PRIVILEGE, 4.6.2.2, 4.7.2.1
- GRANT ANY PRIVILEGE, 4.3.4
- granting, 4.6.1
- granting and revoking, 4.3.3
- power of, 4.3.1
- restriction needs, 4.3.2
- revoking, cascading effect of, 4.7.3.1
- SELECT ANY DICTIONARY, 10.6
- SYSASM privilege, Preface
T
- tables
-
- auditing, 6.5.9.1
- privileges on, 4.5.4
- tablespaces
-
- assigning defaults for users, 2.2.4
- default quota, 2.2.5
- quotas for users, 2.2.5
- quotas, viewing, 2.6.3
- revoking from users, 2.2.5.1
- temporary
-
- assigning to users, 2.2.6
- unlimited quotas, 2.2.5.2
- TCPS protocol
-
- Secure Sockets Layer, used with, 10.8.2
- tnsnames.ora file, used in, 10.8.3
- TELNET service, 10.8.2
- TFTP service, 10.8.2
- time measurement for statement execution, 8.3.6.1
- token cards, 10.5
- trace files, 6.2.3, 10.6
- transparent data encryption, 9.3.4.4
- transparent tablespace encryption, 9.3.4.4
- triggers
-
- auditing, 6.5.9.2
- auditing, used for custom auditing, 6.7
- CREATE TRIGGER ON, 5.7.2
- logon
-
- example, 7.3.4
- externally initialized application contexts, 7.3.4
- privileges for executing, 4.5.6.2
-
- roles, 4.4.1.4
- trusted procedure
-
- database session-based application contexts, 7.1
- tsnames.ora configuration file, 10.8.3
- types
-
- creating, 4.5.7.5
- privileges on, 4.5.7
- types, user defined
-
- creating
-
- requirements, 4.5.7.4
U
- UDP and TCP ports
-
- close for ALL disabled services, 10.8.2
- UGA
-
- See User Global Area (UGA)
- UNIX systems, auditing administrators on, 6.6.2
- UNLIMITED TABLESPACE privilege, 2.2.5.2, 2.2.5.2
- UPDATE privilege
-
- revoking, 4.7.2.2
- user access
-
- auditing by, 6.5.3.4
- user accounts
-
- administrative user passwords, 10.5
- default user account, 10.5
- password guidelines, 10.5
- passwords, encrypted, 10.5
- USER function
-
- global application contexts, 7.4.3.2
- User Global Area (UGA)
-
- application contexts, storing in, 7.1
- user names
-
- schemas, 5.6
- USER pseudo column, 4.5.5.3
- user sessions, multiple within single database connection, 3.10.1.4
- user-defined columns
-
- auditing, 6.8.1
- USERENV function, 7.3.3.2, 9.4
- USERENV namespace
-
- about, 7.3.3.2
- client identifiers, 3.10.2
- See also CLIENT_IDENTIFIER USERENV attribute
- users
-
- administrative option (ADMIN OPTION), 4.6.1.1
- altering, 2.3
- application users not known to database, 3.10.2
- assigning unlimited quotas for, 2.2.5.2
- auditing, 6.5.10.3
- database role, current, 5.5.1
- default roles, changing, 2.2.8
- default tablespaces, 2.2.4
- dropping, 2.5, 2.5
- dropping profiles and, 2.4.4.2
- dropping roles and, 4.4.6
- enabling roles for, 5.5
- enterprise, 3.7, 4.4.4.4
- enterprise, shared schema protection, 5.6.2
- external authentication
-
- about, 3.8.1
- advantages, 3.8.2
- operating sytsem, 3.8.4
- user creation, 3.8.3
- finding information about, 2.6.1
- global, 3.7
- hosts, connecting to multiple
-
- See external network services, fine-grained access to
- information about, viewing, 2.6.2
- listing roles granted to, 4.12.2
- memory use, viewing, 2.6.5
- network authentication, external, 3.8.5
- nondatabase, 7.4.1, 7.4.3.5
- objects after dropping, 2.5
- operating system external authentication, 3.8.4
- password encryption, 3.2.1
- privileges
-
- for changing passwords, 2.3
- for creating, 2.2.1
- granted to, listing, 4.12.1
- of current database role, 5.5.1
- profiles
-
- creating, 2.4.4.1
- specifying, 2.2.7
- proxy authentication, 3.10.1
- proxy users, connecting as, 3.10.1.1
- PUBLIC group, 4.8
- PUBLIC user group, 4.4.1.3
- restricting application roles, 4.4.7
- roles and, 4.4.1.1
-
- for types of users, 4.4.1.2.2
- schema-independent, 5.6.2
- schemas, private, 3.7.1.1
- security domains of, 4.4.1.3
- security, about, 2.1
- tablespace quotas, 2.2.5
- tablespace quotas, viewing, 2.6.3
- user accounts, creating, 2.2.1
- user models and Oracle Virtual Private Database, 8.5.5
- user name, specifying with CREATE USER statement, 2.2.2
- views for finding information about, 2.6
- UTLPWDMG.SQL
-
- about, 3.2.2.6
- guidelines for security, 10.5
V
- valid node checking, 10.8.2
- views
-
- about, 4.5.5.1
- access control list data, 4.11.10
- application contexts, 7.6
- audit trail, 6.10.1, 6.10.1
- auditing, 6.5.9.1, 6.5.9.2
- DBA_COL_PRIVS, 4.12.3
- DBA_NETWORK_ACL_PRIVILEGES, 4.11.8, 4.11.10
- DBA_NETWORK_ACLS, 4.11.10
- DBA_ROLE_PRIVS, 4.12.2
- DBA_ROLES, 4.12.5
- DBA_SYS_PRIVS, 4.12.1
- DBA_TAB_PRIVS, 4.12.3
- DBA_USERS_WITH_DEFPWD, 3.2.2.2
- encrypted data, 9.7
- Oracle Virtual Private Database policies, 8.6
- privileges, 4.5.5.1, 4.12
- profiles, 2.6.1
- ROLE_ROLE_PRIVS, 4.12.6
- ROLE_SYS_PRIVS, 4.12.6
- ROLE_TAB_PRIVS, 4.12.6
- roles, 4.12
- security applications of, 4.5.5.3
- SESSION_PRIVS, 4.12.4
- SESSION_ROLES, 4.12.4
- USER_NETWORK_ACL_PRIVILEGES, 4.11.10
- users, 2.6.1
- Virtual Private Database
-
- See Oracle Virtual Private Database
- VPD
-
- See Oracle Virtual Private Database
- vulnerable run-time call, 10.3
-
- made more secure, 10.3
W
- Wallet Manager
-
- See Oracle Wallet Manager
- wallets
-
- authentication method, 3.6.2
- Web applications
-
- user connections, 7.4.1, 7.4.3.5
- Web services
-
- security enhancements for Oracle XML DB, Preface
- Web-based applications
-
- Oracle Virtual Private Database, how it works with, 8.5.5
- WHERE clause, dynamic SQL, 8.2.1
- Windows operating system
-
- audit trail setting, OS, 6.5.4.3
X
- X.509 certificates
-
- guidelines for security, 10.5
- XDB_SET_INVOKER role, 4.4.2
- XDB_WEBSERVICES role, 4.4.2
- XDB_WEBSERVICES_OVER_HTTP role
-
- about, 4.4.2
- XDB_WEBSERVICES_WITH_PUBLIC role, 4.4.2
- XDBADMIN role, 4.4.2
- XML
-
- AUDIT_TRAIL XML setting, 6.5.3.3
- AUDIT_TRAIL XML, EXTENDED setting, 6.5.3.3
- XML, EXTENDED AUDIT_TRAIL setting
-
- used with DB in AUDIT_TRAIL, 6.5.3.3
- used with XML in AUDIT_TRAIL, 6.5.3.3