Skip Headers

Oracle Advanced Security Administrator's Guide
Release 2 (9.2)

Part Number A96573-01
Go To Documentation Library
Home
Go To Product List
Book List
Go To Table Of Contents
Contents
Go To Index
Index

Master Index

Feedback

Go to previous page Go to next page

E
Using Enterprise User Security with Microsoft Active Directory

This appendix describes how to configure and use Microsoft Active Directory as the LDAP directory for Oracle Advanced Security Enterprise User Security in the following topics:

Oracle9i Directory Server Features That Support Active Directory

Oracle9i provides two features which make use of a directory server. These features are briefly described in the following sections:

Both features have been enabled to work with Microsoft's Active Directory.

Directory Naming

This feature enables clients to connect to the database server making use of information stored centrally in an LDAP-compliant directory server such as Active Directory. For example, any net service name previously stored in the tnsnames.ora file can now be stored in Active Directory.


Note:

Database service and net service name entries stored in an Oracle Names Server can be migrated to a directory server using the Oracle Names Server Control utility. See Oracle9i Net Services Administrator's Guide for more information.


Enterprise User Security

This feature enables you to create and store Oracle9i database information as directory objects in an LDAP-compliant directory server. For example, an administrator can create and store enterprise users and roles for the Oracle9i database in the directory, which helps centralize the administration of users and roles across multiple databases.

This appendix assumes you are familiar with enterprise user security terms and concepts. If any of the following terms are unfamiliar to you, then you should review Chapter 15, "Managing Enterprise User Security" and Chapter 19, "Using Oracle Enterprise Security Manager".

Integration with Active Directory

In addition to directory naming and enterprise user security integration with a directory server, the following Oracle9i features have been specifically integrated with Active Directory:

Overview of Active Directory

Active Directory is the LDAP-compliant directory server included with Windows 2000. Active Directory stores all Windows 2000 information, including users, groups, and policies. Active Directory also stores information about network resources (such as databases) and makes this information available to application users and network administrators. Active Directory enables users to access network resources with a single login. The scope of Active Directory can range from storing all the resources of a small computer network to storing all the resources of several wide areas networks (WANs).

When using Oracle features that support Active Directory using LDAP, ensure that the Active Directory computer can be successfully reached using all of the TCP/IP hostname forms possible to reach the domain controller. For example, if the hostname of the domain controller is server1 in the domain acme.com, then ensure that you can ping that computer using all of the following:

Active Directory often issues referrals back to itself in one or more of these forms, depending upon the operation being performed. If all of the forms cannot be used to reach the Active Directory computer, then some LDAP operations may fail.

Automatic Discovery of Directory Servers

Oracle Net Configuration Assistant enables you to configure client computer and Oracle9i database server access to a directory server. When Oracle Net Configuration Assistant starts at the end of Oracle9i database installation or is manually started after installation, it prompts you to specify a directory server type to use. When you select Active Directory as the directory server type, Oracle Net Configuration Assistant automatically:

If the Active Directory server through which client connections are accessing an Oracle9i database is shut down, another Active Directory server is automatically discovered and begins providing connection information. This minimizes client connection downtime.


Note:

Regardless of the Oracle client and database releases you are using, you must be running in a Windows 2000 domain to take advantage of the automatic directory server discovery features of Oracle Net Configuration Assistant. If you are not running in a Windows 2000 domain, Oracle Net Configuration Assistant does not automatically discover your directory server, and instead prompts you for additional information, such as the Active Directory location.


When using the Oracle Net Configuration Assistant to complete directory usage configuration against Active Directory, Oracle schema creation can fail due to Active Directory display not being populated with all 24 default languages. Before running the Oracle Net Configuration Assistant to complete directory access configuration, verify that display specifiers for all 24 languages are populated by entering the following at the command prompt:

ldifde -p OneLevel -d cn=DisplaySpecifiers,cn=Configuration,domain
context -f temp file

where:

If the command reports that less than 24 entries were found, you can still use the Oracle Net Configuration Assistant. However, it will report that Oracle schema creation failed when all that happened was that display specifiers for some languages were not created.

Integration with Microsoft Tools

Oracle9i database services, net service names, and enterprise role entries in Active Directory can be displayed and tested in two Windows 2000 tools:

Windows Explorer displays the hierarchical structure of files, directories, and local and network drives on your computer. It can display and test Oracle9i database service and net service name objects.

Active Directory Users and Computers is an administrative tool installed on Windows servers configured as domain controllers. This tool enables you to add, modify, delete, and organize Windows 2000 accounts and groups and publish resources in your organization's directory. Like Windows Explorer, it can display and test Oracle9i database service and net service name objects. But it can also manage access control.

See Also:

User Interface Extensions for Oracle Net Directory Naming

The property menus of Oracle9i database service and net service name objects in Windows Explorer and Active Directory Users and Computers have been enhanced. When you right-click these Oracle directory objects, you now see two new options for testing connectivity:

The Test option starts an application that tests whether the username, password, and net service name you initially entered can actually connect to the Oracle9i database. The Connect with SQL*Plus option starts SQL*Plus, which enables you to perform database administration, run scripts, and so on.

See Also:

"Testing Connectivity from Microsoft Tools" for more information

Enhancement of Directory Object Type Descriptions

Oracle directory object type descriptions in Active Directory have been enhanced to make them easier to understand. In the right pane of Figure E-1, for example, the Type column reveals that ss2 is an Oracle NetService.

Figure E-1 Directory Object Type Descriptions in Active Directory

Text description of adtest.gif follows.

Text description of the illustration adtest.gif

Integration with Windows Login Credentials

The Oracle9i database and configuration tools can use the login credentials of the currently logged on Windows user to connect to Active Directory automatically (that is, without having to re-enter the login credentials). This feature has two benefits:

Oracle Directory Objects in Active Directory

If the Oracle9i database and Oracle Net Services are installed and configured to access Active Directory, then Active Directory Users and Computers will display Oracle directory objects, as illustrated in Figure E-2:

Figure E-2 Oracle Directory Objects in Active Directory Users and Computers

Text description of adusrext.gif follows.

Text description of the illustration adusrext.gif

Table E-1 describes the Oracle directory objects appearing in Figure E-2.

Table E-1 Oracle Directory Objects  
Object Description

jc1-nt50.us.oracle.com

The domain in which you created your Oracle Context. This domain (also known as the administrative context) contains various Oracle entries to support directory naming and enterprise user security. Oracle Net Configuration Assistant automatically discovers this information during Oracle9i database integration with Active Directory.

OracleContext

The top-level Oracle entry in the Active Directory tree. It contains Oracle9i database service and net service name object information. All Oracle software information is placed in this folder.

orcl

This example's Oracle9i database service name

Products

A folder for Oracle product information.

OracleDBSecurity

A folder for database security information.

OracleDefaultDomain

The default enterprise domain created. You can create additional enterprise domains with Oracle Enterprise Security Manager.

sales

This example's net service name object

Users

The folder for the three Oracle security groups. See section "Access Control List Management for Oracle Directory Objects" for more information. Enterprise users and roles created with Oracle Enterprise Security Manager also appear in this folder.

Requirements for Using Oracle9i with Active Directory

If you want to use Net Directory Naming or Enterprise User Security with Active Directory, then you must have certain Microsoft and Oracle software releases, and you must create an Oracle Schema and an Oracle Context. These requirements are discussed in the following sections:

If you are using Active Directory with Oracle on Windows 2000 or Windows NT, then ping the DNS domain name of your Windows 2000 domain. If this does not work, then perform either of the following tasks:

If this step is not performed, then errors such as the following are returned when using Active Directory:

Cannot Chase Referrals

On Windows NT and Windows 2000, the Oracle database service runs in the security context of the LocalSystem or a specific local or domain user. When using Oracle8i release 8.1.7 with Active Directory, if the database service runs in the security context of LocalSystem, manually add the computer name in which the database service is running. This enables you to access control entries on the OracleDBSecurity container object in the Active Directory with read permissions on the OracleDBSecurity container object.

For example, if the database service OracleServiceORCL is running in the security context of LocalSystem in the computer mypc1, then add mypc1 with READ permissions ON OracleDBSecurity object to the access control entries on the OracleDBSecurity container object.

Oracle Schema Creation

You must create an Oracle schema to use net directory naming and enterprise user security features with Active Directory. A schema is a set of rules for Oracle Net Services and Oracle9i database entries and their attributes stored in Active Directory. The following restrictions apply to creating an Oracle schema to use with Active Directory:

To create an Oracle schema:

  1. Log in as a member of the Schema Administrator group. Domain administrators are in the Schema Administrator group by default.
  2. Use Oracle Net Configuration Assistant to create the Oracle schema. You can create your schema during or after database installation.

    See Also:

Oracle Context Creation

You must create an Oracle Context to use net directory naming and enterprise user security features with Active Directory. Oracle Context is the top-level Oracle entry in the Active Directory tree. It contains Oracle9i database service and Oracle Net service name object information.

Directory Naming Software Requirements

For client computers from which you want to manage Oracle9i enterprise users, roles and domains, you must have Oracle8i Client release 8.1.6 or later and one of the following Microsoft products:

For the database server you must have Oracle8i Database release 8.1.6 or later. This is required for registering the database service as an object in Active Directory. The database server can use either of the following Microsoft products:

In addition to these software requirements, both the client computers and the database server must be running in a Windows 2000 domain.

Enterprise User Security Software Requirements

For the database server you must have Oracle8i Database release 8.1.6 or later. This is required for registering the database service as an object in Active Directory. The database server can use either of the following Microsoft products:

The remote computer must have Oracle Enterprise Manager Console release 2.1 or later, which includes:

The remote computer can use either of the following Microsoft products:

In addition to these software requirements, both the remote computer and the database server must be running in a Windows 2000 domain.


Note:

Oracle Enterprise Security Manager is required if you want to create and manage enterprise users, roles, and domains. If Oracle Enterprise Security Manager uses Native Authentication to connect to Active Directory, the host computer should be in a Windows 2000 domain and the user should be logged into the host computer as a Windows 2000 domain user.


Configuring Oracle9i To Use Active Directory

Oracle9i integration with Active Directory enables you to take advantage of operating system user authentication and role authorization. Perform the following tasks to integrate Oracle components with Active Directory:

Task 1: Install and Configure Components

Read "Integration with Active Directory", "Requirements for Using Oracle9i with Active Directory", and the Oracle9i Database Installation Guide for Windows for information on pre-installation and configuration issues.

Task 2: Set the OSAUTH_X509_NAME Registry Parameter

Set the OSAUTH_X509_NAME registry parameter to true to enable client users to access the Oracle9i database as X.509-compliant enterprise users. Active Directory will then be used to identify the client username and authorize roles. This parameter setting is required only if you want to use enterprise users and roles.

When the parameter is set to false (the default setting), the client user is identified as an external user, and the user's role authorization uses the Oracle9i database data dictionary.

To set the OSAUTH_X509_NAME registry parameter:

  1. Go to the computer on which the Oracle9i database is installed.
  2. Choose Start > Run.
  3. Enter regedt32 in the Open field, and click OK.

    The Registry Editor window appears.

  4. Go to HKEY_LOCAL_MACHINE\SOFTWARE\ORACLE\HOMEID.

    where ID is the Oracle home that you want to edit.

  5. If the registry value OSAUTH_X509_NAME exists, double-click OSAUTH_X509_NAME.

    A String Editor dialog box appears.

    Otherwise, add OSAUTH_X509_NAME as a registry value of type REG_EXPAND_SZ.

  6. Click Enter.
  7. Set the value to true in the String field.
  8. Click OK.
  9. Click Exit from the Registry menu.

    The registry editor exits.

Task 3: Start and Use Oracle Enterprise Security Manager

Oracle Enterprise Security Manager is included as an integrated application with Oracle Enterprise Manager. You can use Oracle Enterprise Security Manager to create and manage enterprise users, roles, and domains. You can also use it to assign enterprise users and groups to enterprise roles.

See Also:

for information on using the Oracle Enterprise Security Manager

The administrator using Oracle Enterprise Security Manager must be a member of the security group OracleDBSecurityAdmin. By default, the administrator who created the Oracle Context (that is, configured the Oracle9i database to work with a directory server) is a member of this security group. Only members of this security group are authorized to use all features of Oracle Enterprise Security Manager. To add additional users manually, see "Access Control List Management for Oracle Directory Objects".

Select Login from the Directory Server main menu to access a dialog box for selecting the authentication protocol appropriate to your environment. Choose NT Native Authentication if you are running an Oracle9i database on a Windows NT 4.0 or Windows 2000 computer in a Windows 2000 domain with Active Directory. Oracle Enterprise Security Manager automatically uses Windows native authentication if running in a Windows 2000 domain.

Choose Simple Authentication if the other available selections do not work. Simple authentication can be used with either Oracle Internet Directory or Active Directory, but it is less secure.

Testing Connectivity

This section describes how to connect to an Oracle9i database through Active Directory. This section contains these topics:

Testing Connectivity from Client Computers

When using Oracle Net directory naming, client computers connect to a database by specifying the database or net service name entry that appears in the Oracle Context. For example, if the database entry under the Oracle Context in Active Directory is orcl, and the client and Oracle9i database are in the same domain, then a user connects to the database through SQL*Plus by entering the following connect string:

SQL> CONNECT scott/tiger@orcl

If the client and Oracle9i database are in different domains, a user connects to the database through SQL*Plus by entering:

SQL> CONNECT scott/tiger@orcl.domain

where domain is the domain in which the Oracle9i database is located.

These connect strings follow DNS-style conventions. While Active Directory also supports connections using X.500 naming conventions, Oracle recommends DNS-style conventions because they are easier to use.

DNS-style conventions enable client users to access an Oracle9i database through a directory server by entering minimal connection information, even when the client computer and Oracle9i database are in separate domains. Names following the X.500 convention are longer, especially when the client and Oracle9i database are located in different domains (also known as administrative contexts).

See Also:

"Configuration Management Concepts" in the Oracle9i Net Services Administrator's Guide for more information about X.500 naming conventions

Testing Connectivity from Microsoft Tools

Oracle directory objects in Active Directory are integrated with two Microsoft tools:

You can perform the following tasks from within these Microsoft tools:

To test connectivity:

  1. Start Windows Explorer or Active Directory Users and Computers.

    To start Windows Explorer:

    1. Choose Start > Programs > Accessories > Windows Explorer
    2. Expand My Network Places
    3. Expand Entire Network
    4. Expand Directory

    To start Active Directory Users and Computers:

    Choose Start > Programs > Administrative Tools > Active Directory Users and Computers


    Note:

    All clients accessing an Oracle9i database through Active Directory require read access on all net service name objects in the Oracle Context and must be able to authenticate anonymously with Active Directory. Oracle Net Configuration Assistant automatically sets this up.


  2. Expand the domain in which your Oracle Context is located.
  3. Expand your Oracle Context.
  4. Right-click a database service or Oracle Net Service name object.

    A menu appears with several options. The two that concern us here are Test and Connect with SQL*Plus:

    Text description of adtest.gif follows.

    Text description of the illustration adtest.gif

  5. If you want to test the database connection without actually connecting to it, choose Test.

    A status message appears describing the status of your connection attempt:

    Text description of adtstcon.gif follows.

    Text description of the illustration adtstcon.gif

  6. If you want to test the database connection by connecting to it, choose Connect with SQL*Plus.

    The Oracle SQL*Plus Login dialog appears:

    Text description of adsqlpls.gif follows.

    Text description of the illustration adsqlpls.gif

  7. Enter your username and password.

    A status message appears describing the status of your connection attempt.

Access Control List Management for Oracle Directory Objects

Access Control Lists provide Active Directory security by specifying:

Security Groups

Three security groups are automatically created when the Oracle Context is created in Active Directory. The user configuring access (and thus creating the Oracle Context) is automatically added to each group. The groups are:

OracleDBSecurityAdmin

The OracleDBSecurityAdmin group is for the creator of the Oracle Context. Users in this group can also:

OracleDBCreator

The OracleDBCreator group is for the creator of the Oracle9i database. The domain administrator is automatically a member of this group.Users in this group can:

OracleNetAdmins

Users in the OracleNetAdmins group can:

Accessing the Security Groups

You can add or remove users or change permission settings in all three security groups with Active Directory Users and Computers. You can also use Oracle Enterprise Security Manager with OracleDBSecurityAdmin and OracleDBCreator but not with OracleNetAdmins.

This section describes how to use Active Directory Users and Computers.


Note:

Use Active Directory Users and Computers to perform the procedures described in this section. Windows Explorer does not provide the necessary functionality.


To add or remove users or change permission settings:

  1. Choose Start > Programs > Administrative Tools > Active Directory Users and Computers.
  2. Choose Advanced Features from the View main menu.

    This enables you to view and edit information that is normally hidden.

  3. Expand the domain (administrative context) in which your Oracle Context is located.
  4. Expand Users.

    The three security groups appear in the right window pane:

    Text description of adsecgrp.gif follows.

    Text description of the illustration adsecgrp.gif

  5. Right-click the Oracle security group that you want to view or modify.

    A menu appears with several options.

  6. Choose Properties.
  7. If you want to change permissions, skip to step 13.

    If you want to add or remove users, proceed to step 8.

  8. Choose the Members tab.

    The Properties dialog for the group you selected appears (in this example, OracleDBSecurityAdmins):

    Text description of admembrs.gif follows.

    Text description of the illustration admembrs.gif

  9. To add users, choose Add.

    The Select Users, Contacts, Computers, or Groups dialog appears.

  10. Select the users or groups you want to add and choose Add.

    Your selections appear in the Select Users, Contacts, Computers, or Groups dialog.

  11. To remove a user, select the user name from the Members list and choose Remove.
  12. When you are finished adding and removing users, choose OK.
  13. To change user permissions, choose the Security tab of the Properties dialog.
  14. Choose Advanced.
  15. Choose View/Edit.

    The Permission Entry dialog for the security group you selected appears:

    Text description of advuedit.gif follows.

    Text description of the illustration advuedit.gif

  16. Make your desired changes to group permissions.
  17. Choose OK.

Creating Enterprise Domains

A default enterprise domain, OracleDefaultDomain, is created in your Oracle Context. If you do not want to use this domain or if you want to create another domain, then use Oracle Enterprise Security Manager to create additional enterprise domains. These domains are added under the OracleDBSecurity folder.


Go to previous page Go to next page
Oracle
Copyright © 1996, 2002 Oracle Corporation.

All Rights Reserved.
Go To Documentation Library
Home
Go To Product List
Book List
Go To Table Of Contents
Contents
Go To Index
Index

Master Index

Feedback