博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
Oracle_052_lesson_p8
阅读量:5898 次
发布时间:2019-06-19

本文共 2779 字,大约阅读时间需要 9 分钟。

Administering User Security管理用户安全

show parameter case;

you should be able to:

1、Create and manage database user accounts:
2、Authenticate users
3、Assign default storage areas (tablespaces)
4、Grant and revoke privileges
5、Create and manage roles
6、Create and manage profiles:
7、Implement standard password security features
8、Control resource usage by users

Database User Accounts

Each database user account has:

A unique username
An authentication method
A default tablespace
A temporary tablespace
A user profile
An initial consumer group
An account status
A schema:
Is a collection of database objects that are owned by a database user
Has the same name as the user account

Predefined Administrative Accounts

SYS account:

Is granted the DBA role, as well as several other roles.
Has all privileges with ADMIN OPTION
Is required for startup, shutdown, and some maintenance commands
Owns the data dictionary and the Automatic Workload Repository (AWR)

SYSTEM account is granted the DBA, MGMT_USER, and AQ_ADMINISTRATOR_ROLE roles.

DBSNMP account is granted the OEM_MONITOR role.

SYSMAN account is granted the MGMT_USER, RESOURCE and SELECT_CATALOG_ROLE roles.

These accounts are not used for routine operations.

create , update 操作 with admin option 转授权限,

revoke时系统权限不会级联回收,但对象权限会级联回收,对象如scott.emp表

Oracle_052_lesson_p8

Oracle_052_lesson_p8

Administrator Authentication

Operating system security:

DBAs must have the OS privileges to create and delete files.
Typical database users should not have the OS privileges to create or delete database files.

Administrator security:

For SYSDBA, SYSOPER, and SYSASM connections:
DBA user by name is audited for password file and strong authentication methods
OS account name is audited for OS authentication
OS authentication takes precedence over password file authentication for privileged users
Password file uses case-sensitive passwords

There are two types of user privileges:

System: Enables users to perform particular actions in the database
Object: Enables users to access and manipulate a specific object

Benefits of Roles 角色的好处:

Easier privilege management
Dynamic privilege management
Selective availability of privileges

Oracle_052_lesson_p8

Oracle_052_lesson_p8

Oracle_052_lesson_p8

Oracle_052_lesson_p8

Oracle_052_lesson_p8

profile

show parameter resource_limit;
resource_limit 必须为真true,所有profile设定才能生效,默认为false;

Supplied Password Verification Function: VERIFY_FUNCTION_11G

The VERIFY_FUNCTION_11G function insures that the password is:

At least eight characters
Different from the username, username with a number, or username reversed
Different from the database name or the database name with a number
A string with at least one alphabetic and one numeric character
Different from the previous password by at least three letters
Tip: Use this function as a template to create your own customized password verification.

Oracle_052_lesson_p8

最小权限化原则

转载于:https://blog.51cto.com/3938853/2162740

你可能感兴趣的文章
sencha touch巧妙使用请求超时提升用户体验
查看>>
15. 3Sum
查看>>
ArrayList源码解析
查看>>
基于SpringMVC、Maven以及Mybatis的环境搭建
查看>>
可见面判别算法---区域细分算法
查看>>
ViewPager Banner(广告墙)
查看>>
iOS开发20:Navigation Bar的简单设置
查看>>
iOS开发24:使用SQLite3存储和读取数据
查看>>
Yii2 Unable to verify your data submission 错误-CSRF
查看>>
angularjs-paste-upload
查看>>
解除 Linux 系统的最大进程数和最大文件打开数限制
查看>>
RXjs相关
查看>>
百练2973: Skew binary 数 之 Java 题解
查看>>
linux基础命令 head
查看>>
在模板中将php数组转换成js对象
查看>>
使用java调用FFMPEG进行转码
查看>>
克隆虚拟机以及互相登陆
查看>>
AES加密解密
查看>>
objective c:import和include的区别, ""和<>区别
查看>>
CentOS 6.5上部署drbd
查看>>