« Home « Kết quả tìm kiếm

Le6 Administering User Security


Tóm tắt Xem thử

- After completing this lesson, you should be able to do the following:.
- Create and manage database user accounts.
- Create and manage roles.
- Create and manage profiles.
- Implement standard password security features – Control resource usage by users.
- Database User Accounts.
- Each database user account has:.
- Role Profile.
- PW Security Quota.
- Database User Accounts Full Notes Page.
- The SYS account:.
- Is granted the DBA role.
- Has all privileges with ADMIN OPTION.
- Owns the data dictionary.
- The SYSTEM account is granted the DBA role..
- Authenticating Users.
- Authenticating Users Full Notes Page.
- DBAs must have the OS privileges to create and delete files..
- Typical database users should not have the OS privileges to create or delete database files..
- SYSBA and SYSOPER connections are authorized via password file or OS..
- Password file authentication records the DBA user by name..
- OS authentication takes precedence over password file authentication for SYSDBA and SYSOPER.
- Unlocking a User Account and Resetting the Password.
- System: Enables users to perform particular actions in the database.
- Object: Enables users to access and manipulate a specific object.
- System privilege:.
- Create session..
- Privilege Role Profile.
- System Privileges.
- System Privileges Full Notes Page.
- Object Privileges.
- Revoking System Privileges with ADMIN OPTION.
- REVOKE CREATE TABLE FROM jeff;.
- DBA Jeff Emi.
- Jeff Emi.
- Revoking Object Privileges with GRANT OPTION.
- Bob Jeff Emi.
- Assigning Privileges to Roles and Roles to Users.
- CONNECT CREATE SESSION.
- CREATE SEQUENCE , CREATE TABLE , CREATE.
- DBA Most system privileges, several other roles.
- Do not grant to nonadministrators..
- No system privileges, but HS_ADMIN_ROLE and over 1,700 object privileges on the data dictionary.
- Roles may also be secured programmatically..
- Roles may be nondefault..
- Roles may be protected through authentication..
- Assigning Roles to Users.
- Profiles and Users.
- Control resource consumption.
- Profiles and Users Full Notes Page.
- Implementing Password Security Features.
- Note: Do not use profiles that cause the SYS , SYSMAN , and DBSNMP passwords to expire and the accounts to get locked..
- Password Security Full Notes Page.
- Supplied Password Verification Function:.
- The supplied password verification function enforces these password restrictions:.
- The password cannot be the same as the username..
- The password must have at least one alphabetic, one numeric, and one special character..
- The password must differ from the previous password by at least three letters..
- Tip: Use this function as a template to create your own customized password verification..
- Assigning Quota to Users.
- Users who do not have the UNLIMITED.
- TABLESPACE system privilege must be given a quota before they can create objects in a tablespace.
- PW Security.
- Assigning Quota to Users Full Notes Page.
- In this lesson, you should have learned how to:.
- This practice covers the following topics:.
- Creating a profile to limit resource consumption

Xem thử không khả dụng, vui lòng xem tại trang nguồn
hoặc xem Tóm tắt