« Home « Chủ đề database SQL

Chủ đề : database SQL


Có 40+ tài liệu thuộc chủ đề "database SQL"

Applied Oracle Security: Developing Secure Database and Middleware Environments- P21

tailieu.vn

With this approach, MARY would not have been able to see any records (no rows selected) when querying the SH.CUSTOMERS tables outside the corporate network.. When a specific DBV identity is asserted for a session, the OLS label associated with the identity will be merged with the maximum label that is assigned to the user. The OLS session label controls...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P22

tailieu.vn

mary@aos>. query MARY's OLS authorization and mary@aos>. attempt to set the session label to HIGH mary@aos>. which MARY is in fact authorized but the mary@aos>. EXECUTE sa_session.set_label('CUSTOMER_POLICY','HIGH');. BEGIN sa_session.set_label('CUSTOMER_POLICY','HIGH. ORA-06512: at "DVSYS.DBMS_MACUTL", line 381. DBV factors can be configured to allow the identity to be assigned by a database session at runtime using the procedure DVSYS.SET_FACTOR. The assignment of a...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P23

tailieu.vn

DBV Secure Application Roles. The PL/SQL program will typically perform a series of checks to determine whether the conditions are correct for the role to be enabled. DBV provides an integration capability with Oracle SARs that allow you define these conditions using a DBV rule set.. To help illustrate how DBV Secure Application Roles work, consider the DBV Is System...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P24

tailieu.vn

o The Sales Management system is not in the process of summarizing monthly sales data at the time the product costs are being entered.. The user opens a browser and accesses the Sales Administration web page.. The system prompts the user for his or her credentials.. The user enters his or her credentials.. The system validates the user’s credentials. If...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P25

tailieu.vn

check_event IN VARCHAR2 , check_obj_owner IN VARCHAR2 , check_obj_name IN VARCHAR2 , sql_event IN VARCHAR2 , sql_obj_owner IN VARCHAR2 , sql_obj_name IN VARCHAR2 ) RETURN NUMBER;. begin_day IN VARCHAR2 , begin_time IN VARCHAR2 , end_day IN VARCHAR2 , end_time IN VARCHAR2. time_format IN VARCHAR2 DEFAULT 'HH24. can be used in DBV Rule Set custom handlers PROCEDURE set_event_context(. command IN VARCHAR2...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P26

tailieu.vn

As you can see, factors can play a significant role in application logic codified in your PL/SQL programs and can be integrated into row-level security mechanisms such as Oracle VPD, Oracle OLS, Oracle FGA, and database views. The implementation of factors as PL/SQL opens up these possibilities and just about any PL/SQL-based database feature such as database triggers or database...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P27

tailieu.vn

For example, we may define an HR read-only role for access to the objects in the HR schema and grant this HR read-only role to the SH schema or a SH-related read-write role.. The users might also have access to execute PL/SQL procedures that are required to participate in the transactional nature of the system, especially in packaged applications for...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P28

tailieu.vn

jean_oper_dba@aos>GRANT CREATE SESSION TO sh;. jean_oper_dba@aos>. account and create or application's objects jean_oper_dba@aos>CONNECT sh. sh@aos>. install our application objects sh@aos>. dbvowner@aos>BEGIN. Operational DBA for audit attribution jean_oper_dba@aos>CREATE ROLE sh_dba_role_0101;. revoke the role from the account jean_oper_dba@aos>. that created it or our privilege jean_oper_dba@aos>. escalation realm authorization jean_oper_dba@aos>. The Oracle Database jean_oper_dba@aos>. performs an implicit and hidden jean_oper_dba@aos>. GRANT of the...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P29

tailieu.vn

jean_oper_dba@aos>GRANT DROP ANY TABLE TO base_maint_admin_0101;. jean_oper_dba@aos>GRANT DROP ANY TRIGGER TO base_maint_admin_0101;. jean_oper_dba@aos>GRANT DROP ANY TYPE TO base_maint_admin_0101;. jean_oper_dba@aos>GRANT DROP ANY VIEW TO base_maint_admin_0101;. jean_oper_dba@aos>. create the role for the Sales History realm jean_oper_dba@aos>. jean_oper_dba@aos>CREATE ROLE sh_maint_admin_0101;. jean_oper_dba@aos>REVOKE sh_maint_admin_0101 FROM jean_oper_dba;. jean_oper_dba@aos>GRANT base_maint_admin_0101 TO sh_maint_admin_0101;. dbvowner@aos>. authorize the Sales History maintenance dbvowner@aos>. dbvowner@aos>BEGIN. 'SH_MAINT_ADMIN_0101. protect the Sales History maintenance dbvowner@aos>....

Applied Oracle Security: Developing Secure Database and Middleware Environments- P30

tailieu.vn

diego_dbvmgr@aos>BEGIN. diego_dbvmgr@aos>. the account is also able to grant the DV_OWNER or diego_dbvmgr@aos>. DV_ADMIN role, resulting in a named account that diego_dbvmgr@aos>. is able to perform DBV Security administration diego_dbvmgr@aos>. diego_dbvmgr@aos>GRANT dv_owner TO scott;. jean_oper_dba@aos>. create the read-only SH application role jean_oper_dba@aos>CREATE ROLE sh_ro_role_0101;. jean_oper_dba@aos>REVOKE sh_ro_role_0101 FROM jean_oper_dba;. create the read-write SH application role jean_oper_dba@aos>CREATE ROLE sh_rw_role_0101;. jean_oper_dba@aos>REVOKE sh_rw_role_0101 FROM...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P31

tailieu.vn

diego_dbvmgr@aos>. conditions to be true diego_dbvmgr@aos>BEGIN. dbms_macadm.create_rule_set(. rule_set_name =>'Add Sales Cost Allowed', description =>. add our Sales department manager rule diego_dbvmgr@aos>BEGIN. dbms_macadm.add_rule_to_rule_set. rule_set_name =>. rule_name =>. add the outside of the system maintenance window rule diego_dbvmgr@aos>BEGIN. add the Sales management package check rule diego_dbvmgr@aos>BEGIN. Finally we create our DBV command rule on the INSERT SQL command for the SH.COSTS table...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P32

tailieu.vn

284 Part II: Oracle Database Vault. If the operational DBA were to attempt to set one of these DBV SARs back on the database server, the DBV rule set would return false and the attempt would be blocked based on the lack of a valid certificate for the session and because jean_oper_dba is not a sales department manager.. jean_oper_dba@aos>BEGIN. In...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P33

tailieu.vn

OBJECT_SCHEMA OBJECT_NAME. The existence of row-level security (RLS) policies on any tables in the database should also serve as an indicator that the table contains sensitive data. sys@aos>. allow LBACSYS to query the VPD configuration table sys@aos>GRANT SELECT ON sys.dba_policies TO lbacsys;. connect as LBACSYS to run the query sys@aos>CONNECT lbacsys. lbacsys/oracle@aos>SELECT 'VPD' policy_type , object_owner. object_name FROM sys.dba_policies. WHERE...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P34

tailieu.vn

Once this configuration is complete, we can immediately leverage externally defined users in the organization as our realm administrators. A key point to this capability is that the membership in the EUS enterprise role SH_DATA_ADMIN_ENTERPRISE, a directory groupOfUniqueNames object, is also controlled externally and can be leveraged in more than just a single database in the organization. For example, if...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P35

tailieu.vn

This is a simple example that makes use of the root and Oracle OS accounts. Note that technologies such as fine-grained OS access control lists, based on IEEE’s POSIX 1003 standards, would offer a solution that uses a non-root account as the file owner, but for brevity we simply used the root account.. With this file populated, we can now...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P36

tailieu.vn

An advanced usage could even query a physical access system used by the company to determine whether the user swiped his or her access badge to get into the building at some point in the business day. We can perform this type of dependency check with the following query, and we see that an application such as HTML DB (APEX)...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P37

tailieu.vn

diego_dbvmgr@aos>. disable the Data Dictionary realm diego_dbvmgr@aos>BEGIN. disable the application realm diego_dbvmgr@aos>BEGIN. app_object_owner@aos>. create an Oracle object type of rule attributes app_object_owner@aos>CREATE OR REPLACE TYPE proposal_type. create the Expression Filter attribute set app_object_owner@aos>. app_object_owner@aos>BEGIN. create a table of sales managers app_object_owner@aos>. and the rules expression column for app_object_owner@aos>. app_object_owner@aos>CREATE TABLE sales_managers ( id NUMBER NOT NULL PRIMARY KEY , name...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P38

tailieu.vn

analyze with AUTOTRACE ON jean_oper_dba@aos>SET AUTOTRACE ON jean_oper_dba@aos>SELECT COUNT. ORA-01031: insufficient privileges jean_oper_dba@aos>EXPLAIN PLAN FOR SELECT COUNT(*). In this section, we present some exciting new features that are available in the latest version of the OEM GC product. of the enterprise security posture that was first introduced in Chapter 2. We conclude the section with a simple example of how...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P39

tailieu.vn

Identity Management. Architecting Identity Management. 358 Part III: Identity Management. his chapter discusses the architectural processes and methods used for solving the identity management problems that many enterprises face today when trying to secure access to their applications and information. “Architecting” a solution requires that you understand the functional nature of the problem (such as protecting customer data from privacy...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P40

tailieu.vn

364 Part III: Identity Management. These questions should generally cover almost any identity management–related processes in a typical enterprise. Answering these questions should give you a comprehensive view of how identity management is conducted in the current environment and, therefore, should help you prioritize the processes that have the highest complexity and highest risk of authorized access provisioning. Discovering Identity...