Có 60+ tài liệu thuộc chủ đề "database SQL"
tailieu.vn Xem trực tuyến Tải xuống
374 Part III: Identity Management. Chapter 9 discusses the Oracle Directory Management story in more detail and shows how you can apply OID and OVD together and independently to solve the basic challenges of creating a central logical location for accessing identity information related to any user in your enterprise.. Single sign-on (SSO) The ability to reuse an authenticated session...
tailieu.vn Xem trực tuyến Tải xuống
386 Part III: Identity Management. Configuration of such provisioning automation can be done in many ways;. we’ll show you some examples and best practice implementations of user provisioning. The User Provisioning Challenge. such as on-boarding or hire-to-retire. User provisioning is a subprocess initiated by the on- boarding or hire-to-retire process that deals specifically with giving users access to resources.. In...
tailieu.vn Xem trực tuyến Tải xuống
394 Part III: Identity Management. Double-click the newly created task and go to the Assignment tabs.. Right-click the Approve box of your first task, select Add Response Generated Task, and drag the arrow to the second task (App Admin Approval) to finish out the workflow.. Who has access to what resources?. Who should have access to what resources?. Chapter 9:...
tailieu.vn Xem trực tuyến Tải xuống
406 Part III: Identity Management. Oracle’s directory strategy relies on the Lightweight Directory Access Protocol (LDAP) standard as the primary interface for exchanging and managing the directory data. The original point of creating the LDAP server was to have an information repository highly optimized for reading data. Oracle offers two directory products—Oracle Internet Directory (OID) and Oracle Virtual Directory (OVD)—that...
tailieu.vn Xem trực tuyến Tải xuống
414 Part III: Identity Management. Before any physical information is presented through a virtual directory, you need to define and design the directory tree and namespace that organizes all the information across the enterprise.. Traditionally, this part of the project can often be a paralyzing step since it requires that people agree on a common namespace. You are no longer...
tailieu.vn Xem trực tuyến Tải xuống
A join view is conceptually similar to a database view, where information from other adapters is joined together using some condition, or “joiner.” A join view typically has a “primary” source for the user data that is then unified with a “joined” source to create the extended user profile.. This is a great use case for using an OVD join...
tailieu.vn Xem trực tuyến Tải xuống
Introduction to the APEX Environment. APEX is a web development environment that lives completely inside the database.. Understanding the APEX environment—both development and runtime—is critical to your understanding of how to secure it. Client-server developers have worked in environments in which each user connects to the database as a true database user or schema. APEX falls somewhere in between these...
tailieu.vn Xem trực tuyến Tải xuống
A developer can now import/export applications and pages and modify application and page-level attributes simply by connecting to a schema associated with an APEX application using SQL Developer, and then right-clicking the application in the APEX tree. OHS uses a Database Access Descriptor (DAD), defined in $ORACLE_HOME/ohs/mod_plsql/. conf/dads.conf, to connect to the database. Each DAD includes connection information for the...
tailieu.vn Xem trực tuyến Tải xuống
LISTEN 5830/httpd This does not tell you what type of traffic the ports are listening for, but it is useful for a quick reminder of the ports in use without your having to dig too deep into the file system to find ssl.. Keep in mind that HTTPD is the process name for Apache-based HTTP servers, so if you’re running...
tailieu.vn Xem trực tuyến Tải xuống
The following package will be used to create and authenticate users. In the event that someone does gain access to our table, he cannot simply query one of the dictionary views such as DBA_DEPENDENCIES to determine the package used to set the password. create or replace package custom_apex_auth as. p_username in varchar2, p_password in varchar2);. end custom_apex_auth;. create or replace...
tailieu.vn Xem trực tuyến Tải xuống
at the end of the statement is the comment operator in Oracle SQL, which comments out the trailing single quote that is in the original procedure. The addition of this predicate completely changes the result set of the query. Instead of simply passing different last names to the procedure, we are able to construct parameters that will modify the structure...
tailieu.vn Xem trực tuyến Tải xuống
VPD is one of the best ways to push data security down to the lowest possible level. When another technology is introduced that needs to access the same data, the semantics of the security policy has to be replicated to the new technology. Obviously, this is difficult to maintain, prone to errors, and easy to subvert, because all a nefarious...
tailieu.vn Xem trực tuyến Tải xuống
494 Part IV: Applied Security for Oracle APEX and Oracle Business Intelligence. Note that the new row in the audit trail was issued by the database user ANONYMOUS, which typically means it’s coming from APEX using the Embedded PL/SQL Gateway. Also note that APEX sets CLIENT_ID to the APEX User and APEX Session ID number that is captured in the...
tailieu.vn Xem trực tuyến Tải xuống
Oracle BI uses a shared cache mechanism to increase performance. (The security implications of this cache are discussed in detail in Chapter 14.) If the cache cannot be used to satisfy the request, the BI server will use the metadata defined in the RPD to construct a physical SQL statement (in the case of a relational database source) to be...
tailieu.vn Xem trực tuyến Tải xuống
In the database that actually contains the database users, create a connection pool that will be used solely for authentication.. These are the values the user entered into the logon screen and the presentation service is forwarding them to the BI server. The BI server will attempt to connect to the database using these values.. When a user attempts to...
tailieu.vn Xem trực tuyến Tải xuống
Oracle BI Publisher Authorization. As mentioned, Oracle BI Publisher supports several security models. When Oracle BI Publisher is being used as an integrated component of Oracle BI, it should be set up to use Oracle BI Server security. In this situation, Oracle BI Publisher groups and group membership is inherited directly from the BI server groups. All BI server groups...
tailieu.vn Xem trực tuyến Tải xuống
Securing Oracle BI Content and Data. n Chapter 13, we talked about securing access to the Oracle Business Intelligence (BI) server itself. Now let’s move into the realm of securing the actual data and content served up by Oracle BI.. At this point, Oracle BI knows who the end user is and knows the groups in which the user belongs....
tailieu.vn Xem trực tuyến Tải xuống
Figure 14-5 shows the variables when BIPRODUCT1 is logged into Oracle BI, and Figure 14-6 shows the variables when BIPRODUCT2 is logged into Oracle BI. FIGURE 14-4 The PRODUCT_MANAGERS table. FIGURE 14-5 The Utilities dashboard when BIPRODUCT1 is logged into Oracle BI. Now that the session variable is set up and working, we can define the business model filter.. Applying...
tailieu.vn Xem trực tuyến Tải xuống
The other important thing to notice in this package is the VPD tagging function called VPD_TAG:. PACKAGE bi_select.channel_policy AS. FUNCTION vpd_tag. PACKAGE body bi_select.channel_policy AS. (select channel_id from bi_tables.channel_managers where upper(bi_tables.channel_managers.user_name. (SELECT TO_CHAR(channel_id) channel_id FROM bi_tables.channel_managers. The tag on the Oracle BI cache entry will consist of the values of the security sensitive session variables for the user that issued...
tailieu.vn Xem trực tuyến Tải xuống
Once the database knows who is running the query, it should be a simple matter of enabling database auditing.. The consequence is that when the caching feature of Oracle BI is enabled, it is possible that queries will sometimes be satisfied without even accessing the database. In such cases, there is nothing to audit in the database, because the database...