« Home « Chủ đề database SQL

Chủ đề : database SQL


Có 60+ tài liệu thuộc chủ đề "database SQL"

Applied Oracle Security: Developing Secure Database and Middleware Environments- P41

tailieu.vn

374 Part III: Identity Management. Chapter 9 discusses the Oracle Directory Management story in more detail and shows how you can apply OID and OVD together and independently to solve the basic challenges of creating a central logical location for accessing identity information related to any user in your enterprise.. Single sign-on (SSO) The ability to reuse an authenticated session...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P42

tailieu.vn

386 Part III: Identity Management. Configuration of such provisioning automation can be done in many ways;. we’ll show you some examples and best practice implementations of user provisioning. The User Provisioning Challenge. such as on-boarding or hire-to-retire. User provisioning is a subprocess initiated by the on- boarding or hire-to-retire process that deals specifically with giving users access to resources.. In...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P43

tailieu.vn

394 Part III: Identity Management. Double-click the newly created task and go to the Assignment tabs.. Right-click the Approve box of your first task, select Add Response Generated Task, and drag the arrow to the second task (App Admin Approval) to finish out the workflow.. Who has access to what resources?. Who should have access to what resources?. Chapter 9:...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P44

tailieu.vn

406 Part III: Identity Management. Oracle’s directory strategy relies on the Lightweight Directory Access Protocol (LDAP) standard as the primary interface for exchanging and managing the directory data. The original point of creating the LDAP server was to have an information repository highly optimized for reading data. Oracle offers two directory products—Oracle Internet Directory (OID) and Oracle Virtual Directory (OVD)—that...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P45

tailieu.vn

414 Part III: Identity Management. Before any physical information is presented through a virtual directory, you need to define and design the directory tree and namespace that organizes all the information across the enterprise.. Traditionally, this part of the project can often be a paralyzing step since it requires that people agree on a common namespace. You are no longer...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P46

tailieu.vn

A join view is conceptually similar to a database view, where information from other adapters is joined together using some condition, or “joiner.” A join view typically has a “primary” source for the user data that is then unified with a “joined” source to create the extended user profile.. This is a great use case for using an OVD join...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P47

tailieu.vn

Introduction to the APEX Environment. APEX is a web development environment that lives completely inside the database.. Understanding the APEX environment—both development and runtime—is critical to your understanding of how to secure it. Client-server developers have worked in environments in which each user connects to the database as a true database user or schema. APEX falls somewhere in between these...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P48

tailieu.vn

A developer can now import/export applications and pages and modify application and page-level attributes simply by connecting to a schema associated with an APEX application using SQL Developer, and then right-clicking the application in the APEX tree. OHS uses a Database Access Descriptor (DAD), defined in $ORACLE_HOME/ohs/mod_plsql/. conf/dads.conf, to connect to the database. Each DAD includes connection information for the...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P49

tailieu.vn

LISTEN 5830/httpd This does not tell you what type of traffic the ports are listening for, but it is useful for a quick reminder of the ports in use without your having to dig too deep into the file system to find ssl.. Keep in mind that HTTPD is the process name for Apache-based HTTP servers, so if you’re running...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P50

tailieu.vn

The following package will be used to create and authenticate users. In the event that someone does gain access to our table, he cannot simply query one of the dictionary views such as DBA_DEPENDENCIES to determine the package used to set the password. create or replace package custom_apex_auth as. p_username in varchar2, p_password in varchar2);. end custom_apex_auth;. create or replace...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P51

tailieu.vn

at the end of the statement is the comment operator in Oracle SQL, which comments out the trailing single quote that is in the original procedure. The addition of this predicate completely changes the result set of the query. Instead of simply passing different last names to the procedure, we are able to construct parameters that will modify the structure...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P52

tailieu.vn

VPD is one of the best ways to push data security down to the lowest possible level. When another technology is introduced that needs to access the same data, the semantics of the security policy has to be replicated to the new technology. Obviously, this is difficult to maintain, prone to errors, and easy to subvert, because all a nefarious...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P53

tailieu.vn

494 Part IV: Applied Security for Oracle APEX and Oracle Business Intelligence. Note that the new row in the audit trail was issued by the database user ANONYMOUS, which typically means it’s coming from APEX using the Embedded PL/SQL Gateway. Also note that APEX sets CLIENT_ID to the APEX User and APEX Session ID number that is captured in the...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P54

tailieu.vn

Oracle BI uses a shared cache mechanism to increase performance. (The security implications of this cache are discussed in detail in Chapter 14.) If the cache cannot be used to satisfy the request, the BI server will use the metadata defined in the RPD to construct a physical SQL statement (in the case of a relational database source) to be...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P55

tailieu.vn

In the database that actually contains the database users, create a connection pool that will be used solely for authentication.. These are the values the user entered into the logon screen and the presentation service is forwarding them to the BI server. The BI server will attempt to connect to the database using these values.. When a user attempts to...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P56

tailieu.vn

Oracle BI Publisher Authorization. As mentioned, Oracle BI Publisher supports several security models. When Oracle BI Publisher is being used as an integrated component of Oracle BI, it should be set up to use Oracle BI Server security. In this situation, Oracle BI Publisher groups and group membership is inherited directly from the BI server groups. All BI server groups...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P57

tailieu.vn

Securing Oracle BI Content and Data. n Chapter 13, we talked about securing access to the Oracle Business Intelligence (BI) server itself. Now let’s move into the realm of securing the actual data and content served up by Oracle BI.. At this point, Oracle BI knows who the end user is and knows the groups in which the user belongs....

Applied Oracle Security: Developing Secure Database and Middleware Environments- P58

tailieu.vn

Figure 14-5 shows the variables when BIPRODUCT1 is logged into Oracle BI, and Figure 14-6 shows the variables when BIPRODUCT2 is logged into Oracle BI. FIGURE 14-4 The PRODUCT_MANAGERS table. FIGURE 14-5 The Utilities dashboard when BIPRODUCT1 is logged into Oracle BI. Now that the session variable is set up and working, we can define the business model filter.. Applying...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P59

tailieu.vn

The other important thing to notice in this package is the VPD tagging function called VPD_TAG:. PACKAGE bi_select.channel_policy AS. FUNCTION vpd_tag. PACKAGE body bi_select.channel_policy AS. (select channel_id from bi_tables.channel_managers where upper(bi_tables.channel_managers.user_name. (SELECT TO_CHAR(channel_id) channel_id FROM bi_tables.channel_managers. The tag on the Oracle BI cache entry will consist of the values of the security sensitive session variables for the user that issued...

Applied Oracle Security: Developing Secure Database and Middleware Environments- P60

tailieu.vn

Once the database knows who is running the query, it should be a simple matter of enabling database auditing.. The consequence is that when the caching feature of Oracle BI is enabled, it is possible that queries will sometimes be satisfied without even accessing the database. In such cases, there is nothing to audit in the database, because the database...