xii
Considerations for Choosing Authentication Types between Clients, Databases, and
Directories for Enterprise User Security................................................................................
11-28
12
Enterprise User Security Configuration Tasks and Troubleshooting
Enterprise User Security Configuration Overview
.....................................................................
12-1
Enterprise User Security Configuration Roadmap
.....................................................................
12-4
Preparing the Directory for Enterprise User Security
................................................................
12-5
Configuring Enterprise User Security Objects in the Database and the Directory
...........
12-11
Configuring Enterprise User Security for Password Authentication
...................................
12-16
Configuring Enterprise User Security for Kerberos Authentication
....................................
12-18
Configuring Enterprise User Security for SSL Authentication
..............................................
12-21
Viewing the Database DN in the Wallet and in the Directory...........................................
12-24
Enabling Current User Database Links
......................................................................................
12-25
Troubleshooting Enterprise User Security
.................................................................................
12-26
ORA-# Errors for Password-Authenticated Enterprise Users............................................
12-26
ORA-# Errors for Kerberos-Authenticated Enterprise Users .............................................
12-29
ORA-# Errors for SSL-Authenticated Enterprise Users ......................................................
12-32
NO-GLOBAL-ROLES Checklist .............................................................................................
12-33
USER-SCHEMA ERROR Checklist ........................................................................................
12-34
DOMAIN-READ-ERROR Checklist ......................................................................................
12-35
13
Administering Enterprise User Security
Enterprise User Security Administration Tools Overview
.......................................................
13-2
Administering Identity Management Realms
............................................................................
13-3
Identity Management Realm Versions ....................................................................................
13-4
Setting Properties of an Identity Management Realm ..........................................................
13-5
Setting Login Name, Kerberos Principal Name, User Search Base, and Group Search Base
Identity Management Realm Attributes..................................................................................
13-5
Setting the Default Database-to-Directory Authentication Type for an Identity Management
Realm ............................................................................................................................................
13-6
Managing Identity Management Realm Administrators......................................................
13-7
Administering Enterprise Users
.....................................................................................................
13-8
Creating New Enterprise Users ................................................................................................
13-9
Setting Enterprise User Passwords ........................................................................................
13-10
Defining an Initial Enterprise Role Assignment ..................................................................
13-11
Содержание Database Advanced Security 10g Release 1
Страница 17: ...xvii ...
Страница 20: ...xx ...
Страница 24: ...xxiv ...
Страница 42: ...xlii ...
Страница 44: ......
Страница 62: ...Oracle Advanced Security Restrictions 1 18 Oracle Database Advanced Security Administrator s Guide ...
Страница 100: ...Duties of an Enterprise User Security Administrator DBA 2 38 Oracle Database Advanced Security Administrator s Guide ...
Страница 102: ......
Страница 116: ...How To Configure Data Encryption and Integrity 3 14 Oracle Database Advanced Security Administrator s Guide ...
Страница 124: ......
Страница 148: ...RSA ACE Server Configuration Checklist 5 24 Oracle Database Advanced Security Administrator s Guide ...
Страница 246: ...Managing Certificates 8 28 Oracle Database Advanced Security Administrator s Guide ...
Страница 254: ...Configuring Oracle Database for External Authentication 9 8 Oracle Database Advanced Security Administrator s Guide ...
Страница 284: ......
Страница 350: ...Troubleshooting Enterprise User Security 12 38 Oracle Database Advanced Security Administrator s Guide ...
Страница 384: ......
Страница 394: ...Data Encryption and Integrity Parameters A 10 Oracle Database Advanced Security Administrator s Guide ...
Страница 414: ...Physical Security D 6 Oracle Database Advanced Security Administrator s Guide ...
Страница 518: ...Index 10 ...