Introduction to Enterprise User Security
11-6
Oracle Database Advanced Security Administrator's Guide
About Identity Management Realms
An identity management realm is a subtree of
directory entries, all of which are governed by the same administrative policies. For
example, all employees in an enterprise who have access to the intranet may belong
to one realm, while all external users who access the public applications of the
enterprise may belong to another realm. Use of different realms enables an
enterprise to isolate user populations and enforce different administrative policies,
such as password policies or naming policies, in each realm.
About Identity Management Realm-Specific Oracle Contexts
Each identity management
realm has a realm-specific Oracle Context (realm Oracle Context) that stores Oracle
product information for that realm. A realm Oracle Context stores application data,
how users are named and located, how users must be authenticated, group
locations, and privilege assignments—all specific to the particular identity
management realm in which the realm Oracle Context is located.
Enterprise Users Compared to Database Users
Database users are typically defined in the database by using the
CREATE USER
statement as follows:
CREATE USER username IDENTIFIED BY password;
This creates a database user, associated with a user schema, who can access the
database and be authenticated by using a password with the
CONNECT
command as
follows:
connect username/password@database_service_name
Database users must be created in each database they need to access, and they can
choose a different password for each database. Database user privileges are
controlled by local roles in each database.
In contrast, enterprise users are provisioned and managed centrally in an
LDAP-compliant directory, such as Oracle Internet Directory, for database access.
Enterprise users have a unique identity in the directory called the
distinguished
See Also:
■
Oracle Internet Directory Administrator's Guide for information
about Oracle Internet Directory and its architecture.
■
"About Enterprise User Security Directory Entries"
on
page 11-11 for information about Oracle Internet Directory
entries that are used for Enterprise User Security.
Содержание Database Advanced Security 10g Release 1
Страница 17: ...xvii ...
Страница 20: ...xx ...
Страница 24: ...xxiv ...
Страница 42: ...xlii ...
Страница 44: ......
Страница 62: ...Oracle Advanced Security Restrictions 1 18 Oracle Database Advanced Security Administrator s Guide ...
Страница 100: ...Duties of an Enterprise User Security Administrator DBA 2 38 Oracle Database Advanced Security Administrator s Guide ...
Страница 102: ......
Страница 116: ...How To Configure Data Encryption and Integrity 3 14 Oracle Database Advanced Security Administrator s Guide ...
Страница 124: ......
Страница 148: ...RSA ACE Server Configuration Checklist 5 24 Oracle Database Advanced Security Administrator s Guide ...
Страница 246: ...Managing Certificates 8 28 Oracle Database Advanced Security Administrator s Guide ...
Страница 254: ...Configuring Oracle Database for External Authentication 9 8 Oracle Database Advanced Security Administrator s Guide ...
Страница 284: ......
Страница 350: ...Troubleshooting Enterprise User Security 12 38 Oracle Database Advanced Security Administrator s Guide ...
Страница 384: ......
Страница 394: ...Data Encryption and Integrity Parameters A 10 Oracle Database Advanced Security Administrator s Guide ...
Страница 414: ...Physical Security D 6 Oracle Database Advanced Security Administrator s Guide ...
Страница 518: ...Index 10 ...