Configuring Enterprise User Security for SSL Authentication
Enterprise User Security Configuration Tasks and Troubleshooting
12-21
If the KDC is part of the operating system, such as Windows 2000 or some versions
of Linux or UNIX, then the operating system automatically picks up the user's ticket
(with the
FORWARDABLE
flag set) from the cache when the user logs in.
The user connects to the database by launching SQL*Plus and entering the
following at the command line:
SQL> connect /@<net_service_name>
The database uses Kerberos to authenticate the user. The database authenticates
itself to the directory by password.
If your connection succeeds, then the system responds
Connected to:...
. This
is the confirmation message of a successful connect and setup. If an error message
displays, then see
"ORA-# Errors for Kerberos-Authenticated Enterprise Users"
on
page 12-29.
If you do connect successfully, then check that the appropriate global roles were
retrieved from the directory by entering the following at the SQL*Plus prompt:
select * from session_roles
If the global roles were not retrieved from the directory, then see
"NO-GLOBAL-ROLES Checklist"
on page 12-33.
You have completed Kerberos-authenticated Enterprise User Security configuration.
Configuring Enterprise User Security for SSL Authentication
The configuration steps in this section assume the following:
■
You have obtained the appropriate PKI credentials and used Oracle Wallet
Manager to create wallets for the directories, the databases, and the clients that
you want to include in your Enterprise User Security implementation.
■
You have confirmed that the following DNs are identical:
See Also:
■
"Troubleshooting Enterprise User Security"
on page 12-26 for
information about diagnosing and resolving errors.
■
Chapter 13, "Administering Enterprise User Security"
for
information about configuring the identity management realm,
and information about creating and managing enterprise
domains, enterprise roles, and enterprise users.
Содержание Database Advanced Security 10g Release 1
Страница 17: ...xvii ...
Страница 20: ...xx ...
Страница 24: ...xxiv ...
Страница 42: ...xlii ...
Страница 44: ......
Страница 62: ...Oracle Advanced Security Restrictions 1 18 Oracle Database Advanced Security Administrator s Guide ...
Страница 100: ...Duties of an Enterprise User Security Administrator DBA 2 38 Oracle Database Advanced Security Administrator s Guide ...
Страница 102: ......
Страница 116: ...How To Configure Data Encryption and Integrity 3 14 Oracle Database Advanced Security Administrator s Guide ...
Страница 124: ......
Страница 148: ...RSA ACE Server Configuration Checklist 5 24 Oracle Database Advanced Security Administrator s Guide ...
Страница 246: ...Managing Certificates 8 28 Oracle Database Advanced Security Administrator s Guide ...
Страница 254: ...Configuring Oracle Database for External Authentication 9 8 Oracle Database Advanced Security Administrator s Guide ...
Страница 284: ......
Страница 350: ...Troubleshooting Enterprise User Security 12 38 Oracle Database Advanced Security Administrator s Guide ...
Страница 384: ......
Страница 394: ...Data Encryption and Integrity Parameters A 10 Oracle Database Advanced Security Administrator s Guide ...
Страница 414: ...Physical Security D 6 Oracle Database Advanced Security Administrator s Guide ...
Страница 518: ...Index 10 ...