Planning Security for an Administrative Domain
6-2
Oracle Secure Backup Installation and Configuration Guide
Oracle Secure Backup meets these requirements in its default configuration. By
default, all hosts that run Oracle Secure Backup must have their identity verified
before they can join the administrative domain. A host within the domain uses an
X.509
certificate
for
host authentication
. After a
Secure Sockets Layer (SSL)
connection is established between hosts, control and data messages are encrypted
when transmitted over the network. SSL protects the administrative domain from
eavesdropping, message tampering or forgery, and replay attacks.
Network backup software such as Oracle Secure Backup is only one component of a
secure backup network. Oracle Secure Backup can supplement but not replace the
physical and network security provided by administrators.
Planning Security for an Administrative Domain
If security is of primary concern in your environment, then you might find it helpful to
plan for network security in the following stages:
■
Identifying Assets and Principals
■
Identifying Your Backup Environment Type
■
Choosing Secure Hosts for the Administrative and Media Servers
■
Determining the Distribution Method of Host Identity Certificates
After completing these stages, you can proceed to the implementation phase as
described in
"Configuring Security for the Administrative Domain"
on page 6-16.
Identifying Assets and Principals
The first step in planning security for an
administrative domain
is determining the
assets and principals associated with the domain. The assets of the domain include:
■
Database and file-system data requiring backup
■
Metadata about the database and file-system data
■
Passwords
■
Identities
■
Hosts and storage devices
Principals are users who either have access to the assets associated with the
administrative domain or to a larger network that contains the domain. Principals
include the following users:
■
Backup administrators
These Oracle Secure Backup users have administrative
rights
in the domain,
access to the tapes containing backup data, and the rights required to perform
backup and restore operations.
■
Database administrators
Each database administrator has complete access to his or her own database.
■
Host owners
Each host owner has complete access to its file system.
■
System administrators
These users might have access to the corporate network and to the hosts in the
administrative domain (although not necessarily root access).
Содержание Secure Backup 10.3
Страница 8: ...viii ...
Страница 26: ...About Upgrade Installations 1 16 Oracle Secure Backup Installation and Configuration Guide ...
Страница 82: ...Using obtool 4 14 Oracle Secure Backup Installation and Configuration Guide ...
Страница 110: ...Verifying and Configuring Added Tape Devices 5 28 Oracle Secure Backup Installation and Configuration Guide ...
Страница 152: ...Installation and Configuration D 6 Oracle Secure Backup Installation and Configuration Guide ...