Enterprise User Security Configuration Tasks And Troubleshooting; Enterprise User Security Configuration Overview - Oracle Database B10772-01 Administrator's Manual

Database
Table of Contents

Advertisement

Enterprise User Security Configuration
This chapter describes the sequence of steps involved to configure Enterprise User
Security from the initial database and directory preparation through connecting to
the database as either a password-, Kerberos-, or SSL-authenticated enterprise user.
In addition, a troubleshooting section is also included that will help you when
testing your Enterprise User Security implementation.
This chapter contains the following topics:
Enterprise User Security Configuration Overview
Configuring Enterprise User Security essentially consists of creating shared schemas
and global roles in databases that you want to be accessible to enterprise users.
Then you configure the identity management realm in the directory to reflect those
database roles and schemas, and, finally, associate directory users with them.
Tasks and Troubleshooting
Enterprise User Security Configuration Overview
Enterprise User Security Configuration Roadmap
Preparing the Directory for Enterprise User Security
Configuring Enterprise User Security Objects in the Database and the Directory
Configuring Enterprise User Security for Password Authentication
Configuring Enterprise User Security for Kerberos Authentication
Configuring Enterprise User Security for SSL Authentication
Enabling Current User Database Links
Troubleshooting Enterprise User Security
Enterprise User Security Configuration Tasks and Troubleshooting 12-1
12

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Oracle Database B10772-01 and is the answer not in the manual?

Subscribe to Our Youtube Channel

This manual is also suitable for:

Database advanced security 10g release 1

Table of Contents