Presentation is loading. Please wait.

Presentation is loading. Please wait.

6 Copyright © 2005, Oracle. All rights reserved. Administering User Security.

Similar presentations


Presentation on theme: "6 Copyright © 2005, Oracle. All rights reserved. Administering User Security."— Presentation transcript:

1 6 Copyright © 2005, Oracle. All rights reserved. Administering User Security

2 6-2 Copyright © 2005, Oracle. All rights reserved. Objectives After completing this lesson, you should be able to do the following: Create and manage database user accounts –Authenticate users –Assign default storage areas (tablespaces) Grant and revoke privileges Create and manage roles Create and manage profiles –Implement standard password security features –Control resource usage by users

3 6-3 Copyright © 2005, Oracle. All rights reserved. Database User Accounts Each database user account has: A unique username An authentication method A default tablespace A temporary tablespace A user profile A consumer group A lock status >User Authentication Privilege Role Profile PW Security Quota

4 6-4 Copyright © 2005, Oracle. All rights reserved. Database User Accounts Full Notes Page

5 6-5 Copyright © 2005, Oracle. All rights reserved. Predefined Accounts: SYS and SYSTEM The SYS account: –Is granted the DBA role –Has all privileges with ADMIN OPTION –Is required for startup, shutdown, and some maintenance commands –Owns the data dictionary –Owns the Automatic Workload Repository (AWR) The SYSTEM account is granted the DBA role. These accounts are not used for routine operations.

6 6-6 Copyright © 2005, Oracle. All rights reserved. Creating a User Select Administration > Schema > Users & Privileges > Users, and then click the Create button.

7 6-7 Copyright © 2005, Oracle. All rights reserved. Authenticating Users Password External Global User >Authentication Privilege Role Profile PW Security Quota

8 6-8 Copyright © 2005, Oracle. All rights reserved. Authenticating Users Full Notes Page

9 6-9 Copyright © 2005, Oracle. All rights reserved. Administrator Authentication Operating System Security DBAs must have the OS privileges to create and delete files. Typical database users should not have the OS privileges to create or delete database files. Administrator Security SYSBA and SYSOPER connections are authorized via password file or OS. –Password file authentication records the DBA user by name. –OS authentication does not record the specific user. –OS authentication takes precedence over password file authentication for SYSDBA and SYSOPER.

10 6-10 Copyright © 2005, Oracle. All rights reserved. Unlocking a User Account and Resetting the Password Select the user, and click Unlock User.

11 6-11 Copyright © 2005, Oracle. All rights reserved. Privileges There are two types of user privileges: System: Enables users to perform particular actions in the database Object: Enables users to access and manipulate a specific object System privilege: Create session. HR_DBA Object privilege: Update employees. User Authentication >Privilege Role Profile PW Security Quota

12 6-12 Copyright © 2005, Oracle. All rights reserved. System Privileges

13 6-13 Copyright © 2005, Oracle. All rights reserved. System Privileges Full Notes Page

14 6-14 Copyright © 2005, Oracle. All rights reserved. Object Privileges To grant object privileges, perform these tasks: 1.Choose the object type. 2.Select objects. 3.Select privileges.

15 6-15 Copyright © 2005, Oracle. All rights reserved. GRANT REVOKE Revoking System Privileges with ADMIN OPTION REVOKE CREATE TABLE FROM jeff; User Privilege Object DBAJeffEmi JeffEmiDBA

16 6-16 Copyright © 2005, Oracle. All rights reserved. GRANT REVOKE Revoking Object Privileges with GRANT OPTION BobJeffEmi JeffBob

17 6-17 Copyright © 2005, Oracle. All rights reserved. Benefits of Roles Easier privilege management Dynamic privilege management Selective availability of privileges User Authentication Privilege >Role Profile PW Security Quota

18 6-18 Copyright © 2005, Oracle. All rights reserved. Assigning Privileges to Roles and Roles to Users Users Privileges Roles HR_CLERK HR_MGR JennyDavidRachel Delete employees. Select employees. Update employees. Insert employees.

19 6-19 Copyright © 2005, Oracle. All rights reserved. Predefined Roles CONNECTCREATE SESSION RESOURCE CREATE CLUSTER, CREATE INDEXTYPE, CREATE OPERATOR, CREATE PROCEDURE, CREATE SEQUENCE, CREATE TABLE, CREATE TRIGGER, CREATE TYPE SCHEDULER_ ADMIN CREATE ANY JOB, CREATE EXTERNAL JOB, CREATE JOB, EXECUTE ANY CLASS, EXECUTE ANY PROGRAM, MANAGE SCHEDULER DBA Most system privileges, several other roles. Do not grant to nonadministrators. SELECT_ CATALOG_ ROLE No system privileges, but HS_ADMIN_ROLE and over 1,700 object privileges on the data dictionary

20 6-20 Copyright © 2005, Oracle. All rights reserved. Creating a Role Select Administration > Schema > Users & Privileges > Roles.

21 6-21 Copyright © 2005, Oracle. All rights reserved. CREATE ROLE secure_application_role IDENTIFIED USING ; Secure Roles Roles may also be secured programmatically. Roles may be nondefault. SET ROLE vacationdba; Roles may be protected through authentication.

22 6-22 Copyright © 2005, Oracle. All rights reserved. Assigning Roles to Users

23 6-23 Copyright © 2005, Oracle. All rights reserved. Profiles and Users Users are assigned only one profile at any given time. Profiles: Control resource consumption Manage account status and password expiration User Authentication Privilege Role >Profile PW Security Quota

24 6-24 Copyright © 2005, Oracle. All rights reserved. Profiles and Users Full Notes Page

25 6-25 Copyright © 2005, Oracle. All rights reserved. Implementing Password Security Features Password history Account locking Password aging and expiration Password complexity verification UserSetting up profiles Note: Do not use profiles that cause the SYS, SYSMAN, and DBSNMP passwords to expire and the accounts to get locked. User Authentication Privilege Role Profile >PW Security Quota

26 6-26 Copyright © 2005, Oracle. All rights reserved. Password Security Full Notes Page

27 6-27 Copyright © 2005, Oracle. All rights reserved. Creating a Password Profile

28 6-28 Copyright © 2005, Oracle. All rights reserved. Supplied Password Verification Function: VERIFY_FUNCTION The supplied password verification function enforces these password restrictions: The minimum length is four characters. The password cannot be the same as the username. The password must have at least one alphabetic, one numeric, and one special character. The password must differ from the previous password by at least three letters. Tip: Use this function as a template to create your own customized password verification.

29 6-29 Copyright © 2005, Oracle. All rights reserved. Assigning Quota to Users Users who do not have the UNLIMITED TABLESPACE system privilege must be given a quota before they can create objects in a tablespace. Quotas can be: A specific value in megabytes or kilobytes Unlimited User Authentication Privilege Role Profile PW Security >Quota

30 6-30 Copyright © 2005, Oracle. All rights reserved. Assigning Quota to Users Full Notes Page

31 6-31 Copyright © 2005, Oracle. All rights reserved. Summary In this lesson, you should have learned how to: Create and manage database user accounts –Authenticate users –Assign default storage areas (tablespaces) Grant and revoke privileges Create and manage roles Create and manage profiles –Implement standard password security features –Control resource usage by users

32 6-32 Copyright © 2005, Oracle. All rights reserved. Practice Overview: Administering Users This practice covers the following topics: Creating a profile to limit resource consumption Creating two roles: – HRCLERK – HRMANAGER Creating four new users: –One manager and two clerks –One schema user for the next practice session


Download ppt "6 Copyright © 2005, Oracle. All rights reserved. Administering User Security."

Similar presentations


Ads by Google