Introduction to access control in Oracle

Source: Internet
Author: User

Oracle uses a variety of different mechanisms to manage database security, including two mechanisms: mode and user. The mode is a set of mode objects, such as tables, views, processes, and packages. The first database has a set of modes.

Each Oracle database has a combination of users who can access a database, run a database application, and use the user to connect to a database that defines the user. When you create a database user, create a mode for the user. The mode name is the same as the user name. Once a user connects to a database, the user can access all objects in the corresponding mode. A user is only associated with the mode with the same name, so the user and the mode are similar.

The user's access right is controlled by the user's security domain settings. When a new user creates a database or changes an existing user, the security administrator makes the following decisions on the user's security domain:

Whether the user authorization information is maintained by the database system or the operating system.

Set the user's default tablespace and temporary tablespace.

Lists user-selectable tablespaces and available space shares in tablespaces.

Sets the environment file for user resource restrictions, which specifies the total amount of system resources available to users.

Specifies the user's privileges and roles to access the corresponding objects.

Each user has a security domain, which is a set of features and can decide the following:

Available privileges and roles of users;

The user's available table space shares;

User system resource restrictions.

(1) user identification:

To prevent unauthorized database users from using them, ORACLE provides two methods for confirmation.

Confirm the operating system and the corresponding ORACLE database.

If the operating system permits, ORACLE can use the information maintained by the operating system to authenticate users. The advantages of operating system user identification are:

You can connect to ORACLE more easily without specifying the user name and password.

User authorization is controlled in the operating system. ORACLE does not need to store or manage user passwords. However, the user name must be maintained in the database.

Username and operating system in the database

  • 1
  • 2
  • Next Page

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.