Table of Contents
- List of Examples
- List of Figures
- List of Tables
- Title and Copyright Information
- Preface
- Changes in This Release for Oracle Database Enterprise User Security Administrator's Guide
-
1
Introducing Enterprise User Security
-
Introduction to Enterprise User Security
- The Challenges of User Management
- Enterprise User Security: The Big Picture
- About Enterprise User Security Directory Entries
- About Using Shared Schemas for Enterprise User Security
- Enterprise User Proxy
- About Using Current User Database Links for Enterprise User Security
-
Enterprise User Security Deployment Considerations
- Security Aspects of Centralizing Security Credentials
- Security of Password-Authenticated Enterprise User Database Login Information
- Considerations for Defining Database Membership in Enterprise Domains
- Choosing Authentication Types between Clients, Databases, and Directories for Enterprise User Security
-
Introduction to Enterprise User Security
-
2
Getting Started with Enterprise User Security
- Configuring Your Database to Use the Directory
- Registering Your Database with the Directory
- Creating a Shared Schema in the Database
- Mapping Enterprise Users to the Shared Schema
- Connecting to the Database as an Enterprise User
- Using Enterprise Roles
- Using Proxy Permissions
- Using Pluggable Databases
- 3 Configuration and Administration Tools Overview
-
4
Enterprise User Security Configuration Tasks and Troubleshooting
- Enterprise User Security Configuration Overview
- Enterprise User Security Configuration Roadmap
- Preparing the Directory for Enterprise User Security (Phase One)
- Configuring Enterprise User Security Objects in the Database and the Directory (Phase Two)
- Configure Enterprise User Security for the Authentication Method You Require (Phase Three)
- Enabling Current User Database Links
- Troubleshooting Enterprise User Security
-
5
Administering Enterprise User Security
- Administering Identity Management Realms
- Administering Enterprise Users
- Configuring User-Defined Enterprise Groups
- Configuring Databases for Enterprise User Security
- Administering Enterprise Domains
-
6
Using Oracle Wallet Manager
-
About Oracle Wallet Manager
- What Is Oracle Wallet Manager?
- Wallet Password Management
- Strong Wallet Encryption
- Microsoft Windows Registry Wallet Storage
- ACL Settings Needed for Wallet Files Created Using Wallet Manager
- Backward Compatibility
- Public-Key Cryptography Standards (PKCS) Support
- Multiple Certificate Support
- LDAP Directory Support
- Starting Oracle Wallet Manager
- General Process for Creating an Oracle Wallet
-
Managing Oracle Wallets
- Required Guidelines for Creating Oracle Wallet Passwords
- Creating a New Oracle Wallet
- Opening an Existing Oracle Wallet
- Closing an Oracle Wallet
- Exporting an Oracle Wallet to a Third-Party Environment
- Exporting an Oracle Wallet to a Tools That Does Not Support PKCS #12
- Uploading an Oracle Wallet to an LDAP Directory
- Downloading an Oracle Wallet from an LDAP Directory
- Saving Changes to an Oracle Wallet
- Saving the Open Wallet to a New Location
- Saving an Oracle Wallet to the System Default Directory Location
- Deleting an Oracle Wallet
- Changing the Oracle Wallet Password
- Using Auto Login for Oracle Wallets to Enable Access Without Human Intervention
-
Managing Certificates for Oracle Wallets
- About Managing Certificates for Oracle Wallets
-
Managing User Certificates for Oracle Wallets
- About Managing User Certificates
- Adding a Certificate Request
- Importing the User Certificate into an Oracle Wallet
- Importing Certificates and Wallets Created by Third Parties
- Removing a User Certificate from an Oracle Wallet
- Removing a Certificate Request
- Exporting a User Certificate
- Exporting a User Certificate Request
- Managing Trusted Certificates for Oracle Wallets
-
About Oracle Wallet Manager
-
7
Enterprise User Security Manager (EUSM) Command Reference
- About Using a Secure External Password Store
- About SSL Port Connectivity through EUSM to OID
-
Enterprise User Security Manager (EUSM) Command Summary
- createDomain
- deleteDomain
- listDomains
- listDomainInfo
- addDomainAdmin
- removeDomainAdmin
- listDomainAdmins
- addDatabase
- removeDatabase
- addDBAdmin
- listDBAdmins
- listDBInfo
- removeDBAdmin
- createMapping
- deleteMapping
- listMappings
- setCulinkStatus
- setAuthTypes
- createRole
- deleteRole
- addGlobalRole
- removeGlobalRole
- grantRole
- revokeRole
- listEnterpriseRoles
- listEnterpriseRolesOfUser
- listEnterpriseRoleInfo
- listGlobalRolesInDB
- listSharedSchemasInDB
- createProxyPerm
- deleteProxyPerm
- addTargetUser
- removeTargetUser
- grantProxyPerm
- revokeProxyPerm
- listProxyPermissions
- listProxyPermissionsOfUser
- listProxyPermissionInfo
- listTargetUsersInDB
- setDBOIDAuth
- listDBOIDAuth
- addToPwdAccessibleDomains
- removeFromPwdAccessibleDomains
- listPwdAccessibleDomains
- listRealmCommonAttr
- createAppCtxNamespace
- deleteAppCtxNamespace
- listAppCtxNamespaces
- createAppCtxAttribute
- deleteAppCtxAttribute
- listAppCtxAttributes
- createAppCtxAttributeValue
- deleteAppCtxAttributeValue
- listAppCtxAttributeValues
- createAppCtxUsers
- deleteAppCtxUsers
- listAppCtxUsers
-
A
Using the User Migration Utility
- Benefits of Migrating Local or External Users to Enterprise Users
- Introduction to the User Migration Utility
- Prerequisites for Performing Migration
- User Migration Utility Command-Line Syntax
- Accessing Help for the User Migration Utility
-
User Migration Utility Parameters
- Keyword: HELP
- Keyword: PHASE
- Keyword: DBLOCATION
- Keyword: DIRLOCATION
- Keyword: DBADMIN
- Keyword: ENTADMIN
- Keyword: USERS
- Keyword: USERSLIST
- Keyword: USERSFILE
- Keyword: KREALM
- Keyword: MAPSCHEMA
- Keyword: MAPTYPE
- Keyword: CASCADE
- Keyword: CONTEXT
- Keyword: LOGFILE
- Keyword: PARFILE
- Keyword: DBALIAS
- Keyword: ENTALIAS
- Keyword: WALLETLOCATION
- User Migration Utility Usage Examples
- Troubleshooting Using the User Migration Utility
- B SSL External Users Conversion Script
-
C
Integrating Enterprise User Security with Microsoft Active Directory
- About Direct Integration with Microsoft Active Directory
- Set Up Synchronization Between Active Directory and Oracle Internet Directory
- Set Up Active Directory to Interoperate with Oracle Client
- Set Up Oracle Database to Interoperate with Microsoft Active Directory
- Set Up Oracle Database Client to Interoperate with Microsoft Active Directory
- Obtain an Initial Ticket for the Client
- Configure Enterprise User Security for Kerberos Authentication
- D Upgrading from Oracle9i to Oracle Database Release 18c Version 18.1
- Glossary
- Index