Part I Managing User Authentication and Authorization
Part I describes how to manage user authentication and authorization.
- Managing Security for Oracle Database Users
You can manage the security for Oracle Database users in many ways, such as enforcing restrictions on the way that passwords are created. - Configuring Authentication
Authentication means to verify the identity of users or other entities that connect to the database. - Configuring Privilege and Role Authorization
Privilege and role authorization controls the permissions that users have to perform day-to-day tasks. - Performing Privilege Analysis to Find Privilege Use
Privilege analysis dynamically analyzes the privileges and roles that users use and do not use. - Configuring Centrally Managed Users with Microsoft Active Directory
Oracle Database can authenticate and authorize Microsoft Active Directory users with the database directly without intermediate directories or Oracle Enterprise User Security. - Managing Security for Definer's Rights and Invoker's Rights
Invoker’s rights and definer’s rights have several security advantages when used to control access to privileges to run user-created procedures. - Managing Fine-Grained Access in PL/SQL Packages and Types
Oracle Database provides PL/SQL packages and types for fine-grained access to control access to external network services and wallets. - Managing Security for a Multitenant Environment in Enterprise Manager
You can manage common and local users and roles for a multitenant environment by using Oracle Enterprise Manager.