Less08 Users PDF
Less08 Users PDF
Facultad de Ingeniería
Escuela de Ingeniería Informática
Base de Datos II
Administering User Security
Objectives
•After completing this lesson, you should be able to:
– Create and manage database user accounts:
• Authenticate users
• Assign default storage areas (tablespaces)
– Grant and revoke privileges
– Create and manage roles
– Create and manage profiles:
• Implement standard password security features
• Control resource usage by users
Database User Accounts
•Each database user account has:
– A unique username
– An authentication method
– A default tablespace
– A temporary tablespace
– A user profile
– An initial consumer group
– An account status
Predefined Accounts: SYS and
SYSTEM
– SYS account:
• Is granted the DBA role
• Has all privileges with ADMIN OPTION
• Is required for startup, shutdown, and some maintenance
commands
• Owns the data dictionary
• Owns the Automatic Workload Repository (AWR)
– SYSTEM account is granted the DBA role.
– These accounts are not used for routine operations.
Creating a User
•Select Server > Users, and then click the Create button.
Authenticating Users
– Password
– External
– Global
Administrator Authentication
•Operating system security:
– DBAs must have the OS privileges to create and
delete files.
– Typical database users should not have the OS
privileges to create or delete database files.
•Administrator security:
– For SYSDBA, SYSOPER, and SYSASM connections:
• DBA user by name is audited for password file and strong
authentication methods
• OS account name is audited for OS authentication
• OS authentication takes precedence over password file
authentication for privileged users
• Password file uses case-sensitive passwords
Unlocking a User Account and
Resetting the Password
HR_DBA
3. Select privileges. 3
Revoking System Privileges
with ADMIN OPTION
DBA Jeff Emi
User
GRANT
Privilege
Object
REVOKE CREATE
TABLE FROM jeff;
Revoking Object Privileges
with GRANT OPTION
Bob Jeff Emi
GRANT
Users
Jenny David Rachel
Insert Select
employees. employees.
Predefined Roles
Role Privileges Included
Click OK
when
finished.
Secure Roles
– Roles can be nondefault.
SET ROLE vacationdba;
– Roles
CREATE ROLEcan also be secured programmatically.
secure_application_role
IDENTIFIED USING <security_procedure_name>;
Assigning Roles to Users
Profiles and Users
Users are assigned
only one profile
at a time.
Profiles:
• Control
resource
consumption
• Manage account
status and
password
expiration
Password
Password complexity
history verification
User Setting up
profiles
Note: Do not use profiles that cause the SYS, SYSMAN, and DBSNMP
passwords to expire and the accounts to be locked.
Creating a Password Profile
Supplied Password Verification
Function: VERIFY_FUNCTION_11G
•The VERIFY_FUNCTION_11G function insures that
the password is:
– At least eight characters
– Different from the username, username with a number,
or username reversed
– Different from the database name or the database
name with a number
– A string with at least one alphabetic and one numeric
character
– Different from the previous password by
at least three letters
•Tip: Use this function as a template to create
your own customized password verification.
Assigning Quotas to Users
•Users who do not have the UNLIMITED
•TABLESPACE system privilege must be given
a quota before they can create objects in a tablespace.
•Quotas can be:
– A specific value in megabytes or kilobytes
– Unlimited
Summary
•In this lesson, you should have learned how to:
– Create and manage database user accounts:
• Authenticate users
• Assign default storage areas (tablespaces)
– Grant and revoke privileges
– Create and manage roles
– Create and manage profiles:
• Implement standard password security features
• Control resource usage by users