Oracle18c 19c & Centrally Managed Users - DB U
Oracle18c 19c & Centrally Managed Users - DB U
Simon Pane
December 4, 2019
Simon Pane
Pythian Principal Consultant
Our services and software solutions unleash the power of cloud, data and analytics to drive better
business outcomes for our clients.
Our 20 years in data, commitment to hiring the best talent, and our deep technical and business expertise
allow us to meet our promise of using technology to deliver the best outcomes faster.
• Overview of CMU
• One-time Active Directory Config
• One-time RDBMS Home Config
• User and Role Mapping and Testing
• Troubleshooting & Common Issues Reference
4. NEW: Oracle Database 18c authentication and authorisation for multiple 18c+
databases within Microsoft Active Directory
VERY COMPLEX
Database 18c
talks directly
to AD
Now we really have the same options with Oracle Database 18c+
Exclusive User
USER
Shared Schema
USER
Global Role
ROLE
NOTE: Oracle User/Role names don’t need to match AD User/Group names © Pythian Services Inc., 2019 16
Logical Connection Flow
Found AD DN
USER
dsi.ora/ldap.ora
& wallet Send Credential to DB
2. Kerberos Recommended
3. Configure the RDBMS home to integrate with AD via the Service Directory User
2. Extract the “key table” for the “service principal” and copy to the DB server
!?!?!?
© Pythian Services Inc., 2019 21
Explaining “Password” authentication
going forward as it seems to usually
be the most applicable
2. Install the Oracle “Password Filter” into each Domain Controller (DC)
● Will allow AD to capture a password hash compatible with Oracle queries
A Personal Preference:
• Alternatively use “Users”
• This path is referenced in later commands © Pythian Services Inc., 2019 28
The Oracle Service Directory User
To test two-way
authentication using
certificate
• Recommend the above command over the certsrv.msc (GUI) for reliability
• Manually copy the exported public certificate to the database server
Optional
• PowerShell example:
Get-ADUser -Identity "simon" -properties DistinguishedName,orclCommonAttribute
• Existing database users can also be migrated via “ALTER USER ... IDENTIFIED
GLOBALLY AS ...”
• Administrative users and connections are also supported
Reminder:
Not required
with
Kerberos!
• Check firewalls
• At the network level, the DB server level, and Domain Controller level
• ICMP (ping) tests
© Pythian Services Inc., 2019 61
Firewall Rules – Common LDAP Ports Required
• Usually associated with new AD accounts that have never logged into Windows
• Unlock within AD
• On DB Server ensure that LDAP port 636 can be reached for the IP, hostname, and
FQDN (output from all three above):
(echo > /dev/tcp/10.0.0.12/636) >/dev/null 2>&1 && echo "OPEN" || echo "CLOSED"
(echo > /dev/tcp/DC2/636) >/dev/null 2>&1 && echo "OPEN" || echo "CLOSED"
(echo > /dev/tcp/DC2.STAGECOACH.net/636) >/dev/null 2>&1 && echo "OPEN" || echo "CLOSED"
Testing:
1) Private network IP
2) Hostname
3) FQDN © Pythian Services Inc., 2019 71
Authorisation is Still Database Based
• Still need to setup grants, roles, etc within the database via a normal role, global
role or direct grant
• Granting to either the Exclusive User or Shared Schema