天高云淡 发表于 2018-9-23 10:29:01

Oracle_052_lesson_p8

Administering User Security管理用户安全
  showparametercase;
  you should be able to:
  1、Create and manage database user accounts:
  2、Authenticate users
  3、Assign default storage areas (tablespaces)
  4、Grant and revoke privileges
  5、Create and manage roles
  6、Create and manage profiles:
  7、Implement standard password security features
  8、Control resource usage by users
  Database User Accounts
  Each database user account has:
  A unique username
  An authentication method
  A default tablespace
  A temporary tablespace
  A user profile
  An initial consumer group
  An account status
  A schema:
  Is a collection of database objects that are owned by a database user
  Has the same name as the user account
  Predefined Administrative Accounts
  SYS account:
  Is granted the DBA role, as well as several other roles.
  Has all privileges with ADMIN OPTION
  Is required for startup, shutdown, and some maintenance commands
  Owns the data dictionary and the Automatic Workload Repository (AWR)
  SYSTEM account is granted the DBA, MGMT_USER, andAQ_ADMINISTRATOR_ROLE roles.
  DBSNMP account is granted the OEM_MONITOR role.
  SYSMAN account is granted the MGMT_USER, RESOURCE and SELECT_CATALOG_ROLE roles.
  These accounts are not used for routine operations.
  create , update 操作 withadminoption转授权限,
  revoke时系统权限不会级联回收,但对象权限会级联回收,对象如scott.emp表


  Administrator Authentication
  Operating system security:
  DBAs must have the OS privileges to create and delete files.
  Typical database users should not have the OS privileges to create or delete database files.
  Administrator security:
  For SYSDBA, SYSOPER, and SYSASM connections:
  DBA user by name is audited for password file and strong authentication methods
  OS account name is audited for OS authentication
  OS authentication takes precedence over password file authentication for privileged users
  Password file uses case-sensitive passwords
  There are two types of user privileges:
  System: Enables users to perform particular actions in the database
  Object: Enables users to access and manipulate a specific object
  Benefits of Roles角色的好处:
  Easier privilege management
  Dynamic privilege management
  Selective availability of privileges





  profile
  showparameterresource_limit;
  resource_limit必须为真true,所有profile设定才能生效,默认为false;
  Supplied Password Verification Function: VERIFY_FUNCTION_11G
  The VERIFY_FUNCTION_11G function insures that the password is:
  At least eight characters
  Different from the username, username with a number, or username reversed
  Different from the database name or the database name with a number
  A string with at least one alphabetic and one numeric character
  Different from the previous password byat least three letters
  Tip: Use this function as a template to createyour own customized password verification.

  最小权限化原则

页: [1]
查看完整版本: Oracle_052_lesson_p8