SlideShare a Scribd company logo
1 of 8
Download to read offline
Oracle Advanced Security New Features 
Oracle8i Release 8.1.6 
Features Overview 
November 1999 
INTRODUCTION 
Oracle Advanced Security is part of Oracle8i Release 8.1.6, the first maintenance release of the 
Oracle8i database, which includes feature enhancements, bug fixes, and performance 
improvements. The release also includes several new, critical security features that are noteworthy. 
The Oracle8i Release 8.1.6 version of Oracle Advanced Security provides enhancements in the 
areas of encryption, authentication and authorization, as well as single sign-on and enterprise user 
management. 
ORACLE ADVANCED SECURITY ENHANCEMENTS 
Oracle Advanced Security provides new forms of network encryption, to ensure the security of all 
protocols accessing the Oracle8i database, as well as enhanced integration with directory services 
for authorization and enhanced single sign-on. Oracle Advanced Security also has enhanced 
configuration and management tools to simplify security management. 
NETWORK SECURITY ENHANCEMENTS 
The Oracle8i Release 8.1.6 version of Oracle Advanced Security enhances Oracle’s support for the 
Secure Sockets Layer (SSL) standard and now secures connections to the RDBMS via additional 
protocols. SSL encryption for Internet Intra-ORB Protocol (IIOP) communications is now 
available, enabling secure Enterprise JavaBean (EJB) connections to the RDBMS. In addition, a
Java implementation of the Oracle Advanced Security encryption libraries is now available to 
secure Thin Java Database Connectivity (JDBC) client connections to the Oracle RDBMS. 
Oracle Advanced Security Thin JDBC support provides DES and RC4 encryption, with 
anonymous Diffie-Hellman key exchange, and MD5 integrity checking, in 100% Java, as the Thin 
JDBC driver is designed for use with downloadable applets used over the Internet. Secure Thin 
JDBC support allows developers to build applets that transmit data over a secure communication 
channel, secures connections from middle tier servers with Java Server Pages (JSP) to the Oracle 
RDBMS, and secures connections from Oracle8i databases to older versions of Oracle Advanced 
Security-enabled databases. 
Oracle Advanced Security thus secures all protocols into the Oracle8i database, whether IIOP, 
Thick JDBC, Thin JDBC, or Net8. 
Encryption Changes 
Oracle Advanced Security has also completed the operational testing phase of Federal Information 
Processing Standard (FIPS) 140-1 Level 2 certification, a United States government standard that 
validates the security of cryptographic products. Completion of the FIPS-140 certification, which 
is expected in Q4 1999, is required by numerous security-aware organizations, among them the 
United States federal government and many financial markets. 
Due to export controls placed on encryption technology, Oracle Advanced Security is available in a 
domestic version and an export version. Recent modifications to U.S. government export laws 
allow Oracle Corporation to ship both 40-bit and 56-bit encryption algorithms in the Export 
Edition of Oracle Advanced Security, supplying stronger encryption to organizations around the 
world. Additionally, international banks, subsidiaries of U.S. corporations, and e-commerce 
vendors can obtain a special license to obtain the domestic version with 128-bit and Triple-DES 
encryption.
SINGLE SIGN-ON 
Single sign-on enhances ease of use and simplifies user administration. Oracle Advanced Security 
already supports many forms of single sign-on for database users, among them Kerberos, 
CyberSafe, SESAME, and the Distributed Computing Environment (DCE). Oracle8i Release 8.1.6 
adds support for SSL-based single sign-on. 
PKI Credential Management 
Oracle Wallet Manager provides secure management of PKI-based (Public Key Infrastructure) 
user credentials. Oracle Wallet Manager creates a private and public key pair for a user, and issues 
a PKCS#10 certificate signing request which can be fulfilled by a Certificate Authority (CA). 
After the CA issues an X.509 certificate, the user can load the certificate into his wallet. Oracle 
Wallet Manager also manages trusted certificates, the root certificates that the user trusts, and is 
pre-configured with root certificates from PKI vendors such as VeriSign and GTE. Wallets are 
protected using password-based, strong encryption. 
In most cases, a user never needs to access a wallet once it has been configured, but can easily 
access his wallet using Oracle Enterprise Login Assistant, an easy-to-use login tool that hides the 
complexity of a private key and certificate from users. Users can then connect to multiple 
databases over SSL, without providing additional passwords. This provides the benefit of strong, 
certificate-based authentication as well as single sign-on. 
SSL for single sign-on now can be used alone, in the absence of a directory server for X.509v3 
certificate-based authentication, or in conjunction with enterprise user management, which is 
described below. 
ENTERPRISE USER MANAGEMENT 
Enterprises today face tremendous challenges in managing information about users, keeping user 
information current, and securing access to all the information in an enterprise. Each user may 
have multiple accounts on different databases, requiring her to remember passwords for each of
these accounts. Not only do users have too many passwords, but there are also too many accounts 
for administrators to manage. Furthermore, the lack of centralization is a security risk, as old or 
unused accounts and privileges can be misused. 
To address these challenges, Oracle8i Release 8.1.6 introduces enterprise user management. Using 
Oracle Enterprise Security Manager, a tool accessible through Oracle Enterprise Manager, 
enterprise users and their authorizations are managed in Oracle Internet Directory, an LDAP-based 
(Lightweight Directory Access Protocol) directory service. 
Enterprise users can be assigned enterprise roles (which are containers of database-specific global 
roles), that determine their access privileges in databases. For example, the enterprise role CLERK 
could contain the global role HRCLERK on the Human Resources database, and the global role 
ANALYST on the Payroll database. An enterprise role can be granted or revoked to one or more 
enterprise users. For example, an administrator could grant the enterprise role CLERK to a number 
of enterprise users who hold the same job. This information about users and roles is protected in 
the directory through Access Control Lists (ACLs), ensuring that only a privileged administrator 
can manage users, and grant and revoke roles. 
USER/SCHEMA SEPARATION 
In general, users do not need their own accounts - or their own schemas - in a database, they 
merely need to access an application schema. For example, users Joe, Pam and Steve are all users 
of the Payroll application, and they need access to the Payroll schema on the Finance database. 
None of them needs to create his or her own objects in the database; in fact, they need only access 
Payroll objects. 
Oracle8i Release 8.1.6 allows the separation of users from schemas, so that many enterprise users 
can access a single, shared application schema. Instead of creating a user account (that is, a user 
schema) in each database a user needs to access, administrators only need to create an enterprise 
user in the directory, and “point” the user at a shared schema which many other enterprise users 
can also access. For example, if Joe, Pam and Steve all access the Sales database, you need only
create a single schema, e.g. ‘sales_application,’ which all three users can access, rather than create 
an account for each user on the Sales database. 
Now you can truly create an enterprise user once, in the directory, who nonetheless can access 
multiple databases using only the privileges she needs to perform her job, thus lowering the cost of 
managing users in an enterprise. 
Directory Integration 
An Oracle Advanced Security license provides the use of Oracle Internet Directory, Oracle’s 
LDAP version 3-compliant directory server, to store and manage users and their authorizations. 
Oracle Advanced Security thus supports “off-the-shelf” enterprise user management with Oracle 
Internet Directory, which is fully integrated with Oracle8i. Additionally, Oracle plans to certify 
integration with other LDAP directories, including Novell Directory Service (NDS) and 
Microsoft’s Active Directory for Windows 2000, to operate with Oracle8i. 
ENTRUST INTEGRATION 
Entrust Technologies, Inc. is a market-leading provider of Public Key Infrastructure solutions, 
through their Entrust/PKI software. Entrust/PKI includes many products, such as Entrust Profile, 
which secures users’ PKI credentials, and Entrust Authority, Entrust’s certificate authority 
product. 
Oracle is making specific product modifications to Oracle Advanced Security to enable customers 
of both Oracle and Entrust to incorporate Entrust-based single sign-on into their Oracle 
applications. By integrating with Entrust/PKI, Oracle enhances its ability to provide X.509-based 
single sign-on to large customers who require the extensive key management, certificate revocation, 
and other features which Entrust provides. 
Oracle will implement support for Entrust/PKI in Oracle8i Release 8.1.6 version of Oracle 
Advanced Security, enabling customers to use Entrust Profile, Entrust’s “wallet” mechanism, for 
storage of certificate and private keys, and for secure credential management. Instead of accessing
user credentials (private key and certificate) from an Oracle wallet, Oracle Advanced Security 
accesses a user’s Entrust Profile for authentication and single sign-on. 
Entrust integration will require both Oracle8i Release 8.1.6 with Oracle Advanced Security and 
Entrust Authority 5. Production use of this feature will be available shortly after general 
availability of Oracle Advanced Security in Oracle8i Release 8.1.6.
ORACLE ADVANCED SECURITY NEW FEATURES 
ORACLE8I RELEASE 8.1.6 
Network Security 
·  Single sign-on over SSL 
·  SSL for IIOP 
·  Thin JDBC security 
·  Stronger encryption available internationally 
·  FIPS-140 Level 2 certification (in-process) 
User Management 
·  Enterprise user management with LDAP directories 
·  Schema-independent users 
·  Oracle Enterprise Security Manager 
Single Sign-On 
·  Single sign-on over SSL 
·  Oracle Enterprise Login Assistant 
·  Oracle Wallet Manager 
·  Entrust/PKI integration
Oracle Corporation 
World Headquarters 
500 Oracle Parkway 
Redwood Shores, CA 94065 
U.S.A. 
Worldwide Inquiries: 
+1.650.506.7000 
Fax +1.650.506.7200 
http://www.oracle.com/ 
Copyright © Oracle Corporation 1999 
All Rights Reserved 
This document is provided for informational purposes only, and 
the information herein is subject to change without notice. 
Please report any errors herein to Oracle Corporation. Oracle 
Corporation does not provide any warranties covering and 
specifically disclaims any liability in connection with this 
document. 
Oracle is a registered trademark, and Oracle8i, Oracle8i 
Enterprise Edition, Oracle8i Personal Edition, Oracle8i Lite, Net8, 
and PL/SQL are trademarks of Oracle Corporation. 
All other company and product names mentioned are used for 
identification purposes only and may be trademarks of their 
respective owners.

More Related Content

What's hot

Ces70 salesforce2 connectorguide
Ces70 salesforce2 connectorguideCes70 salesforce2 connectorguide
Ces70 salesforce2 connectorguideKalpesh More
 
SharePoint in the Extranet Joel Oleson
SharePoint in the Extranet Joel OlesonSharePoint in the Extranet Joel Oleson
SharePoint in the Extranet Joel Olesonwebhostingguy
 
Con9437 ad ffor_ebs and mobile
Con9437 ad ffor_ebs and mobileCon9437 ad ffor_ebs and mobile
Con9437 ad ffor_ebs and mobileBerry Clemens
 
OOW 2009 Using FMW EBS R12
OOW 2009 Using FMW EBS R12OOW 2009 Using FMW EBS R12
OOW 2009 Using FMW EBS R12jucaab
 
Ugf9796 weblogic for ebs and obiee
Ugf9796 weblogic for ebs and obieeUgf9796 weblogic for ebs and obiee
Ugf9796 weblogic for ebs and obieeBerry Clemens
 
Material modulo02 asf6501(6425-b_01)
Material   modulo02 asf6501(6425-b_01)Material   modulo02 asf6501(6425-b_01)
Material modulo02 asf6501(6425-b_01)JSantanderQ
 
Oracle9i application server release 2
Oracle9i application server release 2 Oracle9i application server release 2
Oracle9i application server release 2 FITSFSd
 
Novell® iChain® 2.3
Novell® iChain® 2.3Novell® iChain® 2.3
Novell® iChain® 2.3webhostingguy
 
Material modulo01 asf6501(6419-a_01)
Material   modulo01 asf6501(6419-a_01)Material   modulo01 asf6501(6419-a_01)
Material modulo01 asf6501(6419-a_01)JSantanderQ
 
Sustainable Compliance For PCI DSS Standard
Sustainable Compliance For PCI DSS StandardSustainable Compliance For PCI DSS Standard
Sustainable Compliance For PCI DSS StandardChristian Frahm
 
Con8289 r12 maintenance tips heisler heisler-con8289
Con8289 r12 maintenance tips heisler heisler-con8289Con8289 r12 maintenance tips heisler heisler-con8289
Con8289 r12 maintenance tips heisler heisler-con8289Berry Clemens
 
Material modulo04 asf6501(6425-a_01)
Material   modulo04 asf6501(6425-a_01)Material   modulo04 asf6501(6425-a_01)
Material modulo04 asf6501(6425-a_01)JSantanderQ
 
Material modulo03 asf6501(6425-b_02)
Material   modulo03 asf6501(6425-b_02)Material   modulo03 asf6501(6425-b_02)
Material modulo03 asf6501(6425-b_02)JSantanderQ
 
IOD 2012 IDZ-2418A Nationwide's Experince Deploying Trusted Context and Roles
IOD 2012 IDZ-2418A Nationwide's Experince Deploying Trusted Context and RolesIOD 2012 IDZ-2418A Nationwide's Experince Deploying Trusted Context and Roles
IOD 2012 IDZ-2418A Nationwide's Experince Deploying Trusted Context and RolesRobert Tilkes
 
Oracle 11i OID AD Integration
Oracle 11i OID AD IntegrationOracle 11i OID AD Integration
Oracle 11i OID AD IntegrationMahesh Vallampati
 
EBS-endeca-technical-considerations
EBS-endeca-technical-considerationsEBS-endeca-technical-considerations
EBS-endeca-technical-considerationsBerry Clemens
 
SANS Institute Product Review: Oracle Entitlements Server
SANS Institute Product Review: Oracle Entitlements ServerSANS Institute Product Review: Oracle Entitlements Server
SANS Institute Product Review: Oracle Entitlements ServerOracleIDM
 
SQL Saturday 411 - Migrating SharePoint Databases and Farm Configuration Usin...
SQL Saturday 411 - Migrating SharePoint Databases and Farm Configuration Usin...SQL Saturday 411 - Migrating SharePoint Databases and Farm Configuration Usin...
SQL Saturday 411 - Migrating SharePoint Databases and Farm Configuration Usin...Obilogic
 

What's hot (20)

Idm Workshop
Idm WorkshopIdm Workshop
Idm Workshop
 
Ces70 salesforce2 connectorguide
Ces70 salesforce2 connectorguideCes70 salesforce2 connectorguide
Ces70 salesforce2 connectorguide
 
SharePoint in the Extranet Joel Oleson
SharePoint in the Extranet Joel OlesonSharePoint in the Extranet Joel Oleson
SharePoint in the Extranet Joel Oleson
 
Con9437 ad ffor_ebs and mobile
Con9437 ad ffor_ebs and mobileCon9437 ad ffor_ebs and mobile
Con9437 ad ffor_ebs and mobile
 
OOW 2009 Using FMW EBS R12
OOW 2009 Using FMW EBS R12OOW 2009 Using FMW EBS R12
OOW 2009 Using FMW EBS R12
 
Ugf9796 weblogic for ebs and obiee
Ugf9796 weblogic for ebs and obieeUgf9796 weblogic for ebs and obiee
Ugf9796 weblogic for ebs and obiee
 
Material modulo02 asf6501(6425-b_01)
Material   modulo02 asf6501(6425-b_01)Material   modulo02 asf6501(6425-b_01)
Material modulo02 asf6501(6425-b_01)
 
Oracle9i application server release 2
Oracle9i application server release 2 Oracle9i application server release 2
Oracle9i application server release 2
 
Novell® iChain® 2.3
Novell® iChain® 2.3Novell® iChain® 2.3
Novell® iChain® 2.3
 
Oracle Identity Manager Basics
Oracle Identity Manager BasicsOracle Identity Manager Basics
Oracle Identity Manager Basics
 
Material modulo01 asf6501(6419-a_01)
Material   modulo01 asf6501(6419-a_01)Material   modulo01 asf6501(6419-a_01)
Material modulo01 asf6501(6419-a_01)
 
Sustainable Compliance For PCI DSS Standard
Sustainable Compliance For PCI DSS StandardSustainable Compliance For PCI DSS Standard
Sustainable Compliance For PCI DSS Standard
 
Con8289 r12 maintenance tips heisler heisler-con8289
Con8289 r12 maintenance tips heisler heisler-con8289Con8289 r12 maintenance tips heisler heisler-con8289
Con8289 r12 maintenance tips heisler heisler-con8289
 
Material modulo04 asf6501(6425-a_01)
Material   modulo04 asf6501(6425-a_01)Material   modulo04 asf6501(6425-a_01)
Material modulo04 asf6501(6425-a_01)
 
Material modulo03 asf6501(6425-b_02)
Material   modulo03 asf6501(6425-b_02)Material   modulo03 asf6501(6425-b_02)
Material modulo03 asf6501(6425-b_02)
 
IOD 2012 IDZ-2418A Nationwide's Experince Deploying Trusted Context and Roles
IOD 2012 IDZ-2418A Nationwide's Experince Deploying Trusted Context and RolesIOD 2012 IDZ-2418A Nationwide's Experince Deploying Trusted Context and Roles
IOD 2012 IDZ-2418A Nationwide's Experince Deploying Trusted Context and Roles
 
Oracle 11i OID AD Integration
Oracle 11i OID AD IntegrationOracle 11i OID AD Integration
Oracle 11i OID AD Integration
 
EBS-endeca-technical-considerations
EBS-endeca-technical-considerationsEBS-endeca-technical-considerations
EBS-endeca-technical-considerations
 
SANS Institute Product Review: Oracle Entitlements Server
SANS Institute Product Review: Oracle Entitlements ServerSANS Institute Product Review: Oracle Entitlements Server
SANS Institute Product Review: Oracle Entitlements Server
 
SQL Saturday 411 - Migrating SharePoint Databases and Farm Configuration Usin...
SQL Saturday 411 - Migrating SharePoint Databases and Farm Configuration Usin...SQL Saturday 411 - Migrating SharePoint Databases and Farm Configuration Usin...
SQL Saturday 411 - Migrating SharePoint Databases and Farm Configuration Usin...
 

Viewers also liked

Iaetsd a novel approach to provide the security for distributed adaptive netw...
Iaetsd a novel approach to provide the security for distributed adaptive netw...Iaetsd a novel approach to provide the security for distributed adaptive netw...
Iaetsd a novel approach to provide the security for distributed adaptive netw...Iaetsd Iaetsd
 
Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cl...
Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cl...Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cl...
Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cl...Editor IJLRES
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Editor IJCATR
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Performance and cost evaluation of an ...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Performance and cost evaluation of an ...2014 IEEE JAVA CLOUD COMPUTING PROJECT Performance and cost evaluation of an ...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Performance and cost evaluation of an ...IEEEFINALSEMSTUDENTPROJECTS
 
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...Nexgen Technology
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Shakas Technologies
 
ieee projects 2014-15 for cse with abstract and base paper
ieee projects 2014-15 for cse with abstract and base paper ieee projects 2014-15 for cse with abstract and base paper
ieee projects 2014-15 for cse with abstract and base paper vsanthosh05
 

Viewers also liked (7)

Iaetsd a novel approach to provide the security for distributed adaptive netw...
Iaetsd a novel approach to provide the security for distributed adaptive netw...Iaetsd a novel approach to provide the security for distributed adaptive netw...
Iaetsd a novel approach to provide the security for distributed adaptive netw...
 
Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cl...
Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cl...Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cl...
Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cl...
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Performance and cost evaluation of an ...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Performance and cost evaluation of an ...2014 IEEE JAVA CLOUD COMPUTING PROJECT Performance and cost evaluation of an ...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Performance and cost evaluation of an ...
 
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
 
ieee projects 2014-15 for cse with abstract and base paper
ieee projects 2014-15 for cse with abstract and base paper ieee projects 2014-15 for cse with abstract and base paper
ieee projects 2014-15 for cse with abstract and base paper
 

Similar to As onew816a

All about Oracle Security Developer Tools
All about Oracle Security Developer ToolsAll about Oracle Security Developer Tools
All about Oracle Security Developer Toolssophina_dillard
 
8 isecurity database
8 isecurity database8 isecurity database
8 isecurity databaseAnil Pandey
 
Oracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered SystemsOracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered SystemsGregOracle
 
Appliance whitepaper 8_i
Appliance whitepaper 8_iAppliance whitepaper 8_i
Appliance whitepaper 8_iAnil Pandey
 
Presentation on Oracle Application Server
Presentation on  Oracle Application Server Presentation on  Oracle Application Server
Presentation on Oracle Application Server Muthoot finance Ltd
 
Oracle Database 11g Product Family
Oracle Database 11g Product FamilyOracle Database 11g Product Family
Oracle Database 11g Product FamilyN/A
 
Oracle oracle database 11g product family
Oracle oracle database 11g product familyOracle oracle database 11g product family
Oracle oracle database 11g product familySid Xing
 
Keychain Services Programming Guide
Keychain Services Programming GuideKeychain Services Programming Guide
Keychain Services Programming GuideDEVTYPE
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Serviceguest536dd0e
 
What_to_expect_from_oracle_database_12c
What_to_expect_from_oracle_database_12cWhat_to_expect_from_oracle_database_12c
What_to_expect_from_oracle_database_12cMaria Colgan
 
OpenStack Identity - Keystone (kilo) by Lorenzo Carnevale and Silvio Tavilla
OpenStack Identity - Keystone (kilo) by Lorenzo Carnevale and Silvio TavillaOpenStack Identity - Keystone (kilo) by Lorenzo Carnevale and Silvio Tavilla
OpenStack Identity - Keystone (kilo) by Lorenzo Carnevale and Silvio TavillaLorenzo Carnevale
 
Odi 11g-new-features-overview-1622677
Odi 11g-new-features-overview-1622677Odi 11g-new-features-overview-1622677
Odi 11g-new-features-overview-1622677Sandeep Jella
 
Security in oracle
Security in oracleSecurity in oracle
Security in oraclessuser40bb47
 
security in oracle database
security in oracle databasesecurity in oracle database
security in oracle databasessuser40bb47
 
What Is Oracle Fusion Middleware .pdf
What Is Oracle Fusion Middleware .pdfWhat Is Oracle Fusion Middleware .pdf
What Is Oracle Fusion Middleware .pdfPridesys IT Ltd.
 
Oracle Integration Cloud – Pragmatic approach to integrations
Oracle Integration Cloud – Pragmatic approach to integrationsOracle Integration Cloud – Pragmatic approach to integrations
Oracle Integration Cloud – Pragmatic approach to integrationsJade Global
 
A introduction to oracle data integrator
A introduction to oracle data integratorA introduction to oracle data integrator
A introduction to oracle data integratorchkamal
 

Similar to As onew816a (20)

All about Oracle Security Developer Tools
All about Oracle Security Developer ToolsAll about Oracle Security Developer Tools
All about Oracle Security Developer Tools
 
8 isecurity database
8 isecurity database8 isecurity database
8 isecurity database
 
Oracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered SystemsOracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered Systems
 
Appliance whitepaper 8_i
Appliance whitepaper 8_iAppliance whitepaper 8_i
Appliance whitepaper 8_i
 
Sql intro
Sql introSql intro
Sql intro
 
Presentation on Oracle Application Server
Presentation on  Oracle Application Server Presentation on  Oracle Application Server
Presentation on Oracle Application Server
 
oracle
oracleoracle
oracle
 
Oracle Database 11g Product Family
Oracle Database 11g Product FamilyOracle Database 11g Product Family
Oracle Database 11g Product Family
 
Oracle oracle database 11g product family
Oracle oracle database 11g product familyOracle oracle database 11g product family
Oracle oracle database 11g product family
 
Keychain Services Programming Guide
Keychain Services Programming GuideKeychain Services Programming Guide
Keychain Services Programming Guide
 
OOW19 - HOL5221
OOW19 - HOL5221OOW19 - HOL5221
OOW19 - HOL5221
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
What_to_expect_from_oracle_database_12c
What_to_expect_from_oracle_database_12cWhat_to_expect_from_oracle_database_12c
What_to_expect_from_oracle_database_12c
 
OpenStack Identity - Keystone (kilo) by Lorenzo Carnevale and Silvio Tavilla
OpenStack Identity - Keystone (kilo) by Lorenzo Carnevale and Silvio TavillaOpenStack Identity - Keystone (kilo) by Lorenzo Carnevale and Silvio Tavilla
OpenStack Identity - Keystone (kilo) by Lorenzo Carnevale and Silvio Tavilla
 
Odi 11g-new-features-overview-1622677
Odi 11g-new-features-overview-1622677Odi 11g-new-features-overview-1622677
Odi 11g-new-features-overview-1622677
 
Security in oracle
Security in oracleSecurity in oracle
Security in oracle
 
security in oracle database
security in oracle databasesecurity in oracle database
security in oracle database
 
What Is Oracle Fusion Middleware .pdf
What Is Oracle Fusion Middleware .pdfWhat Is Oracle Fusion Middleware .pdf
What Is Oracle Fusion Middleware .pdf
 
Oracle Integration Cloud – Pragmatic approach to integrations
Oracle Integration Cloud – Pragmatic approach to integrationsOracle Integration Cloud – Pragmatic approach to integrations
Oracle Integration Cloud – Pragmatic approach to integrations
 
A introduction to oracle data integrator
A introduction to oracle data integratorA introduction to oracle data integrator
A introduction to oracle data integrator
 

More from Anil Pandey

National health policy_2017
National health policy_2017National health policy_2017
National health policy_2017Anil Pandey
 
Class 3-computer-pt3-rev-ws-56
Class 3-computer-pt3-rev-ws-56Class 3-computer-pt3-rev-ws-56
Class 3-computer-pt3-rev-ws-56Anil Pandey
 
Class 3-social-pt3-rev-ws-for-uploading
Class 3-social-pt3-rev-ws-for-uploadingClass 3-social-pt3-rev-ws-for-uploading
Class 3-social-pt3-rev-ws-for-uploadingAnil Pandey
 
Class 3-science-pt3-rev-ws-for-uploading
Class 3-science-pt3-rev-ws-for-uploadingClass 3-science-pt3-rev-ws-for-uploading
Class 3-science-pt3-rev-ws-for-uploadingAnil Pandey
 
Class 3-math-pt3-rev-ws-for-uploading
Class 3-math-pt3-rev-ws-for-uploadingClass 3-math-pt3-rev-ws-for-uploading
Class 3-math-pt3-rev-ws-for-uploadingAnil Pandey
 
Class 3-hindi-pt3-rev-ws-for-uploading
Class 3-hindi-pt3-rev-ws-for-uploadingClass 3-hindi-pt3-rev-ws-for-uploading
Class 3-hindi-pt3-rev-ws-for-uploadingAnil Pandey
 
Class 3-english-pt3-rev-ws-for-uploading
Class 3-english-pt3-rev-ws-for-uploadingClass 3-english-pt3-rev-ws-for-uploading
Class 3-english-pt3-rev-ws-for-uploadingAnil Pandey
 
Art of indexing_in_o8i
Art of indexing_in_o8iArt of indexing_in_o8i
Art of indexing_in_o8iAnil Pandey
 
Apps session wait_tables
Apps session wait_tablesApps session wait_tables
Apps session wait_tablesAnil Pandey
 
Application sql issues_and_tuning
Application sql issues_and_tuningApplication sql issues_and_tuning
Application sql issues_and_tuningAnil Pandey
 

More from Anil Pandey (20)

26 bg2020
26 bg202026 bg2020
26 bg2020
 
National health policy_2017
National health policy_2017National health policy_2017
National health policy_2017
 
Class 3-computer-pt3-rev-ws-56
Class 3-computer-pt3-rev-ws-56Class 3-computer-pt3-rev-ws-56
Class 3-computer-pt3-rev-ws-56
 
Class 3-social-pt3-rev-ws-for-uploading
Class 3-social-pt3-rev-ws-for-uploadingClass 3-social-pt3-rev-ws-for-uploading
Class 3-social-pt3-rev-ws-for-uploading
 
Class 3-science-pt3-rev-ws-for-uploading
Class 3-science-pt3-rev-ws-for-uploadingClass 3-science-pt3-rev-ws-for-uploading
Class 3-science-pt3-rev-ws-for-uploading
 
Class 3-math-pt3-rev-ws-for-uploading
Class 3-math-pt3-rev-ws-for-uploadingClass 3-math-pt3-rev-ws-for-uploading
Class 3-math-pt3-rev-ws-for-uploading
 
Class 3-hindi-pt3-rev-ws-for-uploading
Class 3-hindi-pt3-rev-ws-for-uploadingClass 3-hindi-pt3-rev-ws-for-uploading
Class 3-hindi-pt3-rev-ws-for-uploading
 
Class 3-english-pt3-rev-ws-for-uploading
Class 3-english-pt3-rev-ws-for-uploadingClass 3-english-pt3-rev-ws-for-uploading
Class 3-english-pt3-rev-ws-for-uploading
 
Art of indexing_in_o8i
Art of indexing_in_o8iArt of indexing_in_o8i
Art of indexing_in_o8i
 
Apps session wait_tables
Apps session wait_tablesApps session wait_tables
Apps session wait_tables
 
Application sql issues_and_tuning
Application sql issues_and_tuningApplication sql issues_and_tuning
Application sql issues_and_tuning
 
Appd2 cg
Appd2 cgAppd2 cg
Appd2 cg
 
A85248
A85248A85248
A85248
 
35 dbatune3
35 dbatune335 dbatune3
35 dbatune3
 
9ias
9ias9ias
9ias
 
9i lin relnotes
9i lin relnotes9i lin relnotes
9i lin relnotes
 
9i hp relnotes
9i hp relnotes9i hp relnotes
9i hp relnotes
 
8i r3 nfs
8i r3 nfs8i r3 nfs
8i r3 nfs
 
8iliteds
8iliteds8iliteds
8iliteds
 
8i standby
8i standby8i standby
8i standby
 

Recently uploaded

Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 

Recently uploaded (20)

Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 

As onew816a

  • 1. Oracle Advanced Security New Features Oracle8i Release 8.1.6 Features Overview November 1999 INTRODUCTION Oracle Advanced Security is part of Oracle8i Release 8.1.6, the first maintenance release of the Oracle8i database, which includes feature enhancements, bug fixes, and performance improvements. The release also includes several new, critical security features that are noteworthy. The Oracle8i Release 8.1.6 version of Oracle Advanced Security provides enhancements in the areas of encryption, authentication and authorization, as well as single sign-on and enterprise user management. ORACLE ADVANCED SECURITY ENHANCEMENTS Oracle Advanced Security provides new forms of network encryption, to ensure the security of all protocols accessing the Oracle8i database, as well as enhanced integration with directory services for authorization and enhanced single sign-on. Oracle Advanced Security also has enhanced configuration and management tools to simplify security management. NETWORK SECURITY ENHANCEMENTS The Oracle8i Release 8.1.6 version of Oracle Advanced Security enhances Oracle’s support for the Secure Sockets Layer (SSL) standard and now secures connections to the RDBMS via additional protocols. SSL encryption for Internet Intra-ORB Protocol (IIOP) communications is now available, enabling secure Enterprise JavaBean (EJB) connections to the RDBMS. In addition, a
  • 2. Java implementation of the Oracle Advanced Security encryption libraries is now available to secure Thin Java Database Connectivity (JDBC) client connections to the Oracle RDBMS. Oracle Advanced Security Thin JDBC support provides DES and RC4 encryption, with anonymous Diffie-Hellman key exchange, and MD5 integrity checking, in 100% Java, as the Thin JDBC driver is designed for use with downloadable applets used over the Internet. Secure Thin JDBC support allows developers to build applets that transmit data over a secure communication channel, secures connections from middle tier servers with Java Server Pages (JSP) to the Oracle RDBMS, and secures connections from Oracle8i databases to older versions of Oracle Advanced Security-enabled databases. Oracle Advanced Security thus secures all protocols into the Oracle8i database, whether IIOP, Thick JDBC, Thin JDBC, or Net8. Encryption Changes Oracle Advanced Security has also completed the operational testing phase of Federal Information Processing Standard (FIPS) 140-1 Level 2 certification, a United States government standard that validates the security of cryptographic products. Completion of the FIPS-140 certification, which is expected in Q4 1999, is required by numerous security-aware organizations, among them the United States federal government and many financial markets. Due to export controls placed on encryption technology, Oracle Advanced Security is available in a domestic version and an export version. Recent modifications to U.S. government export laws allow Oracle Corporation to ship both 40-bit and 56-bit encryption algorithms in the Export Edition of Oracle Advanced Security, supplying stronger encryption to organizations around the world. Additionally, international banks, subsidiaries of U.S. corporations, and e-commerce vendors can obtain a special license to obtain the domestic version with 128-bit and Triple-DES encryption.
  • 3. SINGLE SIGN-ON Single sign-on enhances ease of use and simplifies user administration. Oracle Advanced Security already supports many forms of single sign-on for database users, among them Kerberos, CyberSafe, SESAME, and the Distributed Computing Environment (DCE). Oracle8i Release 8.1.6 adds support for SSL-based single sign-on. PKI Credential Management Oracle Wallet Manager provides secure management of PKI-based (Public Key Infrastructure) user credentials. Oracle Wallet Manager creates a private and public key pair for a user, and issues a PKCS#10 certificate signing request which can be fulfilled by a Certificate Authority (CA). After the CA issues an X.509 certificate, the user can load the certificate into his wallet. Oracle Wallet Manager also manages trusted certificates, the root certificates that the user trusts, and is pre-configured with root certificates from PKI vendors such as VeriSign and GTE. Wallets are protected using password-based, strong encryption. In most cases, a user never needs to access a wallet once it has been configured, but can easily access his wallet using Oracle Enterprise Login Assistant, an easy-to-use login tool that hides the complexity of a private key and certificate from users. Users can then connect to multiple databases over SSL, without providing additional passwords. This provides the benefit of strong, certificate-based authentication as well as single sign-on. SSL for single sign-on now can be used alone, in the absence of a directory server for X.509v3 certificate-based authentication, or in conjunction with enterprise user management, which is described below. ENTERPRISE USER MANAGEMENT Enterprises today face tremendous challenges in managing information about users, keeping user information current, and securing access to all the information in an enterprise. Each user may have multiple accounts on different databases, requiring her to remember passwords for each of
  • 4. these accounts. Not only do users have too many passwords, but there are also too many accounts for administrators to manage. Furthermore, the lack of centralization is a security risk, as old or unused accounts and privileges can be misused. To address these challenges, Oracle8i Release 8.1.6 introduces enterprise user management. Using Oracle Enterprise Security Manager, a tool accessible through Oracle Enterprise Manager, enterprise users and their authorizations are managed in Oracle Internet Directory, an LDAP-based (Lightweight Directory Access Protocol) directory service. Enterprise users can be assigned enterprise roles (which are containers of database-specific global roles), that determine their access privileges in databases. For example, the enterprise role CLERK could contain the global role HRCLERK on the Human Resources database, and the global role ANALYST on the Payroll database. An enterprise role can be granted or revoked to one or more enterprise users. For example, an administrator could grant the enterprise role CLERK to a number of enterprise users who hold the same job. This information about users and roles is protected in the directory through Access Control Lists (ACLs), ensuring that only a privileged administrator can manage users, and grant and revoke roles. USER/SCHEMA SEPARATION In general, users do not need their own accounts - or their own schemas - in a database, they merely need to access an application schema. For example, users Joe, Pam and Steve are all users of the Payroll application, and they need access to the Payroll schema on the Finance database. None of them needs to create his or her own objects in the database; in fact, they need only access Payroll objects. Oracle8i Release 8.1.6 allows the separation of users from schemas, so that many enterprise users can access a single, shared application schema. Instead of creating a user account (that is, a user schema) in each database a user needs to access, administrators only need to create an enterprise user in the directory, and “point” the user at a shared schema which many other enterprise users can also access. For example, if Joe, Pam and Steve all access the Sales database, you need only
  • 5. create a single schema, e.g. ‘sales_application,’ which all three users can access, rather than create an account for each user on the Sales database. Now you can truly create an enterprise user once, in the directory, who nonetheless can access multiple databases using only the privileges she needs to perform her job, thus lowering the cost of managing users in an enterprise. Directory Integration An Oracle Advanced Security license provides the use of Oracle Internet Directory, Oracle’s LDAP version 3-compliant directory server, to store and manage users and their authorizations. Oracle Advanced Security thus supports “off-the-shelf” enterprise user management with Oracle Internet Directory, which is fully integrated with Oracle8i. Additionally, Oracle plans to certify integration with other LDAP directories, including Novell Directory Service (NDS) and Microsoft’s Active Directory for Windows 2000, to operate with Oracle8i. ENTRUST INTEGRATION Entrust Technologies, Inc. is a market-leading provider of Public Key Infrastructure solutions, through their Entrust/PKI software. Entrust/PKI includes many products, such as Entrust Profile, which secures users’ PKI credentials, and Entrust Authority, Entrust’s certificate authority product. Oracle is making specific product modifications to Oracle Advanced Security to enable customers of both Oracle and Entrust to incorporate Entrust-based single sign-on into their Oracle applications. By integrating with Entrust/PKI, Oracle enhances its ability to provide X.509-based single sign-on to large customers who require the extensive key management, certificate revocation, and other features which Entrust provides. Oracle will implement support for Entrust/PKI in Oracle8i Release 8.1.6 version of Oracle Advanced Security, enabling customers to use Entrust Profile, Entrust’s “wallet” mechanism, for storage of certificate and private keys, and for secure credential management. Instead of accessing
  • 6. user credentials (private key and certificate) from an Oracle wallet, Oracle Advanced Security accesses a user’s Entrust Profile for authentication and single sign-on. Entrust integration will require both Oracle8i Release 8.1.6 with Oracle Advanced Security and Entrust Authority 5. Production use of this feature will be available shortly after general availability of Oracle Advanced Security in Oracle8i Release 8.1.6.
  • 7. ORACLE ADVANCED SECURITY NEW FEATURES ORACLE8I RELEASE 8.1.6 Network Security · Single sign-on over SSL · SSL for IIOP · Thin JDBC security · Stronger encryption available internationally · FIPS-140 Level 2 certification (in-process) User Management · Enterprise user management with LDAP directories · Schema-independent users · Oracle Enterprise Security Manager Single Sign-On · Single sign-on over SSL · Oracle Enterprise Login Assistant · Oracle Wallet Manager · Entrust/PKI integration
  • 8. Oracle Corporation World Headquarters 500 Oracle Parkway Redwood Shores, CA 94065 U.S.A. Worldwide Inquiries: +1.650.506.7000 Fax +1.650.506.7200 http://www.oracle.com/ Copyright © Oracle Corporation 1999 All Rights Reserved This document is provided for informational purposes only, and the information herein is subject to change without notice. Please report any errors herein to Oracle Corporation. Oracle Corporation does not provide any warranties covering and specifically disclaims any liability in connection with this document. Oracle is a registered trademark, and Oracle8i, Oracle8i Enterprise Edition, Oracle8i Personal Edition, Oracle8i Lite, Net8, and PL/SQL are trademarks of Oracle Corporation. All other company and product names mentioned are used for identification purposes only and may be trademarks of their respective owners.