SlideShare a Scribd company logo
Dr. Girija Narasimhan
https://www.oercommons.org/authoring/21388-database-security
Unit 1-Authentication
1
Unit Objective
• The main objective of this unit is reader can learn how to create and
alter database user, default tablespace, temporary tablespace and
quota.
2
1.1 User Authentication
• Authentication means verifying the identity of user or entity or any resource.
• Authentication is responsible to identify which user is interest to use any information or data from the database or applications.
• Especially the Oracle Database Administrator obtains special authentication operation such as creating, altering and removing
database user.
• And also assign system tablespace and temporary tablespace.
• Data security classifies into various stages i.e. Authentication, Authorization, Access control and Auditing.
• Initial step is to identify the user. The next step is after identifying the user check their privileges i.e. authorization and access rights
or access control.
• All the above stages are useful for monitoring user action in auditing process.
• There is various authentication ways to identify users are Basic Authentication, Strong Authentication, Enterprise User security and
proxy authentication.
3
4
1.2 Basic authentication- Database user identified by a password
• The syntax of the Create User statement is given below. We will study each part of the syntax in details. We
will study first two lines "Create user <username> identified by <password>"
CREATE USER <username>
IDENTIFIED BY <password>
DEFAULT TABLESPACE <permanent Tablespace name/user created tablespace>
QUOTA <size> ON <default tablespace name>
TEMPORARY TABLESPACE <tablespace name>
PROFILE <profile name>
• CREATE USER is a system privilege, the database administrator or security administrator generally has this
privilege to create database user identified by password.
• Create session using user as “SYS” and SYS user has privilege as system database administrator. The user
name is : sys and password also sys 5
6
An IDENTIFIED BY PASSWORD user is always authenticated by the database.
In the above statement Arvind is a user name and password is Arvind123.
The password is case sensitive. This user has a schema. The schema may be empty but it does exist.
A newly created user cannot connect to the database until you grant the user the CREATE SESSION system privileges.
Figure 1-3 Create session to user
Figure 1-2 create user
7
All user names are stored as Upper-case in the database.
Now check the user Arvind is stored in the database in upper-case
letters.
Figure 1-4 User Name stored as Upper Case
Within each database, a user name must
be unique with respect to other user names
Figure 1-5 User Name must be Unique
If user name is enclosed with double quotation marks, then the user name will be stored as given user name case instead
of storing as upper-case letters.
8
For example, suppose “Arvind” user name in double quotation, then it will store first letter “A” is upper-case and
remaining all the letter in the given case only.
Now it will accept even though same name Arvind one user is "ARVIND" and another user is "Arvind".
Figure 1-6 Same user name with case Sensitive
There is another method to create new user using GRANT Statement, no need for create user statement and then granting
create session.
In the single statement, we can create and grant the session to the user
Figure 1-7 Create user using Grant create session statement
1.3 Listing All Users Information
9
The database dictionary view DBA_USERS describes all users of the database and their related information like
password of the user, account status of the user and assigned profile name to the user etc.,
Figure 1-8 Describe DBA_USERS
10
Display the Arvind user information using DBA_USERS data dictionary view.
As early stated always username should be in ' ' single quotes using capital letters not lower letters.
If you use lower case in between ' ' not only username suppose using profile name in the where condition that
time also always specific CAPITAL LETTERS.
Otherwise you will get "no row selected" output.
Figure 1-9 Use capital letters in Data Dictionary statement where condition
1.4 Assigning a Default Tablespace for the User
• Each user should have a default tablespace.
• When a schema object (like table, index, view..) is created in the user’s schema and the Data Definition Language(DDL) i.e
create statement does not specify a tablespace to contain the object, Oracle Database stores the object in the default user’s
tablespace.
• Default tablespaces of all users is the SYSTEM tablespace.
• In general, do not store user data in the SYSTEM tablespace, then user should specifically assign the user a default tablespace, such as
the USERS tablespace.
• we don't assign any specific tablespace to user Arvind, i.e it automatically assign default permanent tablespace "USERS" is assigned to
user Arvind.
11
Figure 1-10 Display the Default permanent tablespace to
the user
Use the CREATE TABLESPACE statement to create a default permanent tablespace other than SYSTEM at the time of database creation.
For example create “Arvind_ts” as default tablespace and then assign to user Arvind.
Here we already created user Arvind. So, using ALTER USER statement reassign the Arvind_ts instead of USERS default tablespace.
12
Figure 1-11 Alter user default table space
There is two ways we can change the default tablespace one is as early we explained using alter user statement, in this
statement only specific user tablespace to be used but remaining all other user tablespace remain the same.
For example, check the another user sinduja default tablespace it is USERS tablespace not Arvind_ts tablespace.
Because we used ALTER USER statements so it will change only Arvind user default permanent tablespace as
"Arvind_ts" not another user sinduja.
13
Using ALTER DATABASE statement if default tablespace is changed, then it will assign modified tablespace to all user
using the same database.
Previously the user sinduja has USERS tablespace, if you change default tablespace as “Arvind_ts” then it automatically
changing sindhuja tablespace as “Arvind_ts”
Figure 1-12 Alter user vs. Alter Database
Figure 1-13 Display another user tablespace
14
The ALTER database default tablespace statement not affect the system user like SYS, SYSTEM, and OUTLN. By
default they have permanent default tablespace is SYSTEM.
Figure 1-15 System User default tablespace
15
Figure 1-16 Drop default table space
If any tablespace is assigned as default permanent to all user using ALTER DATABASE or any
specific user using ALTER USER.
That tablespace is not possible to drop. So before dropping the assigned default permanent
tablespace to modify by some other tablespace or USERS tablespace, then it is possible to
drop assigned default permanent tablespace.
1.5 Assigning a Temporary Tablespace for the User
• Using CREATE USER statement to assign each user a temporary tablespace.
• For executing any SQL statement temporary segment is needed.
• The temporary segment are stored in temporary tablespace of the user.
• The purpose of temporary tablespace are used operations like merging or sorting data result and using hash joins in SQL.
• Every database creation by default only one temporary table space will be created.
• While creating user if temporary tablespace is not mentioned then by default Oracle database will assign SYSTEM
temporary tablespace “TEMP” to user.
16
Figure 1-17 Default temporary
tablespace
17
Using ALTER DATABASE Statement like default permanent tablespace the temporary tablespace can also be assign to all the
user in the database.
figure 1-8 User defined temporary tablespace
In the same manner, once temporary tablespace is assign to any user then dropping the specific default temporary tablespace
gives error.
Figure 1-19 Drop temporary tablespace
1.6 Assigning a Tablespace Quota for the User
The tablespace quota allocate storage space for each user creating their own schema objects like table,
dimension, index, view and materialized view etc.,
Even though the user has privilege to create and insert table privilege, while inserting values into table object the
“ORA-01950: no privileges on tablespace USERS” error will occur.
This error the user has default permanent tablespace is USERS.
Use the DBA_TS_QUOTAS data dictionary view has all tablespace quotas associated information specifically
assigned to each user.
18
Figure 1-20 Describe Tablespace Quota
19
By default there is no quota allocated to user. In Figure 1-21, the username "Arvind" and "Sinduja" is missing.
Because we don't allocate any quota for the user.
Like default permanent tablespace or temporary tablespace it don't assign automatically.
Quota should be specifically assign to user.
Figure 1-21 Table space Quota
20
Figure 1-22 Same user has more than one quota
The same user has more than one quota from more than one tablespace
21
Quota cannot to allocate to temporary tablespace, it is only for permanent default tablespace.
Figure 1-23 Quota don't assign temporary tablespace
Figure 1-24 Revoke Quota
Figure 1-25 Unlimited quota value
Assign “UNLIMITED” quota value to user.
For revoking Quota, assign zero value in the Quota.
1.7 Remove User Accounts
22
For removing user account from the database use DROP USER STATEMENT
Figure 1-26 Drop user
1.8 Unit summary
After completing this unit the reader get knowledge about how to
create user for authentication.
It describes default tablespace, temporary tablespace and quota assign
for user explained using oracle 11g.
Only profile part is remaining in the user associated information. The
profile will be explained in the Unit 2.
23
1.9 Practical Exercise
24
1. Create default permanent tablespace as “Lak_ts” using “lak.dbf” file. While creating
user Lakshmi do the following:
- Lakshmi password is Lak01020
- Assign Lak_ts tablespace to user Lakshmi
- Assign unlimited quota using Lak_ts tablespace.
2. Revoke the quota value of the user Lakshmi
3. Change the password of the user Lakshmi to Lakshmi1546
4. Display default permanent tablespace of the user Lakshmi
5. Display temporary tablespace of the user Lakshmi.
6. Change the default permanent table space as "USERS" to user LAKSHMI
7. Remove the user Lakshmi from the database.
References
25
[1] Patricia Huey (2014) Oracle Database, Security Guide 11g Release 2 (11.2).

More Related Content

What's hot

Oracle data capture c dc
Oracle data capture c dcOracle data capture c dc
Oracle data capture c dc
Amit Sharma
 
Active database
Active databaseActive database
Active database
Dabbal Singh Mahara
 
2020 New Updated 1Z0-060 Questions and Answers
2020 New Updated 1Z0-060 Questions and Answers2020 New Updated 1Z0-060 Questions and Answers
2020 New Updated 1Z0-060 Questions and Answers
douglascarnicelli
 
Sql ch 13 - sql-views
Sql ch 13 - sql-viewsSql ch 13 - sql-views
Sql ch 13 - sql-views
Mukesh Tekwani
 
OC Backend_Katalyst HLS
OC Backend_Katalyst HLSOC Backend_Katalyst HLS
OC Backend_Katalyst HLS
Katalyst HLS
 
Subqueries views stored procedures_triggers_transactions
Subqueries views stored procedures_triggers_transactionsSubqueries views stored procedures_triggers_transactions
Subqueries views stored procedures_triggers_transactions
maxpane
 
Oracle developer interview questions(entry level)
Oracle developer interview questions(entry level)Oracle developer interview questions(entry level)
Oracle developer interview questions(entry level)
Naveen P
 
PL/SQL Interview Questions
PL/SQL Interview QuestionsPL/SQL Interview Questions
PL/SQL Interview Questions
Srinimf-Slides
 
Active database system
Active database systemActive database system
Active database system
Adeolu Olaniyan
 
Oracle dba interview
Oracle dba interviewOracle dba interview
Oracle dba interview
Naveen P
 
SQL Injection Attacks
SQL Injection AttacksSQL Injection Attacks
SQL Injection Attacks
HTS Hosting
 
synopsis
synopsissynopsis
synopsis
jayant parmar
 
Ebook12
Ebook12Ebook12
Ebook12
kaashiv1
 
Sql interview questions and answers
Sql interview questions and  answersSql interview questions and  answers
Sql interview questions and answers
sheibansari
 
Teradata imp
Teradata impTeradata imp
Teradata imp
Hameed Lebbai
 
CaseStudy-MohammedImranAlam-Xcelsius
CaseStudy-MohammedImranAlam-XcelsiusCaseStudy-MohammedImranAlam-Xcelsius
CaseStudy-MohammedImranAlam-Xcelsius
Mohammed Imran Alam
 
MySQL Views
MySQL ViewsMySQL Views
PLSQL Standards and Best Practices
PLSQL Standards and Best PracticesPLSQL Standards and Best Practices
PLSQL Standards and Best Practices
Alwyn D'Souza
 
Data Capture And Validation_Katalyst HLS
Data Capture And Validation_Katalyst HLSData Capture And Validation_Katalyst HLS
Data Capture And Validation_Katalyst HLS
Katalyst HLS
 

What's hot (19)

Oracle data capture c dc
Oracle data capture c dcOracle data capture c dc
Oracle data capture c dc
 
Active database
Active databaseActive database
Active database
 
2020 New Updated 1Z0-060 Questions and Answers
2020 New Updated 1Z0-060 Questions and Answers2020 New Updated 1Z0-060 Questions and Answers
2020 New Updated 1Z0-060 Questions and Answers
 
Sql ch 13 - sql-views
Sql ch 13 - sql-viewsSql ch 13 - sql-views
Sql ch 13 - sql-views
 
OC Backend_Katalyst HLS
OC Backend_Katalyst HLSOC Backend_Katalyst HLS
OC Backend_Katalyst HLS
 
Subqueries views stored procedures_triggers_transactions
Subqueries views stored procedures_triggers_transactionsSubqueries views stored procedures_triggers_transactions
Subqueries views stored procedures_triggers_transactions
 
Oracle developer interview questions(entry level)
Oracle developer interview questions(entry level)Oracle developer interview questions(entry level)
Oracle developer interview questions(entry level)
 
PL/SQL Interview Questions
PL/SQL Interview QuestionsPL/SQL Interview Questions
PL/SQL Interview Questions
 
Active database system
Active database systemActive database system
Active database system
 
Oracle dba interview
Oracle dba interviewOracle dba interview
Oracle dba interview
 
SQL Injection Attacks
SQL Injection AttacksSQL Injection Attacks
SQL Injection Attacks
 
synopsis
synopsissynopsis
synopsis
 
Ebook12
Ebook12Ebook12
Ebook12
 
Sql interview questions and answers
Sql interview questions and  answersSql interview questions and  answers
Sql interview questions and answers
 
Teradata imp
Teradata impTeradata imp
Teradata imp
 
CaseStudy-MohammedImranAlam-Xcelsius
CaseStudy-MohammedImranAlam-XcelsiusCaseStudy-MohammedImranAlam-Xcelsius
CaseStudy-MohammedImranAlam-Xcelsius
 
MySQL Views
MySQL ViewsMySQL Views
MySQL Views
 
PLSQL Standards and Best Practices
PLSQL Standards and Best PracticesPLSQL Standards and Best Practices
PLSQL Standards and Best Practices
 
Data Capture And Validation_Katalyst HLS
Data Capture And Validation_Katalyst HLSData Capture And Validation_Katalyst HLS
Data Capture And Validation_Katalyst HLS
 

Similar to OER-Unit 1 authentication -Lecturer Notes

Create user database management security
Create user  database management securityCreate user  database management security
Create user database management security
Girija Muscut
 
create database.pptx
create database.pptxcreate database.pptx
create database.pptx
adityakumawat625
 
03_DP_300T00A_Secure_Environment.pptx
03_DP_300T00A_Secure_Environment.pptx03_DP_300T00A_Secure_Environment.pptx
03_DP_300T00A_Secure_Environment.pptx
KareemBullard1
 
User, roles and privileges
User, roles and privilegesUser, roles and privileges
User, roles and privileges
Yogiji Creations
 
SQL Create Database.pptx
SQL Create Database.pptxSQL Create Database.pptx
SQL Create Database.pptx
kulmiye2
 
Db2 tutorial
Db2 tutorialDb2 tutorial
DBMS LAB FILE1 task 1 , task 2, task3 and many more.pdf
DBMS LAB FILE1 task 1 , task 2, task3 and many more.pdfDBMS LAB FILE1 task 1 , task 2, task3 and many more.pdf
DBMS LAB FILE1 task 1 , task 2, task3 and many more.pdf
AbhishekKumarPandit5
 
Lecture on DBMS & MySQL.pdf v. C. .
Lecture on DBMS & MySQL.pdf v.  C.     .Lecture on DBMS & MySQL.pdf v.  C.     .
Lecture on DBMS & MySQL.pdf v. C. .
MayankSinghRawat6
 
Db pre
Db preDb pre
Db pre
frrobin
 
Less07 Users
Less07 UsersLess07 Users
Less07 Users
vivaankumar
 
Geek Sync | SQL Security Principals and Permissions 101
Geek Sync | SQL Security Principals and Permissions 101Geek Sync | SQL Security Principals and Permissions 101
Geek Sync | SQL Security Principals and Permissions 101
IDERA Software
 
SAP_HANA_SECURITY_overview_online_Resear.docx
SAP_HANA_SECURITY_overview_online_Resear.docxSAP_HANA_SECURITY_overview_online_Resear.docx
SAP_HANA_SECURITY_overview_online_Resear.docx
juancusa
 
SQL Fundamentals - Lecture 2
SQL Fundamentals - Lecture 2SQL Fundamentals - Lecture 2
SQL Fundamentals - Lecture 2
MuhammadWaheed44
 
Introduction to sql server
Introduction to sql serverIntroduction to sql server
Introduction to sql server
Vinay Thota
 
SQL PPT.pptx
SQL PPT.pptxSQL PPT.pptx
SQL PPT.pptx
Kulbir4
 
SQL SERVER Training in Pune Slides
SQL SERVER Training in Pune SlidesSQL SERVER Training in Pune Slides
SQL SERVER Training in Pune Slides
enosislearningcom
 
SQL
SQLSQL
Sq lite
Sq liteSq lite
SQL for interview
SQL for interviewSQL for interview
SQL for interview
Aditya Kumar Tripathy
 
Database management system by Neeraj Bhandari ( Surkhet.Nepal )
Database management system by Neeraj Bhandari ( Surkhet.Nepal )Database management system by Neeraj Bhandari ( Surkhet.Nepal )
Database management system by Neeraj Bhandari ( Surkhet.Nepal )
Neeraj Bhandari
 

Similar to OER-Unit 1 authentication -Lecturer Notes (20)

Create user database management security
Create user  database management securityCreate user  database management security
Create user database management security
 
create database.pptx
create database.pptxcreate database.pptx
create database.pptx
 
03_DP_300T00A_Secure_Environment.pptx
03_DP_300T00A_Secure_Environment.pptx03_DP_300T00A_Secure_Environment.pptx
03_DP_300T00A_Secure_Environment.pptx
 
User, roles and privileges
User, roles and privilegesUser, roles and privileges
User, roles and privileges
 
SQL Create Database.pptx
SQL Create Database.pptxSQL Create Database.pptx
SQL Create Database.pptx
 
Db2 tutorial
Db2 tutorialDb2 tutorial
Db2 tutorial
 
DBMS LAB FILE1 task 1 , task 2, task3 and many more.pdf
DBMS LAB FILE1 task 1 , task 2, task3 and many more.pdfDBMS LAB FILE1 task 1 , task 2, task3 and many more.pdf
DBMS LAB FILE1 task 1 , task 2, task3 and many more.pdf
 
Lecture on DBMS & MySQL.pdf v. C. .
Lecture on DBMS & MySQL.pdf v.  C.     .Lecture on DBMS & MySQL.pdf v.  C.     .
Lecture on DBMS & MySQL.pdf v. C. .
 
Db pre
Db preDb pre
Db pre
 
Less07 Users
Less07 UsersLess07 Users
Less07 Users
 
Geek Sync | SQL Security Principals and Permissions 101
Geek Sync | SQL Security Principals and Permissions 101Geek Sync | SQL Security Principals and Permissions 101
Geek Sync | SQL Security Principals and Permissions 101
 
SAP_HANA_SECURITY_overview_online_Resear.docx
SAP_HANA_SECURITY_overview_online_Resear.docxSAP_HANA_SECURITY_overview_online_Resear.docx
SAP_HANA_SECURITY_overview_online_Resear.docx
 
SQL Fundamentals - Lecture 2
SQL Fundamentals - Lecture 2SQL Fundamentals - Lecture 2
SQL Fundamentals - Lecture 2
 
Introduction to sql server
Introduction to sql serverIntroduction to sql server
Introduction to sql server
 
SQL PPT.pptx
SQL PPT.pptxSQL PPT.pptx
SQL PPT.pptx
 
SQL SERVER Training in Pune Slides
SQL SERVER Training in Pune SlidesSQL SERVER Training in Pune Slides
SQL SERVER Training in Pune Slides
 
SQL
SQLSQL
SQL
 
Sq lite
Sq liteSq lite
Sq lite
 
SQL for interview
SQL for interviewSQL for interview
SQL for interview
 
Database management system by Neeraj Bhandari ( Surkhet.Nepal )
Database management system by Neeraj Bhandari ( Surkhet.Nepal )Database management system by Neeraj Bhandari ( Surkhet.Nepal )
Database management system by Neeraj Bhandari ( Surkhet.Nepal )
 

More from Girija Muscut

Tamil Nalvar
Tamil Nalvar Tamil Nalvar
Tamil Nalvar
Girija Muscut
 
Visualization using Tableau
Visualization using TableauVisualization using Tableau
Visualization using Tableau
Girija Muscut
 
Introduction to ml
Introduction to mlIntroduction to ml
Introduction to ml
Girija Muscut
 
Effective Visualization with Tableau
Effective Visualization with TableauEffective Visualization with Tableau
Effective Visualization with Tableau
Girija Muscut
 
Guruvayoor song with audio-Udayasthamana puja
Guruvayoor song with audio-Udayasthamana puja Guruvayoor song with audio-Udayasthamana puja
Guruvayoor song with audio-Udayasthamana puja
Girija Muscut
 
Lakshmi lalli with audio
Lakshmi lalli with audioLakshmi lalli with audio
Lakshmi lalli with audio
Girija Muscut
 
Bagyada laskhmi purandara dasa
Bagyada laskhmi purandara dasaBagyada laskhmi purandara dasa
Bagyada laskhmi purandara dasa
Girija Muscut
 
Lakshmi lalli
Lakshmi lalliLakshmi lalli
Lakshmi lalli
Girija Muscut
 
Amba nee irangaayenil - papanasam sivan song
Amba nee irangaayenil - papanasam sivan songAmba nee irangaayenil - papanasam sivan song
Amba nee irangaayenil - papanasam sivan song
Girija Muscut
 
Mahalakshmi jagan madha - papanasm sivan tamil song
Mahalakshmi jagan madha  - papanasm sivan tamil songMahalakshmi jagan madha  - papanasm sivan tamil song
Mahalakshmi jagan madha - papanasm sivan tamil song
Girija Muscut
 
Sowbhagayaha laskhmi varuvai nee tamil song
Sowbhagayaha laskhmi varuvai nee tamil songSowbhagayaha laskhmi varuvai nee tamil song
Sowbhagayaha laskhmi varuvai nee tamil song
Girija Muscut
 
Bega baro Bega baro Neela Megha Varna-Vadhiraja Theertha
Bega baro Bega baro Neela Megha Varna-Vadhiraja TheerthaBega baro Bega baro Neela Megha Varna-Vadhiraja Theertha
Bega baro Bega baro Neela Megha Varna-Vadhiraja Theertha
Girija Muscut
 
Rama Nama Bhajan
Rama Nama BhajanRama Nama Bhajan
Rama Nama Bhajan
Girija Muscut
 
Saratha devi song 1
Saratha devi song 1Saratha devi song 1
Saratha devi song 1
Girija Muscut
 
Saraswathi bhajan 1 with tamil meaning
Saraswathi bhajan 1 with tamil meaningSaraswathi bhajan 1 with tamil meaning
Saraswathi bhajan 1 with tamil meaning
Girija Muscut
 
Aneyu karadare -Purandara Dasar.
Aneyu karadare -Purandara Dasar.Aneyu karadare -Purandara Dasar.
Aneyu karadare -Purandara Dasar.
Girija Muscut
 
Maithriam Bhajatha with tamil meaning (lyrics)
Maithriam Bhajatha with tamil meaning (lyrics)Maithriam Bhajatha with tamil meaning (lyrics)
Maithriam Bhajatha with tamil meaning (lyrics)
Girija Muscut
 
Unit 4 scd2-exercise 1-solution
Unit 4 scd2-exercise 1-solutionUnit 4 scd2-exercise 1-solution
Unit 4 scd2-exercise 1-solution
Girija Muscut
 
Unit 2 - Slowly Changing Dimension Type 1 (SCD1) (insert)
Unit 2  - Slowly Changing Dimension Type 1 (SCD1) (insert)Unit 2  - Slowly Changing Dimension Type 1 (SCD1) (insert)
Unit 2 - Slowly Changing Dimension Type 1 (SCD1) (insert)
Girija Muscut
 
Slowly Changing Dimension Type 1 (SCD 1) exercise 2 solution insert and update
Slowly Changing Dimension Type 1 (SCD 1) exercise 2 solution insert and updateSlowly Changing Dimension Type 1 (SCD 1) exercise 2 solution insert and update
Slowly Changing Dimension Type 1 (SCD 1) exercise 2 solution insert and update
Girija Muscut
 

More from Girija Muscut (20)

Tamil Nalvar
Tamil Nalvar Tamil Nalvar
Tamil Nalvar
 
Visualization using Tableau
Visualization using TableauVisualization using Tableau
Visualization using Tableau
 
Introduction to ml
Introduction to mlIntroduction to ml
Introduction to ml
 
Effective Visualization with Tableau
Effective Visualization with TableauEffective Visualization with Tableau
Effective Visualization with Tableau
 
Guruvayoor song with audio-Udayasthamana puja
Guruvayoor song with audio-Udayasthamana puja Guruvayoor song with audio-Udayasthamana puja
Guruvayoor song with audio-Udayasthamana puja
 
Lakshmi lalli with audio
Lakshmi lalli with audioLakshmi lalli with audio
Lakshmi lalli with audio
 
Bagyada laskhmi purandara dasa
Bagyada laskhmi purandara dasaBagyada laskhmi purandara dasa
Bagyada laskhmi purandara dasa
 
Lakshmi lalli
Lakshmi lalliLakshmi lalli
Lakshmi lalli
 
Amba nee irangaayenil - papanasam sivan song
Amba nee irangaayenil - papanasam sivan songAmba nee irangaayenil - papanasam sivan song
Amba nee irangaayenil - papanasam sivan song
 
Mahalakshmi jagan madha - papanasm sivan tamil song
Mahalakshmi jagan madha  - papanasm sivan tamil songMahalakshmi jagan madha  - papanasm sivan tamil song
Mahalakshmi jagan madha - papanasm sivan tamil song
 
Sowbhagayaha laskhmi varuvai nee tamil song
Sowbhagayaha laskhmi varuvai nee tamil songSowbhagayaha laskhmi varuvai nee tamil song
Sowbhagayaha laskhmi varuvai nee tamil song
 
Bega baro Bega baro Neela Megha Varna-Vadhiraja Theertha
Bega baro Bega baro Neela Megha Varna-Vadhiraja TheerthaBega baro Bega baro Neela Megha Varna-Vadhiraja Theertha
Bega baro Bega baro Neela Megha Varna-Vadhiraja Theertha
 
Rama Nama Bhajan
Rama Nama BhajanRama Nama Bhajan
Rama Nama Bhajan
 
Saratha devi song 1
Saratha devi song 1Saratha devi song 1
Saratha devi song 1
 
Saraswathi bhajan 1 with tamil meaning
Saraswathi bhajan 1 with tamil meaningSaraswathi bhajan 1 with tamil meaning
Saraswathi bhajan 1 with tamil meaning
 
Aneyu karadare -Purandara Dasar.
Aneyu karadare -Purandara Dasar.Aneyu karadare -Purandara Dasar.
Aneyu karadare -Purandara Dasar.
 
Maithriam Bhajatha with tamil meaning (lyrics)
Maithriam Bhajatha with tamil meaning (lyrics)Maithriam Bhajatha with tamil meaning (lyrics)
Maithriam Bhajatha with tamil meaning (lyrics)
 
Unit 4 scd2-exercise 1-solution
Unit 4 scd2-exercise 1-solutionUnit 4 scd2-exercise 1-solution
Unit 4 scd2-exercise 1-solution
 
Unit 2 - Slowly Changing Dimension Type 1 (SCD1) (insert)
Unit 2  - Slowly Changing Dimension Type 1 (SCD1) (insert)Unit 2  - Slowly Changing Dimension Type 1 (SCD1) (insert)
Unit 2 - Slowly Changing Dimension Type 1 (SCD1) (insert)
 
Slowly Changing Dimension Type 1 (SCD 1) exercise 2 solution insert and update
Slowly Changing Dimension Type 1 (SCD 1) exercise 2 solution insert and updateSlowly Changing Dimension Type 1 (SCD 1) exercise 2 solution insert and update
Slowly Changing Dimension Type 1 (SCD 1) exercise 2 solution insert and update
 

Recently uploaded

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 

Recently uploaded (20)

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 

OER-Unit 1 authentication -Lecturer Notes

  • 2. Unit Objective • The main objective of this unit is reader can learn how to create and alter database user, default tablespace, temporary tablespace and quota. 2
  • 3. 1.1 User Authentication • Authentication means verifying the identity of user or entity or any resource. • Authentication is responsible to identify which user is interest to use any information or data from the database or applications. • Especially the Oracle Database Administrator obtains special authentication operation such as creating, altering and removing database user. • And also assign system tablespace and temporary tablespace. • Data security classifies into various stages i.e. Authentication, Authorization, Access control and Auditing. • Initial step is to identify the user. The next step is after identifying the user check their privileges i.e. authorization and access rights or access control. • All the above stages are useful for monitoring user action in auditing process. • There is various authentication ways to identify users are Basic Authentication, Strong Authentication, Enterprise User security and proxy authentication. 3
  • 4. 4
  • 5. 1.2 Basic authentication- Database user identified by a password • The syntax of the Create User statement is given below. We will study each part of the syntax in details. We will study first two lines "Create user <username> identified by <password>" CREATE USER <username> IDENTIFIED BY <password> DEFAULT TABLESPACE <permanent Tablespace name/user created tablespace> QUOTA <size> ON <default tablespace name> TEMPORARY TABLESPACE <tablespace name> PROFILE <profile name> • CREATE USER is a system privilege, the database administrator or security administrator generally has this privilege to create database user identified by password. • Create session using user as “SYS” and SYS user has privilege as system database administrator. The user name is : sys and password also sys 5
  • 6. 6 An IDENTIFIED BY PASSWORD user is always authenticated by the database. In the above statement Arvind is a user name and password is Arvind123. The password is case sensitive. This user has a schema. The schema may be empty but it does exist. A newly created user cannot connect to the database until you grant the user the CREATE SESSION system privileges. Figure 1-3 Create session to user Figure 1-2 create user
  • 7. 7 All user names are stored as Upper-case in the database. Now check the user Arvind is stored in the database in upper-case letters. Figure 1-4 User Name stored as Upper Case Within each database, a user name must be unique with respect to other user names Figure 1-5 User Name must be Unique If user name is enclosed with double quotation marks, then the user name will be stored as given user name case instead of storing as upper-case letters.
  • 8. 8 For example, suppose “Arvind” user name in double quotation, then it will store first letter “A” is upper-case and remaining all the letter in the given case only. Now it will accept even though same name Arvind one user is "ARVIND" and another user is "Arvind". Figure 1-6 Same user name with case Sensitive There is another method to create new user using GRANT Statement, no need for create user statement and then granting create session. In the single statement, we can create and grant the session to the user Figure 1-7 Create user using Grant create session statement
  • 9. 1.3 Listing All Users Information 9 The database dictionary view DBA_USERS describes all users of the database and their related information like password of the user, account status of the user and assigned profile name to the user etc., Figure 1-8 Describe DBA_USERS
  • 10. 10 Display the Arvind user information using DBA_USERS data dictionary view. As early stated always username should be in ' ' single quotes using capital letters not lower letters. If you use lower case in between ' ' not only username suppose using profile name in the where condition that time also always specific CAPITAL LETTERS. Otherwise you will get "no row selected" output. Figure 1-9 Use capital letters in Data Dictionary statement where condition
  • 11. 1.4 Assigning a Default Tablespace for the User • Each user should have a default tablespace. • When a schema object (like table, index, view..) is created in the user’s schema and the Data Definition Language(DDL) i.e create statement does not specify a tablespace to contain the object, Oracle Database stores the object in the default user’s tablespace. • Default tablespaces of all users is the SYSTEM tablespace. • In general, do not store user data in the SYSTEM tablespace, then user should specifically assign the user a default tablespace, such as the USERS tablespace. • we don't assign any specific tablespace to user Arvind, i.e it automatically assign default permanent tablespace "USERS" is assigned to user Arvind. 11 Figure 1-10 Display the Default permanent tablespace to the user Use the CREATE TABLESPACE statement to create a default permanent tablespace other than SYSTEM at the time of database creation. For example create “Arvind_ts” as default tablespace and then assign to user Arvind. Here we already created user Arvind. So, using ALTER USER statement reassign the Arvind_ts instead of USERS default tablespace.
  • 12. 12 Figure 1-11 Alter user default table space There is two ways we can change the default tablespace one is as early we explained using alter user statement, in this statement only specific user tablespace to be used but remaining all other user tablespace remain the same. For example, check the another user sinduja default tablespace it is USERS tablespace not Arvind_ts tablespace. Because we used ALTER USER statements so it will change only Arvind user default permanent tablespace as "Arvind_ts" not another user sinduja.
  • 13. 13 Using ALTER DATABASE statement if default tablespace is changed, then it will assign modified tablespace to all user using the same database. Previously the user sinduja has USERS tablespace, if you change default tablespace as “Arvind_ts” then it automatically changing sindhuja tablespace as “Arvind_ts” Figure 1-12 Alter user vs. Alter Database Figure 1-13 Display another user tablespace
  • 14. 14 The ALTER database default tablespace statement not affect the system user like SYS, SYSTEM, and OUTLN. By default they have permanent default tablespace is SYSTEM. Figure 1-15 System User default tablespace
  • 15. 15 Figure 1-16 Drop default table space If any tablespace is assigned as default permanent to all user using ALTER DATABASE or any specific user using ALTER USER. That tablespace is not possible to drop. So before dropping the assigned default permanent tablespace to modify by some other tablespace or USERS tablespace, then it is possible to drop assigned default permanent tablespace.
  • 16. 1.5 Assigning a Temporary Tablespace for the User • Using CREATE USER statement to assign each user a temporary tablespace. • For executing any SQL statement temporary segment is needed. • The temporary segment are stored in temporary tablespace of the user. • The purpose of temporary tablespace are used operations like merging or sorting data result and using hash joins in SQL. • Every database creation by default only one temporary table space will be created. • While creating user if temporary tablespace is not mentioned then by default Oracle database will assign SYSTEM temporary tablespace “TEMP” to user. 16 Figure 1-17 Default temporary tablespace
  • 17. 17 Using ALTER DATABASE Statement like default permanent tablespace the temporary tablespace can also be assign to all the user in the database. figure 1-8 User defined temporary tablespace In the same manner, once temporary tablespace is assign to any user then dropping the specific default temporary tablespace gives error. Figure 1-19 Drop temporary tablespace
  • 18. 1.6 Assigning a Tablespace Quota for the User The tablespace quota allocate storage space for each user creating their own schema objects like table, dimension, index, view and materialized view etc., Even though the user has privilege to create and insert table privilege, while inserting values into table object the “ORA-01950: no privileges on tablespace USERS” error will occur. This error the user has default permanent tablespace is USERS. Use the DBA_TS_QUOTAS data dictionary view has all tablespace quotas associated information specifically assigned to each user. 18 Figure 1-20 Describe Tablespace Quota
  • 19. 19 By default there is no quota allocated to user. In Figure 1-21, the username "Arvind" and "Sinduja" is missing. Because we don't allocate any quota for the user. Like default permanent tablespace or temporary tablespace it don't assign automatically. Quota should be specifically assign to user. Figure 1-21 Table space Quota
  • 20. 20 Figure 1-22 Same user has more than one quota The same user has more than one quota from more than one tablespace
  • 21. 21 Quota cannot to allocate to temporary tablespace, it is only for permanent default tablespace. Figure 1-23 Quota don't assign temporary tablespace Figure 1-24 Revoke Quota Figure 1-25 Unlimited quota value Assign “UNLIMITED” quota value to user. For revoking Quota, assign zero value in the Quota.
  • 22. 1.7 Remove User Accounts 22 For removing user account from the database use DROP USER STATEMENT Figure 1-26 Drop user
  • 23. 1.8 Unit summary After completing this unit the reader get knowledge about how to create user for authentication. It describes default tablespace, temporary tablespace and quota assign for user explained using oracle 11g. Only profile part is remaining in the user associated information. The profile will be explained in the Unit 2. 23
  • 24. 1.9 Practical Exercise 24 1. Create default permanent tablespace as “Lak_ts” using “lak.dbf” file. While creating user Lakshmi do the following: - Lakshmi password is Lak01020 - Assign Lak_ts tablespace to user Lakshmi - Assign unlimited quota using Lak_ts tablespace. 2. Revoke the quota value of the user Lakshmi 3. Change the password of the user Lakshmi to Lakshmi1546 4. Display default permanent tablespace of the user Lakshmi 5. Display temporary tablespace of the user Lakshmi. 6. Change the default permanent table space as "USERS" to user LAKSHMI 7. Remove the user Lakshmi from the database.
  • 25. References 25 [1] Patricia Huey (2014) Oracle Database, Security Guide 11g Release 2 (11.2).