Saturday, March 30, 2013

Security, Authentication Methods - Part 1

Dear Readers,

My name is Franz Devantier, creator of this blog.  I am an Oracle Certified Professional (OCP DBA 11g) Security DBA.  I will be sharing with you the basic duties of an Oracle DBA, and also some of the undocumented, and not so well known tasks. 

I will make a deal with you:  If you refer me to a company that needs database support, from a few hours per week to full time, and I am able to sign a contract with them.
Then I will give you 10% of the monthly contract or deal price every month.  When the contract ends, and we re-sign the contract, I will again give you 10% of the monthly contract price.  This will go on until the company no longer employs or contracts me or my agents to look after their databases.
I can do this, because that 10% is my marketing budget.  When we re-sign the contract, in the future, it may depend on you giving the thumbs up again, and that is worth 10% of the monthly contract price, to be given to you as commission.
Contact: Franz

Security, Authentication Methods  -  Part 1
By authentication we mean verifying the identity of someone, a user, a device, or an entity who wants to; access data, resources, or applications.  Authentication or validating the identity, establishes a relationship of trust for further interactions.  Authentication enables accountability, making it possible to link access and actions to specific identities.

After authentication, authorization processes allow or limit the levels of access permitted, and the actions that are allowed for that specific entity.  Authorization operates with Privileges, roles, profiles, and resource limitations.

Oracle allows a database instance to use all of the methods, or any of the methods.  Oracle requires special authentication procedures for database administrators, because they perform powerful database operations.

Oracle encrypts passwords during transmission to ensure the security of network authentication.

The identity of database users can be validated in a number of different ways, in order to prevent unauthorized use of the database:
·         Validate at the Operating System
·         Validate with the network, and LDAP directories
·         Validate at the database level
·         Validate on multitier systems
·         Validate using secure socket layers
·         Validate database administrators

Franz Devantier,
Need a database health check, or a security audit?
devantierf@gmail.com

No comments:

Post a Comment