Dear Readers,
My name is Franz Devantier, creator of this blog. I am an Oracle Certified
Professional (OCP DBA 11g) Security DBA.
I will be sharing with you the basic duties of an Oracle DBA, and also
some of the undocumented, and not so well known tasks.
I will make a deal with you: If you refer me to a company that needs
database support, from a few hours per week to full time, and I am able to sign
a contract with them.
Then I will give you 10% of the monthly
contract or deal price every month. When
the contract ends, and we re-sign the contract, I will again give you 10% of
the monthly contract price. This will go
on until the company no longer employs or contracts me or my agents to look
after their databases.
I can do this, because that 10% is my
marketing budget. When we re-sign the
contract, in the future, it may depend on you giving the thumbs up again, and
that is worth 10% of the monthly contract price, to be given to you as
commission.
Contact:
Franz
Security,
Authentication Methods - Part 1
By authentication we mean verifying the identity of
someone, a user, a device, or an entity who wants to; access data, resources,
or applications. Authentication or
validating the identity, establishes a relationship of trust for further
interactions. Authentication enables
accountability, making it possible to link access and actions to specific
identities.
After authentication, authorization processes allow or
limit the levels of access permitted, and the actions that are allowed for that
specific entity. Authorization operates
with Privileges, roles, profiles, and resource limitations.
Oracle allows a database instance to use all of the
methods, or any of the methods. Oracle
requires special authentication procedures for database administrators, because
they perform powerful database operations.
Oracle encrypts passwords during transmission to ensure
the security of network authentication.
The identity of database users can be validated
in a number of different ways, in order to prevent unauthorized use of the
database:
·
Validate
at the Operating System
·
Validate
with the network, and LDAP directories
·
Validate
at the database level
·
Validate
on multitier systems
·
Validate
using secure socket layers
·
Validate
database administrators
Franz Devantier,
Need a database health check, or a security audit?
devantierf@gmail.com
Classifieds
No comments:
Post a Comment