Oracle Quick Guides: Part 4 - Oracle Administration: Security and Privilege
()
About this ebook
This is Part 4 of a series of quick learning guides for Oracle administrators, designers, developers and managers. Part 4 introduces early entrants with basic Oracle skills to the main concepts of Oracle data security and user privilege management and administration.
The guide includes details of how to create and how to manage users and their database object and system access and rights. The guide also provides a basis for understanding different database security strategies such as role-based security, virtual private databases and procedure-based security.
Part 4 contains a glossary of Oracle terminology related to database security and user privilege administration with clear explanations of the terms used.
These guides are designed to rapidly deliver key information about Oracle to the following audience groups:
- Project Managers, Database Administrators, Team Leaders, and Testers who are new to Oracle and need rapid access to strategic information about the Oracle security environment in both development and production databases.
- Business Analysts, Software Designers and Developers who are new to Oracle and need to gain a detailed understanding of the data security and administration issues involved in an Oracle database.
Part 4 of these guides assumes that the reader has read Parts 1, 2 and 3 of the Oracle Quick Guides or their equivalent content. The contents of Part 4 include the following subject headings:
1. Oracle Database Security Architecture
2. Managing Oracle User Security
3. Managing Privileges and Roles
4. Managing Resources with Profiles
5. Managing Passwords with Profiles
6. Special Users and Privileges - SYS, SYSTEM, SYSDBA, SYSOPER
7. Managing Developer Security
8. Virtual Private Databases (VPD)
9. Procedure Execution Security
10. Data Security using Views
11. Tool Security - PRODUCT_USER_PROFILE Table
12. Obtaining Security Information from the Data Dictionary
13. Glossary of Terms
Appendix 1 - Common System Privileges
Appendix 2 - SYSDBA and SYSOPER Privileges
Appendix 3 - SQL commands which can be disabled
Malcolm Coxall
Malcolm Coxall is a management consultant, systems analyst, organic farmer and author, with more than 30 years experience working for many of the world's largest corporate and institutional organisations, starting in the field of dispute arbitration for the ILO. These experiences have provided him a ringside view of the management methodologies used by medium and large businesses in areas as diverse as banking, oil, defence, telecoms, insurance, manufacturing, mining, food, agriculture, aerospace, textiles, and heavy engineering. Malcolm has published articles on political science, sociology, human design, sustainable agriculture, organic food production, technology in organic farming, biodiversity, forest management, environmental protection and environmental economics. He is active in European environmental politics and was a successful private complainant in the European Court of Justice in several cases of national breaches of European environmental law. He now lives in Southern Spain from where he continues his IT and system consultancy work, writing and managing the family's organic olive farm.
Read more from Malcolm Coxall
Human Manipulation: A Handbook Rating: 0 out of 5 stars0 ratingsMachiavellian Management: A Chief Executive's Guide Rating: 0 out of 5 stars0 ratingsEthical Eating: A Complete Guide to Sustainable Food Rating: 0 out of 5 stars0 ratingsCivil Disobedience: A Practical Guide Rating: 1 out of 5 stars1/5
Related to Oracle Quick Guides
Titles in the series (4)
Oracle Quick Guides: Part 1 - Oracle Basics: Database and Tools Rating: 0 out of 5 stars0 ratingsOracle Quick Guides: Part 2 - Oracle Database Design Rating: 0 out of 5 stars0 ratingsOracle Quick Guides: Part 3 - Coding in Oracle: SQL and PL/SQL Rating: 0 out of 5 stars0 ratingsOracle Quick Guides: Part 4 - Oracle Administration: Security and Privilege Rating: 0 out of 5 stars0 ratings
Related ebooks
Oracle Quick Guides: Part 2 - Oracle Database Design Rating: 0 out of 5 stars0 ratingsOracle Quick Guides: Part 1 - Oracle Basics: Database and Tools Rating: 0 out of 5 stars0 ratingsOracle Database Security Interview Questions, Answers, and Explanations: Oracle Database Security Certification Review Rating: 0 out of 5 stars0 ratingsOracle Quick Guides: Part 3 - Coding in Oracle: SQL and PL/SQL Rating: 0 out of 5 stars0 ratingsOracle Database 12c Release 2 Testing Tools and Techniques for Performance and Scalability Rating: 5 out of 5 stars5/5Introduction to Oracle Database Administration Rating: 5 out of 5 stars5/5Instant Oracle GoldenGate Rating: 0 out of 5 stars0 ratingsORACLE PL/SQL Interview Questions You'll Most Likely Be Asked Rating: 5 out of 5 stars5/5SQL Server Interview Questions You'll Most Likely Be Asked Rating: 0 out of 5 stars0 ratingsOracle SQL Developer Rating: 0 out of 5 stars0 ratingsStarting Database Administration: Oracle DBA Rating: 3 out of 5 stars3/5Oracle Information Integration, Migration, and Consolidation Rating: 0 out of 5 stars0 ratingsOracle Database 12c Quickstart Rating: 5 out of 5 stars5/5OCA Oracle Database 11g Administration I Exam Guide (Exam 1Z0-052) Rating: 0 out of 5 stars0 ratingsSQL Tutorial For Beginners Rating: 0 out of 5 stars0 ratingsOCA Oracle Database 11g Database Administration I: A Real-World Certification Guide Rating: 4 out of 5 stars4/5Oracle Modernization Solutions Rating: 0 out of 5 stars0 ratingsConcise Oracle Database For People Who Has No Time Rating: 0 out of 5 stars0 ratingsA Guide to Db2 Performance for Application Developers: Code for Performance from the Beginning Rating: 0 out of 5 stars0 ratingsPro SQL Server Internals Rating: 0 out of 5 stars0 ratingsOracle: Protect Your Data Rating: 0 out of 5 stars0 ratingsDBA's Guide to NoSQL Rating: 5 out of 5 stars5/5Visual Basic 2010 Coding Briefs Data Access Rating: 5 out of 5 stars5/5Dynamic SQL: Applications, Performance, and Security in Microsoft SQL Server Rating: 0 out of 5 stars0 ratingsLearning Oracle 12c: A PL/SQL Approach Rating: 0 out of 5 stars0 ratingsOracle API Management 12c Implementation Rating: 0 out of 5 stars0 ratingsOracle Database 12c Release 2 New Features Rating: 0 out of 5 stars0 ratings
Security For You
Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsThe Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5CompTia Security 701: Fundamentals of Security Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsHacking For Dummies Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Codes and Ciphers Rating: 5 out of 5 stars5/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Hacking for Beginners: Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security Rating: 0 out of 5 stars0 ratingsTor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Wireless Hacking 101 Rating: 5 out of 5 stars5/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5CompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCEH v11: Certified Ethical Hacker Version 11 Practice Tests Rating: 0 out of 5 stars0 ratingsWireless and Mobile Hacking and Sniffing Techniques Rating: 0 out of 5 stars0 ratingsHow to Hack Like a GOD: Master the secrets of hacking through real-life hacking scenarios Rating: 4 out of 5 stars4/5
Reviews for Oracle Quick Guides
0 ratings0 reviews
Book preview
Oracle Quick Guides - Malcolm Coxall
Oracle Quick Guides - Part 4 Oracle Administration: Security and Privilege
Malcolm Coxall
Edited by Guy Caswell
Published by M.Coxall - Cornelio Books
Copyright 201 6 Malcolm Coxall
First Published in Spain , United Kingdom 2016
ISBN : 978-84-945305-0-0
"Space does not exist unless there are objects in it
Nor does time exist without events."
Contents
Preface and A u dience
1. Oracle Database Security Architecture
2 . Managing Oracle User Security
3. Managing Privileges and Roles
4. Managing Resources with Profiles
5. Managing Passwords with Profile s
6. Special U ser s and Privileges - SYS, SYSTEM, SYSDBA, SYSOPER
7. Managing Developer Security
8. Virtual Private Databases (VPD)
9. Procedure Execution Security
10. Data Security using Views
11. Tool Security - PRODUCT_USER_PROFILE Table
12. Obtaining Security Information from the Data Dictionary
13. Glossary of Terms
App e ndix 1 - Common System Privileges
Appendix 2 - SYSDBA and SYSOPER Privileges
Appendix 3 - SQL commands which can be disabled
About the Author
Preface and Audience
The subject of security in Oracle is central to the safe use of this enterprise-grade database and the integrity of the data it contains, thus Oracle provides a sophisticated range of methods for managing both data security and user privilege. Consequently this methodology is the subject of this Oracle Quick Guide volume.
As in other databases, the term security
has several facets. It refers to the limits of the data a user can see and manipulate. However, the term database security
also refers to the limitation of user actions in what we refer to as their privileges
.
In both cases a user
may be an end-user of varying rank and privilege working with an application using an Oracle database. However, it may also refer to a software developer, a system administrator, an application support user and indeed even the system owner and their DBA team. All such users have widely varying needs in terms of what data they can and need to see and what privileges they are granted by a database owner.
Oracle Quick Guides: Oracle Quick Guides is a series of quick learning guides for Oracle designers, developers and system managers.
Guide Audience: These guides are designed to rapidly deliver key information about Oracle to the following audience groups:
- Project Managers, Team Leaders and Testers who are new to Oracle and need rapid access to strategic information about the Oracle development environment.
- Business Analysts, Designers and Software Developers who are new to Oracle and need to make a first step in gaining a detailed understanding of the design and development issues involved in Oracle.
- New entrant Oracle DBAs that need a rapid induction in Oracle database administration.
Guide Contents: Oracle Quick G uides have been divided by subject matter. They become increasingly complex and more specific the later the volume. Thus the early volumes are quite general but later volumes are more technical and specific.
Our Objective: There are plenty of Oracle textbooks and user manuals on the market. Most of them are huge and only partly relevant to a particular group of readers. Therefore we decided to divide the subject into smaller, more targeted volumes in order that you only get the information YOU actually need.
For example, a project m anager doesn't need to know about some of the more esoteric programming tips, but will need to know some of the strategic issues affecting design an d testing. In a similar way, a p rogrammer is much more interested in the syntactic details of a piece of software than in the strategic issues affecting the choice of an Oracle upgrade path.
And so we have targeted these guides at particular groups with specific interests whilst trying to avoid overloading readers with too much detail or extraneous material.
Assumptions: We assume that the reader will be using Oracle 9i, 10g or 11g, although most of the material may apply equally to earlier versions of the Oracle RDBMS.
1. Oracle Database Security Architecture
1.1 Introduction
Oracle provides an extremely secure, flexible and granular system of database security and privilege which is unsurpassed in the world of relational databases.
The central concept in Oracle database security is the Oracle user. Whether you are a DBA, a developer or an end-user, whether you access an Oracle database using command line SQL, or are an application user accessing a backend Oracle database via a public website, you always address an Oracle database as a particular Oracle user.
Oracle users are allocated very specific data, object and system privileges when the user is created and these privileges define the extent of what that Oracle user can see or do within a particular Oracle database.
These aspects of database security are managed in Oracle by associating a user with particular data, object and system privilege s by a security administrator or DBA. W e will discuss these concepts in more detail in the remainder of this chapter.
Data Security Privileges: The concept of an Oracle user is obviously just a part of the picture of Oracle security. Oracle data security architecture deals with access to the database objects
which are being secured, i.e. the database tables and their rows of data and how a particular user may create, view or alter this data. Clearly, not all users have the same access to all data and not all users may manipulate data in the same way. For instance, a manager may see or alter almost everything, whereas a customer may see or alter just a fraction of the data relevant to them.
Database Object Privileges: In a similar way, not all users have the same rights over the database itself. A DBA user may be able to create a database object such as a table or index, whereas a developer or ordinary user generally would not have such powerful system privileges.
1.2 Overview of th e Oracle Security Architecture
The following are the key concepts used in the Oracle Security Architecture. Here we introduce these concepts and later we will define exactly how they are used.
1.2.1 The DBA: A DBA is a special user created by the system owner. A DBA user (and there may