![]() The first step to creating a database application is to ensure that it is properly secure. Appendix P, "Configuring Privilege and Role Authorization" describes how to create and manage user privileges and roles.Īpplication security. You can use privileges and roles to restrict user access to data. Chapter 3, "Configuring Authentication" describes how authentication in Oracle Database works. ![]() For example, you can authenticate users on the database level, from the operating system, and on the network. Oracle Database provides several ways to configure authentication for users and database administrators. Chapter 2, "Managing Security for Oracle Database Users" describes how to manage user accounts.Īuthentication methods. You can also create password profiles to better secure password policies for your site. When you create user accounts, you can secure them in a variety of ways. You can use the default Oracle Database features to configure security in the following areas for your Oracle Database installation:
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |