EasyManua.ls Logo

Oracle Database B10772-01 - Page 12

Default Icon
518 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
xii
Considerations for Choosing Authentication Types between Clients, Databases, and
Directories for Enterprise User Security................................................................................ 11-28
12 Enterprise User Security Configuration Tasks and Troubleshooting
Enterprise User Security Configuration Overview..................................................................... 12-1
Enterprise User Security Configuration Roadmap..................................................................... 12-4
Preparing the Directory for Enterprise User Security................................................................ 12-5
Configuring Enterprise User Security Objects in the Database and the Directory ........... 12-11
Configuring Enterprise User Security for Password Authentication ................................... 12-16
Configuring Enterprise User Security for Kerberos Authentication .................................... 12-18
Configuring Enterprise User Security for SSL Authentication.............................................. 12-21
Viewing the Database DN in the Wallet and in the Directory........................................... 12-24
Enabling Current User Database Links...................................................................................... 12-25
Troubleshooting Enterprise User Security................................................................................. 12-26
ORA-# Errors for Password-Authenticated Enterprise Users............................................ 12-26
ORA-# Errors for Kerberos-Authenticated Enterprise Users............................................. 12-29
ORA-# Errors for SSL-Authenticated Enterprise Users ...................................................... 12-32
NO-GLOBAL-ROLES Checklist ............................................................................................. 12-33
USER-SCHEMA ERROR Checklist........................................................................................ 12-34
DOMAIN-READ-ERROR Checklist ...................................................................................... 12-35
13 Administering Enterprise User Security
Enterprise User Security Administration Tools Overview....................................................... 13-2
Administering Identity Management Realms ............................................................................ 13-3
Identity Management Realm Versions .................................................................................... 13-4
Setting Properties of an Identity Management Realm .......................................................... 13-5
Setting Login Name, Kerberos Principal Name, User Search Base, and Group Search Base
Identity Management Realm Attributes.................................................................................. 13-5
Setting the Default Database-to-Directory Authentication Type for an Identity Management
Realm ............................................................................................................................................ 13-6
Managing Identity Management Realm Administrators...................................................... 13-7
Administering Enterprise Users..................................................................................................... 13-8
Creating New Enterprise Users................................................................................................ 13-9
Setting Enterprise User Passwords ........................................................................................ 13-10
Defining an Initial Enterprise Role Assignment .................................................................. 13-11

Table of Contents

Related product manuals