EasyManua.ls Logo

Oracle Database B10772-01 - Enterprise User Security Configuration Overview; 12 Enterprise User Security Configuration Tasks and Troubleshooting

Default Icon
518 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Enterprise User Security Conguration Tasks and Troubleshooting 12-1
12
Enterprise User Security Configuration
Tasks and Troubleshooting
This chapter describes the sequence of steps involved to configure Enterprise User
Security from the initial database and directory preparation through connecting to
the database as either a password-, Kerberos-, or SSL-authenticated enterprise user.
In addition, a troubleshooting section is also included that will help you when
testing your Enterprise User Security implementation.
This chapter contains the following topics:
Enterprise User Security Configuration Overview
Enterprise User Security Configuration Roadmap
Preparing the Directory for Enterprise User Security
Configuring Enterprise User Security Objects in the Database and the Directory
Configuring Enterprise User Security for Password Authentication
Configuring Enterprise User Security for Kerberos Authentication
Configuring Enterprise User Security for SSL Authentication
Enabling Current User Database Links
Troubleshooting Enterprise User Security
Enterprise User Security Configuration Overview
Configuring Enterprise User Security essentially consists of creating shared schemas
and global roles in databases that you want to be accessible to enterprise users.
Then you configure the identity management realm in the directory to reflect those
database roles and schemas, and, finally, associate directory users with them.

Table of Contents

Related product manuals