Chap3 Notes
Chap3 Notes
ADMINISTRATION OF USERS
Introduction:
This chapter presents an overview of database practices from the point of view of
both management and operations. It also supplies scenarios that broaden understanding of
user administration. The chapter begins with a discussion of the importance of
documentation with respect to user administration and then continues with a presentation
of the user account and login concepts in terms of database prospects followed by step-
by-step instruction on how to put these concepts into practice.
Learning objectives:
Documentation of user administration
Operation system Authentication.
Creating users.
Removing users.
Modify users.
Database, Remote users
Database link
Everything should be documented for two reasons: to provide a paper trail to retrace
exactly what happened when a breach of security occurs; and to ensure administration
consistency. Documentation in this context includes the following.
Administration policies: A detail document should describe guidelines for every task
that is required for all common administrative situations.
Security procedures: This is an outlines of a step-by-step process for performing an
administrative task according to company policies.
Procedure implementation scripts or program: This includes a user’s manual and
operational manual.
Predefined roles description: This provide a full description of all predefined roles,
outlining all tasks for which the role is responsible and the roles relationship to other
roles.
Administration staff and management: This is usually a detailed description of each
administration staff and management position. The document includes an
organization chart.
This process illustration which presents a sample form for a user account application.
3.2 Operation system Authentication:
If a hacker breaks into the operating system through the host machine, the
possibility of that hacker accessing the database residing on the server is high. A tight
grip on the operating system is warranted and essential. Many database management
systems depend on the operating system to authenticate users.
Figure 3-3 presents the ideal authentication enforcement for database application,
the user must be authenticated at each level: the network, the operating system, and the
database system.
IDENTIFIED clause
Oracle10g has three authentication methods. The architecture for authentication of
user provided by oracle10g
By password option
This is one of the options for authentication of database users. Oracle 10g encrypts and
stores an assigned password in the database. Because the password is encrypted, the
password is not visually readable. The encrypted password can be retrieved from the
PASSWORD column in the DBA_USERS
Example
See the script chap_3_password.sql.
Externally option
With this method you can create a user account to be authenticated externally by
the operating system or another authentication process.
QUOTA clause
This clause tells oracle10g how much storage space a user is allowed for a specified
tablespace. This option is used when storage space is scare or to prevent users from
wasting space by retaining unnecessary data.
In the above Figure 3-5,
In Max_Bytes columns
-1 unlimited space
0 no space
PROFILE clause
This clause indicates the profile used for limiting database resource and enforcing
password policies. The default profile is DEFAULT; this profile has no resource
limitation or password restrictions.
Syntax:
SQL> ALTER USER sam PASSWORD EXPIRE
In this SQL statement user sam password is expired, which means that next time sam
tries to log on to enter a new password.
ACCOUNT clause
This option tells Oracle10g to lock (disable) account access when the ACCOUNT LOCK
clause is selected. The selection of ACCOUNT UNLOCK indicates that account is
enabling, which is the default behavior for this clause.
Solution:
For solution see SQL script chap_3_create_user.sql.
When an Oracle10g user account is created, the new user cannot log in to the
account until the database administrator provides the CREATE SESSION system
privilege to allow the account to connect to the database.
Creating an Oracle10g using Database Authentication
The graphical interface of Oracle Enterprise Manger also provides a function for creating
a user. This function is called security Management as show below
Select the users node under the security function and click the create button on the
toolbar on right as shown. When this button is clicked, a dialog box pops up.
I entered
Name EXTERNAL_USER
Profile DEFAULT
Authentication PASSWORD
Enter Password (my password (External)) but can give your own password.
Default Tablespace USER.
Temporary Tablespace TEMP
Status UNLOCK
Click the ok button. The user is created and a message is displayed confirming successful
creation of a user,
If the user does not own any objects, the command is successfully executed.
If the user owns one or more objects an error will be displayed.
This message informs you that if you want to drop a user who owns
objects you must use the CASCADE option as shown below.
Syntax:
DROP USER username CASCADE;
You should never use remote user authentication because it exposes the database to
security violation risks such as unintended or illegal access to the hosted server or
database it.
Authentication Methods
This section describes authentication methods for connection to Oracle10g database using
database link mechanisms.