SlideShare a Scribd company logo
Oracle8i™ Release 8.1.6 New Security Features 
Summary 
Features Overview 
November 1999 
INTRODUCTION 
Oracle8i Release 8.1.6 is the first maintenance release of the Oracle8i database, including many 
bug fixes, performance improvements, and feature enhancements. However, this release also 
includes several critical security new features that are noteworthy. The enhancements and new 
features in release 8.1.6 can be categorized as: 
·  Oracle8i Improvements 
·  Oracle Advanced Security Improvements 
ORACLE8i IMPROVEMENTS 
The main focus of Release 8.1.6 is to maintain stability and improve on quality, performance, and 
installation/configuration and management of the Oracle8i database server. Oracle has also added 
specific enhancements to improve the security and user management capabilities of the Oracle8i 
server. 
STORED DATA ENCRYPTION 
The growth of electronic commerce has resulted in an increase in the storage of highly sensitive 
information, such as credit card numbers, in the database. Countries with strict national privacy 
laws are often required to prevent national identity numbers from being viewed, even by DBAs or 
other “trusted” users. Companies with trade secrets, such as industrial formulas, may wish to
zealously guard these valuable assets. Applications for which users are not database users may 
wish to store “application user” passwords, or session cookies, in encrypted form in the database. 
Most issues of data security can be handled by Oracle8i’s authentication and access control 
mechanisms, ensuring that only properly identified and authorized users can access data. Data in 
the database, however, cannot normally be secured against the database administrator's access, 
since a DBA has all privileges. 
For applications with special requirements to secure sensitive data from view, even from DBAs, 
Oracle8i release 8.1.6 provides a PL/SQL package to encrypt (and decrypt) data, including string 
inputs and raw inputs, using the industry-standard Data Encryption Standard (DES), in exportable 
keylengths. 
The ability to natively encrypt data in the server enables applications to guard their especially 
sensitive data. Furthermore, developers need no long “roll their own” encryption using algorithms 
they craft themselves, or download from the Internet. 
VIRTUAL PRIVATE DATABASE ENHANCEMENTS 
Oracle8i introduced the Virtual Private Database, which provides server-enforced, fine-grained 
access control. Because the Virtual Private Database provides server-enforced security, it cannot 
be bypassed by users accessing data directly, or using another application. The application context 
feature can be used to improve the performance of Virtual Private Database by functioning as a 
secure data cache. Application context has been enhanced in Release 8.1.6 so that additional 
attributes, including external name, proxy user and userid, protocol, port number, and full DN 
(distinguished name) from an X.509 certificate, are now accessible and can be used to limit access 
to data. For example, you could use the OU (Organizational Unit) component of a DN to limit 
users to viewing their own organization’s records only.
ORACLE ADVANCED SECURITY IMPROVEMENTS 
Oracle Advanced Security has improved configuration and management tools to simplify security 
management. Oracle Advanced Security also provides new forms of network encryption, to ensure 
the security of all protocols accessing the Oracle8i database, and enhanced single sign-on. 
NETWORK SECURITY ENHANCEMENTS 
Release 8.1.6 enhances Oracle’s support for the SSL (Secure Sockets Layer) standard. SSL 
encryption for Internet Intra-ORB Protocol (IIOP) communications is now available, enabling 
secure Enterprise Java Beans (EJBs). Also, a Java version of the Oracle Advanced Security 
encryption libraries is now available to secure thin JDBC connections. The Java implementation of 
Oracle Advanced Security provides DES encryption, with anonymous Diffie-Hellman key 
exchange, in 100% Java. 
Oracle Advanced Security thus secures all protocols into the Oracle8i database, whether IIOP, 
thick or thin JDBC, or Net8. 
Oracle Advanced Security has also completed the operational testing phase of FIPS-140 level 2 
(Federal Information Processing Standard) certification, a United States government standard that 
relates to the security of cryptographic products. Completion of the FIPS-140 certification, which 
is expected in Q4 1999, is required by many organizations, among them the United States 
government and many financial institutions. 
SINGLE SIGN-ON 
Oracle Advanced Security already supports many forms of single sign-on for database users, 
among them Kerberos, SESAME, and DCE. Release 8.1.6 adds support for SSL-based single 
sign-on.
PKI Credential Management 
Oracle Wallet Manager provides secure management of PKI (public key infrastructure)-based user 
credentials. Oracle Wallet Manager creates a private and public key pair for a user, and issues a 
PKCS#10 certificate signing request which can be fulfilled by a Certificate Authority (CA). After 
the CA issues an X.509 certificate, the user can load the certificate into his wallet. Oracle Wallet 
Manager also manages user trustpoints, the list of root certificates that the user trusts, and is pre-configured 
with root certificates from PKI vendors such as VeriSign and Cybertrust. Wallets are 
protected using password-based, strong encryption. 
In most cases, a user need never access a wallet once it has been configured, but can easily access 
his wallet using Oracle Enterprise Login Assistant, a very simple-to-use login tool that hides the 
complexity of a private key and certificate from users. Once users have securely opened their 
wallets, they can then connect to multiple databases over SSL, without providing additional 
passwords. This provides the benefit of strong authentication as well as single sign-on. 
SSL for single sign-on can be used alone, or in conjunction with enterprise user management, 
described below. 
ENTERPRISE USER MANAGEMENT 
Enterprises today face tremendous challenges in managing information about users, keeping user 
information current, and securing access to all the information in an enterprise. Each user may 
have multiple accounts on different databases, requiring her to remember passwords for each of 
these accounts. Users not only have too many passwords, but there are too many accounts for 
administrators to manage. Furthermore, the lack of centralization is a security risk, because old or 
unused accounts and privileges can be misused. 
To address these challenges, Release 8.1.6 introduces enterprise user management. Enterprise users 
and their authorizations are managed in Oracle Internet Directory, an LDAP-based directory 
service, using Oracle Enterprise Security Manager, a tool accessible through Oracle Enterprise 
Manager.
Enterprise users can be assigned enterprise roles (which are containers of database-specific global 
roles), that determine their access privileges in databases. For example, the enterprise role CLERK 
could contain the global role HRCLERK on the Human Resources database, and the global role 
ANALYST on the Payroll database. An enterprise role can be granted or revoked to one or more 
enterprise users. For example, an administrator could grant the enterprise role CLERK to a number 
of enterprise users who hold the same job. This information about users and roles is protected in 
the directory through Access Control Lists, ensuring that only a privileged administrator can 
manage users, and grant and revoke roles. 
USER/SCHEMA SEPARATION 
In general, users do not need their own accounts - or their own schemas - in a database, they 
merely need to access an application schema. For example, users John, Firuzeh and Jane are all 
users of the Payroll application, and they need access to the Payroll schema on the Finance 
database. None of them needs to create his or her own objects in the database; in fact, they need 
only access Payroll objects. 
Release 8.1.6 allows you to separate users from schemas, so that many enterprise users can access 
a single, shared application schema. Instead of creating a user account (that is, a user schema) in 
each database a user needs to access, you need only create an enterprise user in the directory, and 
“point” the user at a shared schema that many other enterprise users can also access. For example, 
if John, Firuzeh and Jane all access the Sales database, you need only create a single schema, e.g. 
‘sales_application’ which all three users can access, instead of creating an account for each user on 
the Sales database. 
Now, you can truly create an enterprise user once, in the directory, who nonetheless can access 
multiple databases using only the privileges she needs to perform her job, thus lowering the cost of 
managing users in an enterprise. Another benefit of schema-independent users is that you can 
manage many more users than could otherwise be done with users tied to individual database 
accounts. Schema-independent users thus enables scalability of user management for the Internet.
Oracle’s LDAP version 3-compliant directory server, Oracle Internet Directory, is fully integrated 
with Oracle8i and supports “off-the-shelf” enterprise user management. Other LDAP directories, 
including Novell Directory Service (NDS) and Microsoft’s Active Directory for Windows 2000 
will be certified to operate with enterprise user management. 
ENTRUST INTEGRATION 
Entrust Technologies, Inc. is a market-leading provider of Public Key Infrastructure (PKI) 
solutions, through their Entrust/PKI software. Entrust/PKI includes many products, such as 
Entrust Profile, which secures users’ PKI credentials, and Entrust Authority, Entrust’s certificate 
authority product. 
Oracle is making specific product modifications to Oracle Advanced Security to enable customers 
of both Oracle and Entrust to incorporate Entrust-based single sign-on into their Oracle 
applications. By integrating with Entrust/PKI, Oracle enhances its ability to provide X.509-based 
single sign-on to large customers who require the extensive key management, certificate revocation, 
and other features which Entrust provides. 
Oracle will implement support for Entrust/PKI in Oracle Advanced Security release 8.1.6, enabling 
customers to use Entrust Profile, Entrust’s “wallet” mechanism, for storage of certificate and 
private keys, and for secure credential management. Instead of accessing user credentials (private 
key and certificate) from an Oracle wallet, Oracle Advanced Security accesses a user’s Entrust 
Profile for authentication and single sign-on. 
Entrust integration will require both release 8.1.6 of Oracle Advanced Security and Entrust 
Authority 5. Production use of this feature will be available shortly after general availability of 
Oracle Advanced Security release 8.1.6.
RELEASE 8.1.6 NEW FEATURES 
ORACLE8I IMPROVEMENTS 
·  Encrypt/decrypt package in PL/SQL 
·  New application context primitives for access control 
ORACLE ADVANCED SECURITY IMPROVEMENTS 
Network Security 
·  Single sign-on over SSL 
·  SSL for IIOP 
·  100% Java encryption for “thin” JDBC 
·  FIPS-140 level 2 certification (in-process) 
User Management 
·  Enterprise user management 
·  Schema-independent users 
·  Oracle Enterprise Security Manager 
Single Sign-On 
·  Single sign-on over SSL 
·  Oracle Enterprise Login Assistant 
·  Oracle Wallet Manager for credential management 
·  Entrust/PKI integration
Oracle Corporation 
World Headquarters 
500 Oracle Parkway 
Redwood Shores, CA 94065 
U.S.A. 
Worldwide Inquiries: 
+1.650.506.7000 
Fax +1.650.506.7200 
http://www.oracle.com/ 
Copyright © Oracle Corporation 1999 
All Rights Reserved 
This document is provided for informational purposes only, and 
the information herein is subject to change without notice. 
Please report any errors herein to Oracle Corporation. Oracle 
Corporation does not provide any warranties covering and 
specifically disclaims any liability in connection with this 
document. 
Oracle is a registered trademark, and Oracle8i, Oracle8i 
Enterprise Edition, Oracle8i Personal Edition, Oracle8i Lite, Net8, 
and PL/SQL are trademarks of Oracle Corporation. 
All other company and product names mentioned are used for 
identification purposes only and may be trademarks of their 
respective owners.

More Related Content

What's hot (16)

PPSX
Polling system solution using blockchain & Liferay
Dhanraj Dadhich
 
PPTX
Oracle Identity Manager Basics
Chekka Venkateshwar Rao
 
PDF
The Enterprise File Fabric for Memset
Hybrid Cloud
 
PPTX
Enterprise & Web based Federated Identity Management & Data Access Controls
Kingsley Uyi Idehen
 
PDF
Ces70 salesforce2 connectorguide
Kalpesh More
 
PPTX
Virtuoso Platform Overview
Kingsley Uyi Idehen
 
PPTX
Presentation- on OIM
Tamim Khan
 
PPT
Introduction to Oracle
Achmad Solichin
 
PDF
Oracle Access Manager Overview
guestf6dc99b
 
PDF
Material modulo02 asf6501(6425-b_01)
JSantanderQ
 
PDF
Elements_Architecture_and_Technology.pdf
Jeff Smith
 
PPT
Case Study: University of California, Berkeley and San Francisco
ForgeRock
 
PDF
Material modulo01 asf6501(6419-a_01)
JSantanderQ
 
PDF
The Enterprise File Fabric for Vecima MediaScaleX
Hybrid Cloud
 
PPTX
Understanding Data
Kingsley Uyi Idehen
 
PPTX
SPSCT15 - Must Love Term Sets: The New and Improved Managed Metadata Service ...
Jonathan Ralton
 
Polling system solution using blockchain & Liferay
Dhanraj Dadhich
 
Oracle Identity Manager Basics
Chekka Venkateshwar Rao
 
The Enterprise File Fabric for Memset
Hybrid Cloud
 
Enterprise & Web based Federated Identity Management & Data Access Controls
Kingsley Uyi Idehen
 
Ces70 salesforce2 connectorguide
Kalpesh More
 
Virtuoso Platform Overview
Kingsley Uyi Idehen
 
Presentation- on OIM
Tamim Khan
 
Introduction to Oracle
Achmad Solichin
 
Oracle Access Manager Overview
guestf6dc99b
 
Material modulo02 asf6501(6425-b_01)
JSantanderQ
 
Elements_Architecture_and_Technology.pdf
Jeff Smith
 
Case Study: University of California, Berkeley and San Francisco
ForgeRock
 
Material modulo01 asf6501(6419-a_01)
JSantanderQ
 
The Enterprise File Fabric for Vecima MediaScaleX
Hybrid Cloud
 
Understanding Data
Kingsley Uyi Idehen
 
SPSCT15 - Must Love Term Sets: The New and Improved Managed Metadata Service ...
Jonathan Ralton
 

Viewers also liked (8)

PDF
801 קיץ ב 2008
bagrutonline
 
DOCX
800&400 meters 2º secciones
MariaMontoya810
 
PDF
קו למושב, גיליון 819 - 23/1/14
eshaki
 
PDF
קו למושב, גיליון 816 - 02/01/2014
eshaki
 
DOCX
план недели 8 декабря2014 г.
bukish
 
PDF
3Q10 Results Conference Call
Kianne Paganini
 
PDF
YAMAHA XS 400 1982 - service manual_chapter3_engine_overhaul_part2
YamahaXS400
 
PDF
YAMAHA XS 400 1982 - service manual_chapter3_engine_overhaul_part3
YamahaXS400
 
801 קיץ ב 2008
bagrutonline
 
800&400 meters 2º secciones
MariaMontoya810
 
קו למושב, גיליון 819 - 23/1/14
eshaki
 
קו למושב, גיליון 816 - 02/01/2014
eshaki
 
план недели 8 декабря2014 г.
bukish
 
3Q10 Results Conference Call
Kianne Paganini
 
YAMAHA XS 400 1982 - service manual_chapter3_engine_overhaul_part2
YamahaXS400
 
YAMAHA XS 400 1982 - service manual_chapter3_engine_overhaul_part3
YamahaXS400
 
Ad

Similar to 8.1.6 newsecurity features (20)

PDF
8 isecurity database
Anil Pandey
 
DOCX
Sso & rman
vishaalkumar11
 
PDF
Security in oracle
ssuser40bb47
 
PDF
security in oracle database
ssuser40bb47
 
PPTX
What_to_expect_from_oracle_database_12c
Maria Colgan
 
PDF
oracle
tarunamoria
 
PDF
oracle-database-editions-wp-12c-1896124
Arjun Sathe
 
DOCX
How to protect your sensitive data using oracle database vault / Creating and...
Anar Godjaev
 
PDF
Oracle Identity Management Leveraging Oracle’s Engineered Systems
GregOracle
 
PDF
Securing Oracle Database 12c
Inprise Group
 
PDF
Oracle oracle database 11g product family
Sid Xing
 
PDF
Oracle Database 11g Product Family
N/A
 
PDF
Best Practices in Implementing Oracle Database Security Products
Estuate, Inc.
 
PDF
Oracle database 12c security and compliance
FITSFSd
 
PPTX
PCI Compliance: How to Remain Compliant and Gain Near Real-Time Analytics on ...
Emtec Inc.
 
PDF
8 i internet_security
Anil Pandey
 
DOCX
how to protect your sensitive data using oracle database vault
Anar Godjaev
 
PDF
Active Directory Proposal
MJ Ferdous
 
PDF
The Benefits of Having a Data Privacy Vault Tech domain news.pdf
Domain News Tech
 
DOCX
A introduction to oracle data integrator
chkamal
 
8 isecurity database
Anil Pandey
 
Sso & rman
vishaalkumar11
 
Security in oracle
ssuser40bb47
 
security in oracle database
ssuser40bb47
 
What_to_expect_from_oracle_database_12c
Maria Colgan
 
oracle
tarunamoria
 
oracle-database-editions-wp-12c-1896124
Arjun Sathe
 
How to protect your sensitive data using oracle database vault / Creating and...
Anar Godjaev
 
Oracle Identity Management Leveraging Oracle’s Engineered Systems
GregOracle
 
Securing Oracle Database 12c
Inprise Group
 
Oracle oracle database 11g product family
Sid Xing
 
Oracle Database 11g Product Family
N/A
 
Best Practices in Implementing Oracle Database Security Products
Estuate, Inc.
 
Oracle database 12c security and compliance
FITSFSd
 
PCI Compliance: How to Remain Compliant and Gain Near Real-Time Analytics on ...
Emtec Inc.
 
8 i internet_security
Anil Pandey
 
how to protect your sensitive data using oracle database vault
Anar Godjaev
 
Active Directory Proposal
MJ Ferdous
 
The Benefits of Having a Data Privacy Vault Tech domain news.pdf
Domain News Tech
 
A introduction to oracle data integrator
chkamal
 
Ad

More from Anil Pandey (20)

PDF
26 bg2020
Anil Pandey
 
PDF
National health policy_2017
Anil Pandey
 
PDF
Class 3-computer-pt3-rev-ws-56
Anil Pandey
 
PDF
Class 3-social-pt3-rev-ws-for-uploading
Anil Pandey
 
PDF
Class 3-science-pt3-rev-ws-for-uploading
Anil Pandey
 
PDF
Class 3-math-pt3-rev-ws-for-uploading
Anil Pandey
 
PDF
Class 3-hindi-pt3-rev-ws-for-uploading
Anil Pandey
 
PDF
Class 3-english-pt3-rev-ws-for-uploading
Anil Pandey
 
PDF
Art of indexing_in_o8i
Anil Pandey
 
PDF
Apps session wait_tables
Anil Pandey
 
PDF
Application sql issues_and_tuning
Anil Pandey
 
PDF
Appliance whitepaper 8_i
Anil Pandey
 
PDF
Appd2 cg
Anil Pandey
 
PDF
A85248
Anil Pandey
 
PDF
35 dbatune3
Anil Pandey
 
PDF
9ias
Anil Pandey
 
PDF
9i lin relnotes
Anil Pandey
 
PDF
9i hp relnotes
Anil Pandey
 
PDF
8i r3 nfs
Anil Pandey
 
PDF
8iliteds
Anil Pandey
 
26 bg2020
Anil Pandey
 
National health policy_2017
Anil Pandey
 
Class 3-computer-pt3-rev-ws-56
Anil Pandey
 
Class 3-social-pt3-rev-ws-for-uploading
Anil Pandey
 
Class 3-science-pt3-rev-ws-for-uploading
Anil Pandey
 
Class 3-math-pt3-rev-ws-for-uploading
Anil Pandey
 
Class 3-hindi-pt3-rev-ws-for-uploading
Anil Pandey
 
Class 3-english-pt3-rev-ws-for-uploading
Anil Pandey
 
Art of indexing_in_o8i
Anil Pandey
 
Apps session wait_tables
Anil Pandey
 
Application sql issues_and_tuning
Anil Pandey
 
Appliance whitepaper 8_i
Anil Pandey
 
Appd2 cg
Anil Pandey
 
A85248
Anil Pandey
 
35 dbatune3
Anil Pandey
 
9i lin relnotes
Anil Pandey
 
9i hp relnotes
Anil Pandey
 
8i r3 nfs
Anil Pandey
 
8iliteds
Anil Pandey
 

Recently uploaded (20)

PPTX
Presentation about Database and Database Administrator
abhishekchauhan86963
 
PDF
AI Software Engineering based on Multi-view Modeling and Engineering Patterns
Hironori Washizaki
 
PDF
ChatPharo: an Open Architecture for Understanding How to Talk Live to LLMs
ESUG
 
PPTX
TRAVEL APIs | WHITE LABEL TRAVEL API | TOP TRAVEL APIs
philipnathen82
 
PDF
advancepresentationskillshdhdhhdhdhdhhfhf
jasmenrojas249
 
PDF
AWS_Agentic_AI_in_Indian_BFSI_A_Strategic_Blueprint_for_Customer.pdf
siddharthnetsavvies
 
PDF
Enhancing Security in VAST: Towards Static Vulnerability Scanning
ESUG
 
PDF
SAP GUI Installation Guide for macOS (iOS) | Connect to SAP Systems on Mac
SAP Vista, an A L T Z E N Company
 
PDF
Salesforce Pricing Update 2025: Impact, Strategy & Smart Cost Optimization wi...
GetOnCRM Solutions
 
PPTX
Chess King 25.0.0.2500 With Crack Full Free Download
cracked shares
 
PDF
Using licensed Data Loss Prevention (DLP) as a strategic proactive data secur...
Q-Advise
 
PDF
Infrastructure planning and resilience - Keith Hastings.pptx.pdf
Safe Software
 
PDF
Step-by-Step Guide to Install SAP HANA Studio | Complete Installation Tutoria...
SAP Vista, an A L T Z E N Company
 
PDF
Summary Of Odoo 18.1 to 18.4 : The Way For Odoo 19
CandidRoot Solutions Private Limited
 
PDF
Why Are More Businesses Choosing Partners Over Freelancers for Salesforce.pdf
Cymetrix Software
 
PDF
How to Download and Install ADT (ABAP Development Tools) for Eclipse IDE | SA...
SAP Vista, an A L T Z E N Company
 
PDF
Protecting the Digital World Cyber Securit
dnthakkar16
 
PPTX
Web Testing.pptx528278vshbuqffqhhqiwnwuq
studylike474
 
PDF
Virtual Threads in Java: A New Dimension of Scalability and Performance
Tier1 app
 
PDF
Download iTop VPN Free 6.1.0.5882 Crack Full Activated Pre Latest 2025
imang66g
 
Presentation about Database and Database Administrator
abhishekchauhan86963
 
AI Software Engineering based on Multi-view Modeling and Engineering Patterns
Hironori Washizaki
 
ChatPharo: an Open Architecture for Understanding How to Talk Live to LLMs
ESUG
 
TRAVEL APIs | WHITE LABEL TRAVEL API | TOP TRAVEL APIs
philipnathen82
 
advancepresentationskillshdhdhhdhdhdhhfhf
jasmenrojas249
 
AWS_Agentic_AI_in_Indian_BFSI_A_Strategic_Blueprint_for_Customer.pdf
siddharthnetsavvies
 
Enhancing Security in VAST: Towards Static Vulnerability Scanning
ESUG
 
SAP GUI Installation Guide for macOS (iOS) | Connect to SAP Systems on Mac
SAP Vista, an A L T Z E N Company
 
Salesforce Pricing Update 2025: Impact, Strategy & Smart Cost Optimization wi...
GetOnCRM Solutions
 
Chess King 25.0.0.2500 With Crack Full Free Download
cracked shares
 
Using licensed Data Loss Prevention (DLP) as a strategic proactive data secur...
Q-Advise
 
Infrastructure planning and resilience - Keith Hastings.pptx.pdf
Safe Software
 
Step-by-Step Guide to Install SAP HANA Studio | Complete Installation Tutoria...
SAP Vista, an A L T Z E N Company
 
Summary Of Odoo 18.1 to 18.4 : The Way For Odoo 19
CandidRoot Solutions Private Limited
 
Why Are More Businesses Choosing Partners Over Freelancers for Salesforce.pdf
Cymetrix Software
 
How to Download and Install ADT (ABAP Development Tools) for Eclipse IDE | SA...
SAP Vista, an A L T Z E N Company
 
Protecting the Digital World Cyber Securit
dnthakkar16
 
Web Testing.pptx528278vshbuqffqhhqiwnwuq
studylike474
 
Virtual Threads in Java: A New Dimension of Scalability and Performance
Tier1 app
 
Download iTop VPN Free 6.1.0.5882 Crack Full Activated Pre Latest 2025
imang66g
 

8.1.6 newsecurity features

  • 1. Oracle8i™ Release 8.1.6 New Security Features Summary Features Overview November 1999 INTRODUCTION Oracle8i Release 8.1.6 is the first maintenance release of the Oracle8i database, including many bug fixes, performance improvements, and feature enhancements. However, this release also includes several critical security new features that are noteworthy. The enhancements and new features in release 8.1.6 can be categorized as: · Oracle8i Improvements · Oracle Advanced Security Improvements ORACLE8i IMPROVEMENTS The main focus of Release 8.1.6 is to maintain stability and improve on quality, performance, and installation/configuration and management of the Oracle8i database server. Oracle has also added specific enhancements to improve the security and user management capabilities of the Oracle8i server. STORED DATA ENCRYPTION The growth of electronic commerce has resulted in an increase in the storage of highly sensitive information, such as credit card numbers, in the database. Countries with strict national privacy laws are often required to prevent national identity numbers from being viewed, even by DBAs or other “trusted” users. Companies with trade secrets, such as industrial formulas, may wish to
  • 2. zealously guard these valuable assets. Applications for which users are not database users may wish to store “application user” passwords, or session cookies, in encrypted form in the database. Most issues of data security can be handled by Oracle8i’s authentication and access control mechanisms, ensuring that only properly identified and authorized users can access data. Data in the database, however, cannot normally be secured against the database administrator's access, since a DBA has all privileges. For applications with special requirements to secure sensitive data from view, even from DBAs, Oracle8i release 8.1.6 provides a PL/SQL package to encrypt (and decrypt) data, including string inputs and raw inputs, using the industry-standard Data Encryption Standard (DES), in exportable keylengths. The ability to natively encrypt data in the server enables applications to guard their especially sensitive data. Furthermore, developers need no long “roll their own” encryption using algorithms they craft themselves, or download from the Internet. VIRTUAL PRIVATE DATABASE ENHANCEMENTS Oracle8i introduced the Virtual Private Database, which provides server-enforced, fine-grained access control. Because the Virtual Private Database provides server-enforced security, it cannot be bypassed by users accessing data directly, or using another application. The application context feature can be used to improve the performance of Virtual Private Database by functioning as a secure data cache. Application context has been enhanced in Release 8.1.6 so that additional attributes, including external name, proxy user and userid, protocol, port number, and full DN (distinguished name) from an X.509 certificate, are now accessible and can be used to limit access to data. For example, you could use the OU (Organizational Unit) component of a DN to limit users to viewing their own organization’s records only.
  • 3. ORACLE ADVANCED SECURITY IMPROVEMENTS Oracle Advanced Security has improved configuration and management tools to simplify security management. Oracle Advanced Security also provides new forms of network encryption, to ensure the security of all protocols accessing the Oracle8i database, and enhanced single sign-on. NETWORK SECURITY ENHANCEMENTS Release 8.1.6 enhances Oracle’s support for the SSL (Secure Sockets Layer) standard. SSL encryption for Internet Intra-ORB Protocol (IIOP) communications is now available, enabling secure Enterprise Java Beans (EJBs). Also, a Java version of the Oracle Advanced Security encryption libraries is now available to secure thin JDBC connections. The Java implementation of Oracle Advanced Security provides DES encryption, with anonymous Diffie-Hellman key exchange, in 100% Java. Oracle Advanced Security thus secures all protocols into the Oracle8i database, whether IIOP, thick or thin JDBC, or Net8. Oracle Advanced Security has also completed the operational testing phase of FIPS-140 level 2 (Federal Information Processing Standard) certification, a United States government standard that relates to the security of cryptographic products. Completion of the FIPS-140 certification, which is expected in Q4 1999, is required by many organizations, among them the United States government and many financial institutions. SINGLE SIGN-ON Oracle Advanced Security already supports many forms of single sign-on for database users, among them Kerberos, SESAME, and DCE. Release 8.1.6 adds support for SSL-based single sign-on.
  • 4. PKI Credential Management Oracle Wallet Manager provides secure management of PKI (public key infrastructure)-based user credentials. Oracle Wallet Manager creates a private and public key pair for a user, and issues a PKCS#10 certificate signing request which can be fulfilled by a Certificate Authority (CA). After the CA issues an X.509 certificate, the user can load the certificate into his wallet. Oracle Wallet Manager also manages user trustpoints, the list of root certificates that the user trusts, and is pre-configured with root certificates from PKI vendors such as VeriSign and Cybertrust. Wallets are protected using password-based, strong encryption. In most cases, a user need never access a wallet once it has been configured, but can easily access his wallet using Oracle Enterprise Login Assistant, a very simple-to-use login tool that hides the complexity of a private key and certificate from users. Once users have securely opened their wallets, they can then connect to multiple databases over SSL, without providing additional passwords. This provides the benefit of strong authentication as well as single sign-on. SSL for single sign-on can be used alone, or in conjunction with enterprise user management, described below. ENTERPRISE USER MANAGEMENT Enterprises today face tremendous challenges in managing information about users, keeping user information current, and securing access to all the information in an enterprise. Each user may have multiple accounts on different databases, requiring her to remember passwords for each of these accounts. Users not only have too many passwords, but there are too many accounts for administrators to manage. Furthermore, the lack of centralization is a security risk, because old or unused accounts and privileges can be misused. To address these challenges, Release 8.1.6 introduces enterprise user management. Enterprise users and their authorizations are managed in Oracle Internet Directory, an LDAP-based directory service, using Oracle Enterprise Security Manager, a tool accessible through Oracle Enterprise Manager.
  • 5. Enterprise users can be assigned enterprise roles (which are containers of database-specific global roles), that determine their access privileges in databases. For example, the enterprise role CLERK could contain the global role HRCLERK on the Human Resources database, and the global role ANALYST on the Payroll database. An enterprise role can be granted or revoked to one or more enterprise users. For example, an administrator could grant the enterprise role CLERK to a number of enterprise users who hold the same job. This information about users and roles is protected in the directory through Access Control Lists, ensuring that only a privileged administrator can manage users, and grant and revoke roles. USER/SCHEMA SEPARATION In general, users do not need their own accounts - or their own schemas - in a database, they merely need to access an application schema. For example, users John, Firuzeh and Jane are all users of the Payroll application, and they need access to the Payroll schema on the Finance database. None of them needs to create his or her own objects in the database; in fact, they need only access Payroll objects. Release 8.1.6 allows you to separate users from schemas, so that many enterprise users can access a single, shared application schema. Instead of creating a user account (that is, a user schema) in each database a user needs to access, you need only create an enterprise user in the directory, and “point” the user at a shared schema that many other enterprise users can also access. For example, if John, Firuzeh and Jane all access the Sales database, you need only create a single schema, e.g. ‘sales_application’ which all three users can access, instead of creating an account for each user on the Sales database. Now, you can truly create an enterprise user once, in the directory, who nonetheless can access multiple databases using only the privileges she needs to perform her job, thus lowering the cost of managing users in an enterprise. Another benefit of schema-independent users is that you can manage many more users than could otherwise be done with users tied to individual database accounts. Schema-independent users thus enables scalability of user management for the Internet.
  • 6. Oracle’s LDAP version 3-compliant directory server, Oracle Internet Directory, is fully integrated with Oracle8i and supports “off-the-shelf” enterprise user management. Other LDAP directories, including Novell Directory Service (NDS) and Microsoft’s Active Directory for Windows 2000 will be certified to operate with enterprise user management. ENTRUST INTEGRATION Entrust Technologies, Inc. is a market-leading provider of Public Key Infrastructure (PKI) solutions, through their Entrust/PKI software. Entrust/PKI includes many products, such as Entrust Profile, which secures users’ PKI credentials, and Entrust Authority, Entrust’s certificate authority product. Oracle is making specific product modifications to Oracle Advanced Security to enable customers of both Oracle and Entrust to incorporate Entrust-based single sign-on into their Oracle applications. By integrating with Entrust/PKI, Oracle enhances its ability to provide X.509-based single sign-on to large customers who require the extensive key management, certificate revocation, and other features which Entrust provides. Oracle will implement support for Entrust/PKI in Oracle Advanced Security release 8.1.6, enabling customers to use Entrust Profile, Entrust’s “wallet” mechanism, for storage of certificate and private keys, and for secure credential management. Instead of accessing user credentials (private key and certificate) from an Oracle wallet, Oracle Advanced Security accesses a user’s Entrust Profile for authentication and single sign-on. Entrust integration will require both release 8.1.6 of Oracle Advanced Security and Entrust Authority 5. Production use of this feature will be available shortly after general availability of Oracle Advanced Security release 8.1.6.
  • 7. RELEASE 8.1.6 NEW FEATURES ORACLE8I IMPROVEMENTS · Encrypt/decrypt package in PL/SQL · New application context primitives for access control ORACLE ADVANCED SECURITY IMPROVEMENTS Network Security · Single sign-on over SSL · SSL for IIOP · 100% Java encryption for “thin” JDBC · FIPS-140 level 2 certification (in-process) User Management · Enterprise user management · Schema-independent users · Oracle Enterprise Security Manager Single Sign-On · Single sign-on over SSL · Oracle Enterprise Login Assistant · Oracle Wallet Manager for credential management · Entrust/PKI integration
  • 8. Oracle Corporation World Headquarters 500 Oracle Parkway Redwood Shores, CA 94065 U.S.A. Worldwide Inquiries: +1.650.506.7000 Fax +1.650.506.7200 http://www.oracle.com/ Copyright © Oracle Corporation 1999 All Rights Reserved This document is provided for informational purposes only, and the information herein is subject to change without notice. Please report any errors herein to Oracle Corporation. Oracle Corporation does not provide any warranties covering and specifically disclaims any liability in connection with this document. Oracle is a registered trademark, and Oracle8i, Oracle8i Enterprise Edition, Oracle8i Personal Edition, Oracle8i Lite, Net8, and PL/SQL are trademarks of Oracle Corporation. All other company and product names mentioned are used for identification purposes only and may be trademarks of their respective owners.