O'Reilly logo

Oracle® 12c For Dummies® by Michael Wessler, Chris Ruel

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10

Securing and Auditing Your Database

In This Chapter

arrow Verifying identities through authentication

arrow Granting privileges to users

arrow Creating roles

arrow Auditing the database

Security is an especially important concern when dealing with anything relating to computers and the Internet. As an administrator of software applications such as the Oracle database, you are concerned with security because you want to protect your data. Security is vital because you don’t want the wrong people looking at the data and because you need to protect the data from being altered or corrupted. Being able to restrict and monitor the users in the system helps you provide a safe and secure operating environment for you and your customers or clients.

Staying Authentic with Authentication

Authentication is all about making sure your users are who they say they are. This process begins well before users even try to access the database. You need to set up a system or process that allows you to verify users’ identity. You also need a method for users to access the system that both identifies them and restricts ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required