Essential Elements of User Security
In Chapter 1, we reviewed the importance of having an appropriate approach to security. Only after understanding why you are protecting what you are protecting can you develop an effective security plan. We also discussed identity preservation and reviewed how the database technology has evolved over the years to support the basic tenets of security.
In this chapter, we shift our focus to the importance of database accounts and how to perform account management efficiently in Oracle Database 12c. Much of what we are about to cover, however, is relevant to all recent supported versions of the database. ...