SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
Oracle Advanced Security: Security and Directory Integration Features Overview , Release 8.1.6 
November 1999 
1 
Oracle Advanced Security: 
Security and Directory Integration 
Features Overview 
November 1999 
PRODUCT SUMMARY 
With the continued growth of distributed systems, the problem of user authentication and user 
management has become acute. Users have too many passwords; consequently, they write them 
down, or choose the same password for all accounts. Organizations must manage multiple accounts 
for each user; as a result, they devote significant resources to user administration, or invest in network 
authentication services, many of which promise single sign-on and centralized authorization 
management. Common information used by multiple applications Ÿ such as username, user’s office 
location and phone number Ÿ is often fragmented across the enterprise, leading to data that is 
redundant, inconsistent, and expensive to manage. The lack of centralization is a security risk, because 
old or unused accounts and privileges can be misused. 
Oracle Advanced Security addresses the above needs for strong security, single sign-on and 
centralized user management by offering integrated security and directory services; specifically, by 
storing and managing user information in a directory which supports the Lightweight Directory 
Access Protocol (LDAP). Multiple Oracle applications can rely on a common, centralized definition 
of a user to determine which applications, services, and data servers a user may access, and with what 
privileges. The benefits of integrated security and directory services include: 
·  Single sign-on to multiple Oracle8i databases throughout the enterprise. 
·  Single enterprise user account, instead of multiple accounts per user. 
·  Reduced total cost of ownership through single station administration (SSA). 
·  Well-integrated, standards-based public key infrastructure (PKI). 
·  Better security through centralized authorization management and strong authentication. 
Oracle Advanced Security’s integrated security and directory services incorporates multiple Oracle 
components, including: 
·  Oracle Wallet Manager Ÿ A tool which is used to protect and manage user certificates, keys, 
and trustpoints. 
·  Oracle Enterprise Login Assistant Ÿ An easy-to-use tool which enables single sign-on for 
users. 
·  Oracle Internet Directory Ÿ An LDAPv3-compliant directory service, built on the Oracle8i 
database, which stores information about enterprise users and enterprise roles. 
·  Oracle Enterprise Security Manager Ÿ An administration tool available through Oracle 
Enterprise Manager, which allows administrators to manage enterprise users and enterprise roles 
in Oracle Internet Directory, and across multiple Oracle8i databases, from a single console.
Oracle Advanced Security: Security and Directory Integration Features Overview , Release 8.1.6 
November 1999 
2 
·  Oracle8i Ÿ A data server which retrieves users’ enterprise roles from Oracle Internet Directory 
and authenticates users over SSL. 
Oracle Advanced Security’s integrated security and directory services also requires the following non- 
Oracle component: 
·  Certificate Authority (CA)Ÿ An X.509-compliant certificate authority which creates digital 
certificates. 
Oracle Wallet Manager 
An advantage of X.509 certificates is that they may be used to uniquely identify an individual within 
an organization, and thus enable strong authentication. Oracle Wallet Manager provides secure 
management of PKI (public key infrastructure)-based user credentials. Oracle Wallet Manager creates 
a private and public key pair for a user, and issues a Public Key Certificate Standard (PKCS) #10 
certificate signing request which can be fulfilled by any X.509 v3-compliant CA. After the CA issues 
an X.509 certificate, the user can load the certificate into his wallet. Oracle Wallet Manager stores and 
manages PKI credentials for servers, such as Oracle Internet Directory and Oracle8i, as well as users. 
Oracle Wallet Manager also manages user trustpoints, the list of root certificates that the user trusts, 
and is pre-configured with root certificates from PKI vendors such as VeriSign and GTE. Wallets are 
protected using password-based, strong encryption, and are stored on the client. 
PKI-based Single Sign-On 
Oracle Advanced Security (formerly Advanced Networking Option) supports multiple single sign-on 
mechanisms, including Kerboros and DCE. Release 8.1.6 of Oracle Advanced Security enhances the 
single sign-on options available to customers by providing PKI-based single sign-on. 
In most cases, a user need never access a wallet once it has been configured, but can easily access his 
wallet using Oracle Enterprise Login Assistant, a very simple, easy-to-use login tool that hides the 
complexity of a private key and certificate from users. Users provide a password to Oracle Enterprise 
Login Assistant, which then opens the user’s encrypted wallet. The certificate and private key 
contained in an Oracle wallet are used to authenticate the user to multiple databases, which need no 
longer store and manage local passwords for users. Furthermore, authentication is transparent to the 
user, who need not provide any additional passwords once his wallet has been opened. 
Oracle Advanced Security offers enhanced PKI-based single sign-on through use of interoperable 
X.509 (version 3) certificates for authentication over Secure Sockets Layer (SSL), the standard for 
Internet authentication. In addition to strong user authentication, SSL also provides network data 
confidentiality (through encryption) and data integrity for multiple types of connections: LDAP , IIOP 
(Internet Intra-ORB Protocol), and Net8ℱ. 
PKI-based single sign-on over SSL can be used alone, or in conjunction with enterprise user 
management, described below. 
Enterprise User Management 
Enterprises today face tremendous challenges in managing information about users, keeping user 
information current, and securing access to all the information in an enterprise. Each user may have 
multiple accounts on different databases, requiring her to remember passwords for each of these 
accounts. Users not only have too many passwords, but there are too many accounts for administrators
to manage. Furthermore, the lack of centralization is a security risk, because old or unused accounts 
and privileges can be misused. 
To address these challenges, Release 8.1.6 introduces enterprise user management. Enterprise users 
and their authorizations are managed in Oracle Internet Directory, an LDAP-based directory service, 
using Oracle Enterprise Security Manager, a tool accessible through Oracle Enterprise Manager. 
Enterprise users can be assigned enterprise roles (which are containers of database-specific global 
roles), that determine their access privileges in specific databases. For example, the enterprise role 
CLERK could contain the global role HRCLERK on the Human Resources database, and the global 
role ANALYST on the Payroll database. An enterprise role can be granted or revoked to one or more 
enterprise users. For example, an administrator could grant the enterprise role CLERK to a number of 
enterprise users who hold the same job. This information about users and roles is protected in the 
directory through Access Control Lists, ensuring that only a privileged administrator can manage 
users, and grant and revoke roles. 
Oracle’s LDAP version 3-compliant directory server, Oracle Internet Directory, is fully integrated 
with Oracle8i and supports “off-the-shelf” enterprise user management. Other LDAP directories, 
including Novell Directory Service (NDS) and Microsoft’s Active Directory for Windows 2000 will 
be certified to operate with Release 8.1.6. 
User/Schema Separation 
Single sign-on solutions address the “too many passwords” problem and generally result in both 
stronger authentication and an improved user experience. However, users all too often still need to 
have multiple accounts: one for each application, database, or network service which they access, and 
organizations must still expend large amounts of time and money creating, administering, and deleting 
these user accounts. Therefore, deploying a directory service for enterprise user management is only 
beneficial if you can actually reduce the number of user accounts; otherwise, the directory service is 
just another place to create user accounts! 
In general, users really do not need their own accounts - or their own schemas - in a database, they 
merely need to access an application schema. For example, suppose users John, Firuzeh and Jane are 
all users of the Payroll application, and they need access to the Payroll schema on the Finance 
database. None of them needs to create his or her own objects in the database; in fact, they need only 
access objects associated with the Payroll schema, such as the Employees table, the Salary table, and 
so forth. 
Release 8.1.6 allows you to separate users from schemas, so that many enterprise users can access a 
single, shared application schema. Instead of creating a user account (that is, a user schema) in each 
database a user needs to access, you need only create an enterprise user in the directory, and “point” 
or “map” the user to a shared schema that many other enterprise users can also access. For example, if 
John, Firuzeh and Jane all access the Sales database, you need only create a single schema in the 
database, e.g. ‘sales_application’ which all three enterprise users can access, instead of creating an 
account for each user on the Sales database. Enterprise users may also share schemas on multiple 
databases. For example, Firuzeh and Jane may also access the shared schema ‘financials’ on the 
General Ledger database. 
Organizations deploying Internet applications reap the greatest benefit of user/schema separation. 
These organizations want to have identified users, but cannot afford the management or storage 
Oracle Advanced Security: Security and Directory Integration Features Overview , Release 8.1.6 
November 1999 
3
overhead of creating potentially hundreds of thousands of users, certainly not in the applications and 
databases behind their Internet front-end. However, directories excel at management, search, and 
retrieval of hundreds of thousand of user records. Creating “Internet application users” Ÿthat is, 
enterprise users Ÿ as directory entries gives organizations the benefit of keeping track of their users 
(and their users’ preferences), with high security and low overhead. 
The separation of users from schemas is truly the payoff for deploying a directory service. Thousands 
of users can connect to a database, be known to the database (and audited in the database), with 
specific privileges in the database, without being created in the database. Now, you can truly create an 
enterprise user once, in the directory Ÿ a single enterprise user account Ÿ who nonetheless can 
access multiple databases, using only the privileges she needs to perform her job. 
Enterprise user management thus offers the following benefits: 
Oracle Advanced Security: Security and Directory Integration Features Overview , Release 8.1.6 
November 1999 
4 
·  Fewer User Accounts Ÿ Enterprise users no longer need to be database users nor have 
identified schemas. 
·  Internet Scalability Ÿ You can support hundreds of thousands of users, who are known to 
multiple databases, accountable (and audited in) multiple databases, without creating thousands 
of database user accounts. 
·  Easily-Enforced Security Ÿ If a user changes jobs or leaves, his privileges can be altered or 
removed, everywhere, merely by changing his user entry in Oracle Internet Directory. 
Organizations no longer need to worry about “orphan” accounts or out-of-date privileges, which 
consume valuable system resources and are targets for hackers. 
·  Reduced Cost of Ownership Ÿ Organizations save significant resources by managing a single 
enterprise user account and assigning enterprise roles once, instead of creating multiple user 
accounts with multiple passwords, each having multiple authorizations. 
Single Station Administration (SSA) 
Managing thousands of user accounts is one of the largest administration challenges facing large 
organizations. Creating user accounts and assigning privileges is often a multi-step process, requiring 
multiple tools. 
Significant new functionality has been added in Release 8.1.6 to address this need. Oracle Enterprise 
Security Manager (an extension to Oracle Enterprise Manager) provides single station administration. 
From a single console, an administrator can perform the following: 
·  Create enterprise users in Oracle Internet Directory. 
·  Create shared schemas in databases 
·  Map enterprise users to shared schemas 
·  Create enterprise roles that span multiple databases. 
·  Assign one or more enterprise roles to a user. 
·  Configure Access Control Lists on directory objects 
Oracle Enterprise Security Manager provides one tool for enterprise user management, resulting in a 
lower cost of user administration throughout the enterprise. Another benefit of single station 
administration is that if security is easy to administer, organizations are more likely to implement 
strong security throughout the enterprise.
Oracle Advanced Security: Security and Directory Integration Features Overview , Release 8.1.6 
November 1999 
5 
Robust Directory Services 
Oracle Internet Directory is a native LDAP version 3 implementation that combines the mission-critical 
strength of Oracle’s database technology with the flexibility of the Internet standard. Oracle 
Internet Directory is the default data repository for accessing Oracle8i enterprise user information, 
including enterprise roles and shared schema information. 
Oracle Internet Directory offers flexible, highly-granular access control mechanisms which protect the 
sensitivity of common application information as well as Oracle’s enterprise user information. Oracle 
Internet Directory’s Access Control Lists (ACLs) can be used to specify, at the attribute level, the 
users entitled to access and the type of access permitted. For example, a user’s manager may have 
read and write access to a user’s salary attribute, the user can read his own salary, but no other user 
has access to it. Oracle Internet Directory also offers configurable default, guest, and super-user 
permissions, to enable users to have “least privilege”Ÿ just the privileges they need to perform their 
jobs, and no more. Oracle Internet Directory can be automatically configured with the schema and 
required Access Control Lists (ACLs) the Oracle8i database needs for enterprise user management, 
Oracle Internet Directory exploits the built-in availability and performance of the underlying Oracle8i 
data server, as well as offering bulk loading, deletion, and updates of directory entries, high-speed 
backup and recovery tools, the ability to add or delete directory nodes without service disruption, and 
other high availability features. 
Availability 
Integrated security and directory services are available with Release 8.1.6 of Oracle Advanced 
Security, including Oracle Wallet Manager, Oracle Enterprise Login Assistant, Oracle Enterprise 
Security Manager, use of SSL for encryption, authentication and single sign-on, user/schema 
separation and the use of Oracle Internet Directory for enterprise user management. 
Oracle Internet Directory may also be purchased separately. 
Summary 
Oracle Advanced Security’s integration of security and directory services offers strong user 
authentication through standards-based single sign-on, and reduces users’ frustration with too many 
passwords. Administrators spend less time managing user accounts, because they are able to centrally 
administer users across multiple databases. The Single Enterprise User offers even greater benefits 
for organizations that need only create one account per user for the entire organization. Oracle 
environments may store their entire definition of a user, and the user’s roles and privileges, within a 
directory service. The Single Enterprise User enables organizations deploying Internet applications to 
support thousands of users securely, with reduced cost of ownership, and scale to tens of thousands, 
hundreds of thousands, or even millions of users over a distributed enterprise.
Oracle Advanced Security: Security and Directory Integration Features Overview , Release 8.1.6 
November 1999 
6 
Key Security and Directory Features 
Authentication 
·  SSL offers strong, standards-based 
authentication and single sign-on to Oracle 
·  Mutual authentication of databases over SSL 
·  SSL authentication of Oracle8i to Oracle 
Internet Directory 
Management/Ease of Use 
·  Single Station Administration of users 
across multiple Oracle8i databases using 
Oracle Enterprise Security Manager 
·  Oracle Enterprise Login Assistant for easy-to- 
use single sign-on 
·  Single Enterprise User defined and managed 
in a directory 
·  Easy installation of certificates and 
certificate trustpoints using Oracle Wallet 
Manager 
·  Bundled, well-integrated LDAP v3- 
compliant directory service 
·  Default Access Control Lists 
Application Integration 
·  Support for NDS and Active Directory 
·  Support for multiple standards, including 
LDAP (version 3), X.509(version 3), and 
SSL 
Performance 
·  Oracle Internet Directory leverages high 
availability and scalability of the underlying 
Oracle8i data server 
Encryption 
·  SSL encryption of IIOP, LDAP, and Net8 
connections
Oracle Advanced Security: Security and Directory Integration Features Overview , Release 8.1.6 
November 1999 
7 
Oracle Corporation 
World Headquarters 
500 Oracle Parkway 
Redwood Shores, CA 94065 
U.S.A. 
Worldwide Inquiries: 
+1.650.506.7000 
Fax +1.650.506.7200 
http://www.oracle.com/ 
Copyright © Oracle Corporation 1998 
All Rights Reserved 
This document is provided for informational purposes 
only, and the information herein is subject to change 
without notice. Please report any errors herein to Oracle 
Corporation. Oracle Corporation does not provide any 
warranties covering and specifically disclaims any 
liability in connection with this document. 
Oracle is a registered trademark, and Enabling the 
Information Age, Oracle8I, Oracle7, Oracle8, and Net8 
are trademarks of Oracle Corporation. 
All other company and product names mentioned are 
used for identification purposes only and may be 
trademarks of their respective owners.
Oracle Advanced Security: Security and Directory Integration Features Overview , Release 8.1.6 
November 1999 
8

Weitere Àhnliche Inhalte

Was ist angesagt?

Deciphering 'Claims-based Identity'
Deciphering 'Claims-based Identity'Deciphering 'Claims-based Identity'
Deciphering 'Claims-based Identity'Oliver Pfaff
 
Identity Management
Identity ManagementIdentity Management
Identity Managementrver21
 
How to deploy SharePoint 2010 to external users?
How to deploy SharePoint 2010 to external users?How to deploy SharePoint 2010 to external users?
How to deploy SharePoint 2010 to external users?rlsoft
 
Extending SharePoint 2010 to your customers and partners
Extending SharePoint 2010 to your customers and partnersExtending SharePoint 2010 to your customers and partners
Extending SharePoint 2010 to your customers and partnersCorey Roth
 
PROACTEYE IDENTITY MANAGEMENT
PROACTEYE IDENTITY MANAGEMENTPROACTEYE IDENTITY MANAGEMENT
PROACTEYE IDENTITY MANAGEMENThardik soni
 
Building business applications using business connectivity services using sha...
Building business applications using business connectivity services using sha...Building business applications using business connectivity services using sha...
Building business applications using business connectivity services using sha...Chakkaradeep Chandran
 
LTS Secure Identity Management
LTS Secure Identity ManagementLTS Secure Identity Management
LTS Secure Identity Managementrver21
 
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVEDEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVEcscpconf
 
8 i internet_security
8 i internet_security8 i internet_security
8 i internet_securityAnil Pandey
 
End-to-End Identity Management
End-to-End Identity ManagementEnd-to-End Identity Management
End-to-End Identity ManagementWSO2
 
The Who, What, Why and How of Active Directory Federation Services (AD FS)
The Who, What, Why and How of Active Directory Federation Services (AD FS)The Who, What, Why and How of Active Directory Federation Services (AD FS)
The Who, What, Why and How of Active Directory Federation Services (AD FS)Jay Simcox
 
Integrating Hitachi ID Management Suite with WebSSO Systems
Integrating Hitachi ID Management Suite with WebSSO SystemsIntegrating Hitachi ID Management Suite with WebSSO Systems
Integrating Hitachi ID Management Suite with WebSSO SystemsHitachi ID Systems, Inc.
 
Presentation- on OIM
Presentation- on OIMPresentation- on OIM
Presentation- on OIMTamim Khan
 
InfoRouter Document Management Software Technical Presentation
InfoRouter Document Management Software Technical PresentationInfoRouter Document Management Software Technical Presentation
InfoRouter Document Management Software Technical PresentationActive Innovations, Inc - infoRouter
 
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...Brian Culver
 
Box Security Whitepaper
Box Security WhitepaperBox Security Whitepaper
Box Security WhitepaperBoxHQ
 
SharePoint in the Extranet Joel Oleson
SharePoint in the Extranet Joel OlesonSharePoint in the Extranet Joel Oleson
SharePoint in the Extranet Joel Olesonwebhostingguy
 
Stealth Extranet for SharePoint_datasheet
Stealth Extranet for SharePoint_datasheetStealth Extranet for SharePoint_datasheet
Stealth Extranet for SharePoint_datasheetMark Stratman
 
AD FS Workshop | Part 2 | Deep Dive
AD FS Workshop | Part 2 | Deep DiveAD FS Workshop | Part 2 | Deep Dive
AD FS Workshop | Part 2 | Deep DiveGranikos GmbH & Co. KG
 

Was ist angesagt? (20)

Deciphering 'Claims-based Identity'
Deciphering 'Claims-based Identity'Deciphering 'Claims-based Identity'
Deciphering 'Claims-based Identity'
 
Identity Management
Identity ManagementIdentity Management
Identity Management
 
How to deploy SharePoint 2010 to external users?
How to deploy SharePoint 2010 to external users?How to deploy SharePoint 2010 to external users?
How to deploy SharePoint 2010 to external users?
 
Extending SharePoint 2010 to your customers and partners
Extending SharePoint 2010 to your customers and partnersExtending SharePoint 2010 to your customers and partners
Extending SharePoint 2010 to your customers and partners
 
PROACTEYE IDENTITY MANAGEMENT
PROACTEYE IDENTITY MANAGEMENTPROACTEYE IDENTITY MANAGEMENT
PROACTEYE IDENTITY MANAGEMENT
 
Building business applications using business connectivity services using sha...
Building business applications using business connectivity services using sha...Building business applications using business connectivity services using sha...
Building business applications using business connectivity services using sha...
 
LTS Secure Identity Management
LTS Secure Identity ManagementLTS Secure Identity Management
LTS Secure Identity Management
 
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVEDEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
 
8 i internet_security
8 i internet_security8 i internet_security
8 i internet_security
 
End-to-End Identity Management
End-to-End Identity ManagementEnd-to-End Identity Management
End-to-End Identity Management
 
The Who, What, Why and How of Active Directory Federation Services (AD FS)
The Who, What, Why and How of Active Directory Federation Services (AD FS)The Who, What, Why and How of Active Directory Federation Services (AD FS)
The Who, What, Why and How of Active Directory Federation Services (AD FS)
 
Integrating Hitachi ID Management Suite with WebSSO Systems
Integrating Hitachi ID Management Suite with WebSSO SystemsIntegrating Hitachi ID Management Suite with WebSSO Systems
Integrating Hitachi ID Management Suite with WebSSO Systems
 
Presentation- on OIM
Presentation- on OIMPresentation- on OIM
Presentation- on OIM
 
InfoRouter Document Management Software Technical Presentation
InfoRouter Document Management Software Technical PresentationInfoRouter Document Management Software Technical Presentation
InfoRouter Document Management Software Technical Presentation
 
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
 
Box Security Whitepaper
Box Security WhitepaperBox Security Whitepaper
Box Security Whitepaper
 
SharePoint in the Extranet Joel Oleson
SharePoint in the Extranet Joel OlesonSharePoint in the Extranet Joel Oleson
SharePoint in the Extranet Joel Oleson
 
Ad fs
Ad fsAd fs
Ad fs
 
Stealth Extranet for SharePoint_datasheet
Stealth Extranet for SharePoint_datasheetStealth Extranet for SharePoint_datasheet
Stealth Extranet for SharePoint_datasheet
 
AD FS Workshop | Part 2 | Deep Dive
AD FS Workshop | Part 2 | Deep DiveAD FS Workshop | Part 2 | Deep Dive
AD FS Workshop | Part 2 | Deep Dive
 

Andere mochten auch

ĐșĐŸŃ€ĐŸĐ»Ń‘ĐČĐ° ĐșŃ€ĐžŃŃ‚ĐžĐœĐ° 8б
ĐșĐŸŃ€ĐŸĐ»Ń‘ĐČĐ° ĐșŃ€ĐžŃŃ‚ĐžĐœĐ° 8бĐșĐŸŃ€ĐŸĐ»Ń‘ĐČĐ° ĐșŃ€ĐžŃŃ‚ĐžĐœĐ° 8б
ĐșĐŸŃ€ĐŸĐ»Ń‘ĐČĐ° ĐșŃ€ĐžŃŃ‚ĐžĐœĐ° 8Đ±ĐĐ° та ха
 
àčƒàžšàž‡àžČàž™àž«àž™àčˆàž§àžąàž—àž”àčˆ8
àčƒàžšàž‡àžČàž™àž«àž™àčˆàž§àžąàž—àž”àčˆ8àčƒàžšàž‡àžČàž™àž«àž™àčˆàž§àžąàž—àž”àčˆ8
àčƒàžšàž‡àžČàž™àž«àž™àčˆàž§àžąàž—àž”àčˆ8Amnuay
 
8월14ìŒìŁŒìŒì˜ˆë°°
8월14ìŒìŁŒìŒì˜ˆë°°8월14ìŒìŁŒìŒì˜ˆë°°
8월14ìŒìŁŒìŒì˜ˆë°°Myeongnyun Mission Church
 
8.1.5 project record sheet
8.1.5  project record sheet8.1.5  project record sheet
8.1.5 project record sheetcfgscmsuma
 
8 Ń€Đ°Đ±ĐŸŃ‚Ń‹ ĐœĐ°ŃˆĐžŃ… Ń€Đ”ŃĐżĐŸĐœĐŽĐ”ĐœŃ‚ĐŸĐČ
8 Ń€Đ°Đ±ĐŸŃ‚Ń‹ ĐœĐ°ŃˆĐžŃ… Ń€Đ”ŃĐżĐŸĐœĐŽĐ”ĐœŃ‚ĐŸĐČ8 Ń€Đ°Đ±ĐŸŃ‚Ń‹ ĐœĐ°ŃˆĐžŃ… Ń€Đ”ŃĐżĐŸĐœĐŽĐ”ĐœŃ‚ĐŸĐČ
8 Ń€Đ°Đ±ĐŸŃ‚Ń‹ ĐœĐ°ŃˆĐžŃ… Ń€Đ”ŃĐżĐŸĐœĐŽĐ”ĐœŃ‚ĐŸĐČFOM_history
 
ПраĐČĐŽĐ° Đ¶ĐžĐ·ĐœĐž №8
ПраĐČĐŽĐ° Đ¶ĐžĐ·ĐœĐž №8ПраĐČĐŽĐ° Đ¶ĐžĐ·ĐœĐž №8
ПраĐČĐŽĐ° Đ¶ĐžĐ·ĐœĐž №8DimOK AD
 
PHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
PHD Virtual Automating Disaster Recovery Testing to Ensure Application RecoveryPHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
PHD Virtual Automating Disaster Recovery Testing to Ensure Application RecoveryMark McHenry
 
80 Minutes, No interval, Process portfolio- pdf document
80 Minutes, No interval, Process portfolio- pdf document80 Minutes, No interval, Process portfolio- pdf document
80 Minutes, No interval, Process portfolio- pdf documentAlistair Kennedy
 
ĐżĐŸĐČŃ‚ĐŸŃ€Đ”ĐœĐžĐ” 8
ĐżĐŸĐČŃ‚ĐŸŃ€Đ”ĐœĐžĐ” 8ĐżĐŸĐČŃ‚ĐŸŃ€Đ”ĐœĐžĐ” 8
ĐżĐŸĐČŃ‚ĐŸŃ€Đ”ĐœĐžĐ” 8SHALUPENKO
 
819 info simplification final
819 info simplification   final819 info simplification   final
819 info simplification finalmanilamike
 
8 23 11 ruling la porte county case
8 23 11 ruling la porte county case8 23 11 ruling la porte county case
8 23 11 ruling la porte county caseAbdul-Hakim Shabazz
 
8.1.4 gdxghkjhgn
8.1.4 gdxghkjhgn8.1.4 gdxghkjhgn
8.1.4 gdxghkjhgnhumaira28
 
ć…ŹèĄ†èĄ›ç”Ÿ8æœˆć·2011
ć…ŹèĄ†èĄ›ç”Ÿ8æœˆć·2011ć…ŹèĄ†èĄ›ç”Ÿ8æœˆć·2011
ć…ŹèĄ†èĄ›ç”Ÿ8æœˆć·2011Sakata Masatoshi
 

Andere mochten auch (16)

ĐșĐŸŃ€ĐŸĐ»Ń‘ĐČĐ° ĐșŃ€ĐžŃŃ‚ĐžĐœĐ° 8б
ĐșĐŸŃ€ĐŸĐ»Ń‘ĐČĐ° ĐșŃ€ĐžŃŃ‚ĐžĐœĐ° 8бĐșĐŸŃ€ĐŸĐ»Ń‘ĐČĐ° ĐșŃ€ĐžŃŃ‚ĐžĐœĐ° 8б
ĐșĐŸŃ€ĐŸĐ»Ń‘ĐČĐ° ĐșŃ€ĐžŃŃ‚ĐžĐœĐ° 8б
 
àčƒàžšàž‡àžČàž™àž«àž™àčˆàž§àžąàž—àž”àčˆ8
àčƒàžšàž‡àžČàž™àž«àž™àčˆàž§àžąàž—àž”àčˆ8àčƒàžšàž‡àžČàž™àž«àž™àčˆàž§àžąàž—àž”àčˆ8
àčƒàžšàž‡àžČàž™àž«àž™àčˆàž§àžąàž—àž”àčˆ8
 
8월14ìŒìŁŒìŒì˜ˆë°°
8월14ìŒìŁŒìŒì˜ˆë°°8월14ìŒìŁŒìŒì˜ˆë°°
8월14ìŒìŁŒìŒì˜ˆë°°
 
8.1.5 project record sheet
8.1.5  project record sheet8.1.5  project record sheet
8.1.5 project record sheet
 
ĐšŃ€Đ°ŃĐœĐŸŃŃ€ŃĐșĐžĐč ŃŃ‚Ń€ĐŸĐžŃ‚Đ”Đ»ŃŒĐœŃ‹Đč Đ¶ŃƒŃ€ĐœĐ°Đ» "Đ’Đ”ŃŃ‚ŃĐœĐ°Đ±" №8, Đ°ĐżŃ€Đ”Đ»ŃŒ 2014
ĐšŃ€Đ°ŃĐœĐŸŃŃ€ŃĐșĐžĐč ŃŃ‚Ń€ĐŸĐžŃ‚Đ”Đ»ŃŒĐœŃ‹Đč Đ¶ŃƒŃ€ĐœĐ°Đ» "Đ’Đ”ŃŃ‚ŃĐœĐ°Đ±" №8, Đ°ĐżŃ€Đ”Đ»ŃŒ 2014 ĐšŃ€Đ°ŃĐœĐŸŃŃ€ŃĐșĐžĐč ŃŃ‚Ń€ĐŸĐžŃ‚Đ”Đ»ŃŒĐœŃ‹Đč Đ¶ŃƒŃ€ĐœĐ°Đ» "Đ’Đ”ŃŃ‚ŃĐœĐ°Đ±" №8, Đ°ĐżŃ€Đ”Đ»ŃŒ 2014
ĐšŃ€Đ°ŃĐœĐŸŃŃ€ŃĐșĐžĐč ŃŃ‚Ń€ĐŸĐžŃ‚Đ”Đ»ŃŒĐœŃ‹Đč Đ¶ŃƒŃ€ĐœĐ°Đ» "Đ’Đ”ŃŃ‚ŃĐœĐ°Đ±" №8, Đ°ĐżŃ€Đ”Đ»ŃŒ 2014
 
8 Ń€Đ°Đ±ĐŸŃ‚Ń‹ ĐœĐ°ŃˆĐžŃ… Ń€Đ”ŃĐżĐŸĐœĐŽĐ”ĐœŃ‚ĐŸĐČ
8 Ń€Đ°Đ±ĐŸŃ‚Ń‹ ĐœĐ°ŃˆĐžŃ… Ń€Đ”ŃĐżĐŸĐœĐŽĐ”ĐœŃ‚ĐŸĐČ8 Ń€Đ°Đ±ĐŸŃ‚Ń‹ ĐœĐ°ŃˆĐžŃ… Ń€Đ”ŃĐżĐŸĐœĐŽĐ”ĐœŃ‚ĐŸĐČ
8 Ń€Đ°Đ±ĐŸŃ‚Ń‹ ĐœĐ°ŃˆĐžŃ… Ń€Đ”ŃĐżĐŸĐœĐŽĐ”ĐœŃ‚ĐŸĐČ
 
ПраĐČĐŽĐ° Đ¶ĐžĐ·ĐœĐž №8
ПраĐČĐŽĐ° Đ¶ĐžĐ·ĐœĐž №8ПраĐČĐŽĐ° Đ¶ĐžĐ·ĐœĐž №8
ПраĐČĐŽĐ° Đ¶ĐžĐ·ĐœĐž №8
 
PHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
PHD Virtual Automating Disaster Recovery Testing to Ensure Application RecoveryPHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
PHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
 
80 Minutes, No interval, Process portfolio- pdf document
80 Minutes, No interval, Process portfolio- pdf document80 Minutes, No interval, Process portfolio- pdf document
80 Minutes, No interval, Process portfolio- pdf document
 
ĐżĐŸĐČŃ‚ĐŸŃ€Đ”ĐœĐžĐ” 8
ĐżĐŸĐČŃ‚ĐŸŃ€Đ”ĐœĐžĐ” 8ĐżĐŸĐČŃ‚ĐŸŃ€Đ”ĐœĐžĐ” 8
ĐżĐŸĐČŃ‚ĐŸŃ€Đ”ĐœĐžĐ” 8
 
819 info simplification final
819 info simplification   final819 info simplification   final
819 info simplification final
 
8 23 11 ruling la porte county case
8 23 11 ruling la porte county case8 23 11 ruling la porte county case
8 23 11 ruling la porte county case
 
8.1.4 gdxghkjhgn
8.1.4 gdxghkjhgn8.1.4 gdxghkjhgn
8.1.4 gdxghkjhgn
 
8-2015 Revised Resume
8-2015 Revised Resume8-2015 Revised Resume
8-2015 Revised Resume
 
ć…ŹèĄ†èĄ›ç”Ÿ8æœˆć·2011
ć…ŹèĄ†èĄ›ç”Ÿ8æœˆć·2011ć…ŹèĄ†èĄ›ç”Ÿ8æœˆć·2011
ć…ŹèĄ†èĄ›ç”Ÿ8æœˆć·2011
 
8 2 ασÎșÎźÏƒÎ”Îčς ÎżÎŒÎżÎčα τρÎčÎłÏ‰ÎœÎ±2
8 2 ασÎșÎźÏƒÎ”Îčς ÎżÎŒÎżÎčα τρÎčÎłÏ‰ÎœÎ±28 2 ασÎșÎźÏƒÎ”Îčς ÎżÎŒÎżÎčα τρÎčÎłÏ‰ÎœÎ±2
8 2 ασÎșÎźÏƒÎ”Îčς ÎżÎŒÎżÎčα τρÎčÎłÏ‰ÎœÎ±2
 

Ähnlich wie 816isdfo

8 isecurity database
8 isecurity database8 isecurity database
8 isecurity databaseAnil Pandey
 
Active Directory Proposal
Active Directory ProposalActive Directory Proposal
Active Directory ProposalMJ Ferdous
 
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesHitachi ID Systems, Inc.
 
What is Authentication Active Directory_.pptx
What is Authentication Active Directory_.pptxWhat is Authentication Active Directory_.pptx
What is Authentication Active Directory_.pptxHeenaMehta35
 
Bluedog white paper - Our WebObjects Web Security Model
Bluedog white paper - Our WebObjects Web Security ModelBluedog white paper - Our WebObjects Web Security Model
Bluedog white paper - Our WebObjects Web Security Modeltom termini
 
security in oracle database
security in oracle databasesecurity in oracle database
security in oracle databasessuser40bb47
 
Security in oracle
Security in oracleSecurity in oracle
Security in oraclessuser40bb47
 
LTS Secure Identity Management
LTS Secure Identity ManagementLTS Secure Identity Management
LTS Secure Identity Managementrver21
 
Chapter_11_LDAP_and_Kerberos-converted.pptx
Chapter_11_LDAP_and_Kerberos-converted.pptxChapter_11_LDAP_and_Kerberos-converted.pptx
Chapter_11_LDAP_and_Kerberos-converted.pptxahmedsayed947221
 
Keychain Services Programming Guide
Keychain Services Programming GuideKeychain Services Programming Guide
Keychain Services Programming GuideDEVTYPE
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportKiran Girase
 
Identity management
Identity managementIdentity management
Identity managementhardik soni
 
NovellÂź iChainÂź 2.3
NovellÂź iChainÂź 2.3NovellÂź iChainÂź 2.3
NovellÂź iChainÂź 2.3webhostingguy
 
Oracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered SystemsOracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered SystemsGregOracle
 
CIS13: How to Build a Federated Identity Service on Identity and Context Virt...
CIS13: How to Build a Federated Identity Service on Identity and Context Virt...CIS13: How to Build a Federated Identity Service on Identity and Context Virt...
CIS13: How to Build a Federated Identity Service on Identity and Context Virt...CloudIDSummit
 
Getting started with oracle eprcs
Getting started with oracle eprcsGetting started with oracle eprcs
Getting started with oracle eprcsRati Sharma
 

Ähnlich wie 816isdfo (20)

8 isecurity database
8 isecurity database8 isecurity database
8 isecurity database
 
Oim Poc1.0
Oim Poc1.0Oim Poc1.0
Oim Poc1.0
 
Active Directory Proposal
Active Directory ProposalActive Directory Proposal
Active Directory Proposal
 
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
 
Sso & rman
Sso & rmanSso & rman
Sso & rman
 
What is Authentication Active Directory_.pptx
What is Authentication Active Directory_.pptxWhat is Authentication Active Directory_.pptx
What is Authentication Active Directory_.pptx
 
Bluedog white paper - Our WebObjects Web Security Model
Bluedog white paper - Our WebObjects Web Security ModelBluedog white paper - Our WebObjects Web Security Model
Bluedog white paper - Our WebObjects Web Security Model
 
Acc Updated Resume
Acc Updated ResumeAcc Updated Resume
Acc Updated Resume
 
oracle
oracleoracle
oracle
 
security in oracle database
security in oracle databasesecurity in oracle database
security in oracle database
 
Security in oracle
Security in oracleSecurity in oracle
Security in oracle
 
LTS Secure Identity Management
LTS Secure Identity ManagementLTS Secure Identity Management
LTS Secure Identity Management
 
Chapter_11_LDAP_and_Kerberos-converted.pptx
Chapter_11_LDAP_and_Kerberos-converted.pptxChapter_11_LDAP_and_Kerberos-converted.pptx
Chapter_11_LDAP_and_Kerberos-converted.pptx
 
Keychain Services Programming Guide
Keychain Services Programming GuideKeychain Services Programming Guide
Keychain Services Programming Guide
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
 
Identity management
Identity managementIdentity management
Identity management
 
NovellÂź iChainÂź 2.3
NovellÂź iChainÂź 2.3NovellÂź iChainÂź 2.3
NovellÂź iChainÂź 2.3
 
Oracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered SystemsOracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered Systems
 
CIS13: How to Build a Federated Identity Service on Identity and Context Virt...
CIS13: How to Build a Federated Identity Service on Identity and Context Virt...CIS13: How to Build a Federated Identity Service on Identity and Context Virt...
CIS13: How to Build a Federated Identity Service on Identity and Context Virt...
 
Getting started with oracle eprcs
Getting started with oracle eprcsGetting started with oracle eprcs
Getting started with oracle eprcs
 

Mehr von Anil Pandey

National health policy_2017
National health policy_2017National health policy_2017
National health policy_2017Anil Pandey
 
Class 3-computer-pt3-rev-ws-56
Class 3-computer-pt3-rev-ws-56Class 3-computer-pt3-rev-ws-56
Class 3-computer-pt3-rev-ws-56Anil Pandey
 
Class 3-social-pt3-rev-ws-for-uploading
Class 3-social-pt3-rev-ws-for-uploadingClass 3-social-pt3-rev-ws-for-uploading
Class 3-social-pt3-rev-ws-for-uploadingAnil Pandey
 
Class 3-science-pt3-rev-ws-for-uploading
Class 3-science-pt3-rev-ws-for-uploadingClass 3-science-pt3-rev-ws-for-uploading
Class 3-science-pt3-rev-ws-for-uploadingAnil Pandey
 
Class 3-math-pt3-rev-ws-for-uploading
Class 3-math-pt3-rev-ws-for-uploadingClass 3-math-pt3-rev-ws-for-uploading
Class 3-math-pt3-rev-ws-for-uploadingAnil Pandey
 
Class 3-hindi-pt3-rev-ws-for-uploading
Class 3-hindi-pt3-rev-ws-for-uploadingClass 3-hindi-pt3-rev-ws-for-uploading
Class 3-hindi-pt3-rev-ws-for-uploadingAnil Pandey
 
Class 3-english-pt3-rev-ws-for-uploading
Class 3-english-pt3-rev-ws-for-uploadingClass 3-english-pt3-rev-ws-for-uploading
Class 3-english-pt3-rev-ws-for-uploadingAnil Pandey
 
Art of indexing_in_o8i
Art of indexing_in_o8iArt of indexing_in_o8i
Art of indexing_in_o8iAnil Pandey
 
Apps session wait_tables
Apps session wait_tablesApps session wait_tables
Apps session wait_tablesAnil Pandey
 
Application sql issues_and_tuning
Application sql issues_and_tuningApplication sql issues_and_tuning
Application sql issues_and_tuningAnil Pandey
 
Appliance whitepaper 8_i
Appliance whitepaper 8_iAppliance whitepaper 8_i
Appliance whitepaper 8_iAnil Pandey
 
35 dbatune3
35 dbatune335 dbatune3
35 dbatune3Anil Pandey
 
9i lin relnotes
9i lin relnotes9i lin relnotes
9i lin relnotesAnil Pandey
 
9i hp relnotes
9i hp relnotes9i hp relnotes
9i hp relnotesAnil Pandey
 

Mehr von Anil Pandey (20)

26 bg2020
26 bg202026 bg2020
26 bg2020
 
National health policy_2017
National health policy_2017National health policy_2017
National health policy_2017
 
Class 3-computer-pt3-rev-ws-56
Class 3-computer-pt3-rev-ws-56Class 3-computer-pt3-rev-ws-56
Class 3-computer-pt3-rev-ws-56
 
Class 3-social-pt3-rev-ws-for-uploading
Class 3-social-pt3-rev-ws-for-uploadingClass 3-social-pt3-rev-ws-for-uploading
Class 3-social-pt3-rev-ws-for-uploading
 
Class 3-science-pt3-rev-ws-for-uploading
Class 3-science-pt3-rev-ws-for-uploadingClass 3-science-pt3-rev-ws-for-uploading
Class 3-science-pt3-rev-ws-for-uploading
 
Class 3-math-pt3-rev-ws-for-uploading
Class 3-math-pt3-rev-ws-for-uploadingClass 3-math-pt3-rev-ws-for-uploading
Class 3-math-pt3-rev-ws-for-uploading
 
Class 3-hindi-pt3-rev-ws-for-uploading
Class 3-hindi-pt3-rev-ws-for-uploadingClass 3-hindi-pt3-rev-ws-for-uploading
Class 3-hindi-pt3-rev-ws-for-uploading
 
Class 3-english-pt3-rev-ws-for-uploading
Class 3-english-pt3-rev-ws-for-uploadingClass 3-english-pt3-rev-ws-for-uploading
Class 3-english-pt3-rev-ws-for-uploading
 
Art of indexing_in_o8i
Art of indexing_in_o8iArt of indexing_in_o8i
Art of indexing_in_o8i
 
Apps session wait_tables
Apps session wait_tablesApps session wait_tables
Apps session wait_tables
 
Application sql issues_and_tuning
Application sql issues_and_tuningApplication sql issues_and_tuning
Application sql issues_and_tuning
 
Appliance whitepaper 8_i
Appliance whitepaper 8_iAppliance whitepaper 8_i
Appliance whitepaper 8_i
 
Appd2 cg
Appd2 cgAppd2 cg
Appd2 cg
 
A85248
A85248A85248
A85248
 
35 dbatune3
35 dbatune335 dbatune3
35 dbatune3
 
9ias
9ias9ias
9ias
 
9i lin relnotes
9i lin relnotes9i lin relnotes
9i lin relnotes
 
9i hp relnotes
9i hp relnotes9i hp relnotes
9i hp relnotes
 
8i r3 nfs
8i r3 nfs8i r3 nfs
8i r3 nfs
 
8iliteds
8iliteds8iliteds
8iliteds
 

KĂŒrzlich hochgeladen

The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
CALL ON ➄8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂
CALL ON ➄8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂CALL ON ➄8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂
CALL ON ➄8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂anilsa9823
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto GonzĂĄlez Trastoy
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Russian Call Girls in Karol Bagh Aasnvi âžĄïž 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi âžĄïž 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi âžĄïž 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi âžĄïž 8264348440 💋📞 Independent Escort S...soniya singh
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 

KĂŒrzlich hochgeladen (20)

The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
CALL ON ➄8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂
CALL ON ➄8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂CALL ON ➄8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂
CALL ON ➄8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Russian Call Girls in Karol Bagh Aasnvi âžĄïž 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi âžĄïž 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi âžĄïž 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi âžĄïž 8264348440 💋📞 Independent Escort S...
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Vip Call Girls Noida âžĄïž Delhi âžĄïž 9999965857 No Advance 24HRS Live
Vip Call Girls Noida âžĄïž Delhi âžĄïž 9999965857 No Advance 24HRS LiveVip Call Girls Noida âžĄïž Delhi âžĄïž 9999965857 No Advance 24HRS Live
Vip Call Girls Noida âžĄïž Delhi âžĄïž 9999965857 No Advance 24HRS Live
 

816isdfo

  • 1. Oracle Advanced Security: Security and Directory Integration Features Overview , Release 8.1.6 November 1999 1 Oracle Advanced Security: Security and Directory Integration Features Overview November 1999 PRODUCT SUMMARY With the continued growth of distributed systems, the problem of user authentication and user management has become acute. Users have too many passwords; consequently, they write them down, or choose the same password for all accounts. Organizations must manage multiple accounts for each user; as a result, they devote significant resources to user administration, or invest in network authentication services, many of which promise single sign-on and centralized authorization management. Common information used by multiple applications Ÿ such as username, user’s office location and phone number Ÿ is often fragmented across the enterprise, leading to data that is redundant, inconsistent, and expensive to manage. The lack of centralization is a security risk, because old or unused accounts and privileges can be misused. Oracle Advanced Security addresses the above needs for strong security, single sign-on and centralized user management by offering integrated security and directory services; specifically, by storing and managing user information in a directory which supports the Lightweight Directory Access Protocol (LDAP). Multiple Oracle applications can rely on a common, centralized definition of a user to determine which applications, services, and data servers a user may access, and with what privileges. The benefits of integrated security and directory services include: · Single sign-on to multiple Oracle8i databases throughout the enterprise. · Single enterprise user account, instead of multiple accounts per user. · Reduced total cost of ownership through single station administration (SSA). · Well-integrated, standards-based public key infrastructure (PKI). · Better security through centralized authorization management and strong authentication. Oracle Advanced Security’s integrated security and directory services incorporates multiple Oracle components, including: · Oracle Wallet Manager Ÿ A tool which is used to protect and manage user certificates, keys, and trustpoints. · Oracle Enterprise Login Assistant Ÿ An easy-to-use tool which enables single sign-on for users. · Oracle Internet Directory Ÿ An LDAPv3-compliant directory service, built on the Oracle8i database, which stores information about enterprise users and enterprise roles. · Oracle Enterprise Security Manager Ÿ An administration tool available through Oracle Enterprise Manager, which allows administrators to manage enterprise users and enterprise roles in Oracle Internet Directory, and across multiple Oracle8i databases, from a single console.
  • 2. Oracle Advanced Security: Security and Directory Integration Features Overview , Release 8.1.6 November 1999 2 · Oracle8i Ÿ A data server which retrieves users’ enterprise roles from Oracle Internet Directory and authenticates users over SSL. Oracle Advanced Security’s integrated security and directory services also requires the following non- Oracle component: · Certificate Authority (CA)Ÿ An X.509-compliant certificate authority which creates digital certificates. Oracle Wallet Manager An advantage of X.509 certificates is that they may be used to uniquely identify an individual within an organization, and thus enable strong authentication. Oracle Wallet Manager provides secure management of PKI (public key infrastructure)-based user credentials. Oracle Wallet Manager creates a private and public key pair for a user, and issues a Public Key Certificate Standard (PKCS) #10 certificate signing request which can be fulfilled by any X.509 v3-compliant CA. After the CA issues an X.509 certificate, the user can load the certificate into his wallet. Oracle Wallet Manager stores and manages PKI credentials for servers, such as Oracle Internet Directory and Oracle8i, as well as users. Oracle Wallet Manager also manages user trustpoints, the list of root certificates that the user trusts, and is pre-configured with root certificates from PKI vendors such as VeriSign and GTE. Wallets are protected using password-based, strong encryption, and are stored on the client. PKI-based Single Sign-On Oracle Advanced Security (formerly Advanced Networking Option) supports multiple single sign-on mechanisms, including Kerboros and DCE. Release 8.1.6 of Oracle Advanced Security enhances the single sign-on options available to customers by providing PKI-based single sign-on. In most cases, a user need never access a wallet once it has been configured, but can easily access his wallet using Oracle Enterprise Login Assistant, a very simple, easy-to-use login tool that hides the complexity of a private key and certificate from users. Users provide a password to Oracle Enterprise Login Assistant, which then opens the user’s encrypted wallet. The certificate and private key contained in an Oracle wallet are used to authenticate the user to multiple databases, which need no longer store and manage local passwords for users. Furthermore, authentication is transparent to the user, who need not provide any additional passwords once his wallet has been opened. Oracle Advanced Security offers enhanced PKI-based single sign-on through use of interoperable X.509 (version 3) certificates for authentication over Secure Sockets Layer (SSL), the standard for Internet authentication. In addition to strong user authentication, SSL also provides network data confidentiality (through encryption) and data integrity for multiple types of connections: LDAP , IIOP (Internet Intra-ORB Protocol), and Net8ℱ. PKI-based single sign-on over SSL can be used alone, or in conjunction with enterprise user management, described below. Enterprise User Management Enterprises today face tremendous challenges in managing information about users, keeping user information current, and securing access to all the information in an enterprise. Each user may have multiple accounts on different databases, requiring her to remember passwords for each of these accounts. Users not only have too many passwords, but there are too many accounts for administrators
  • 3. to manage. Furthermore, the lack of centralization is a security risk, because old or unused accounts and privileges can be misused. To address these challenges, Release 8.1.6 introduces enterprise user management. Enterprise users and their authorizations are managed in Oracle Internet Directory, an LDAP-based directory service, using Oracle Enterprise Security Manager, a tool accessible through Oracle Enterprise Manager. Enterprise users can be assigned enterprise roles (which are containers of database-specific global roles), that determine their access privileges in specific databases. For example, the enterprise role CLERK could contain the global role HRCLERK on the Human Resources database, and the global role ANALYST on the Payroll database. An enterprise role can be granted or revoked to one or more enterprise users. For example, an administrator could grant the enterprise role CLERK to a number of enterprise users who hold the same job. This information about users and roles is protected in the directory through Access Control Lists, ensuring that only a privileged administrator can manage users, and grant and revoke roles. Oracle’s LDAP version 3-compliant directory server, Oracle Internet Directory, is fully integrated with Oracle8i and supports “off-the-shelf” enterprise user management. Other LDAP directories, including Novell Directory Service (NDS) and Microsoft’s Active Directory for Windows 2000 will be certified to operate with Release 8.1.6. User/Schema Separation Single sign-on solutions address the “too many passwords” problem and generally result in both stronger authentication and an improved user experience. However, users all too often still need to have multiple accounts: one for each application, database, or network service which they access, and organizations must still expend large amounts of time and money creating, administering, and deleting these user accounts. Therefore, deploying a directory service for enterprise user management is only beneficial if you can actually reduce the number of user accounts; otherwise, the directory service is just another place to create user accounts! In general, users really do not need their own accounts - or their own schemas - in a database, they merely need to access an application schema. For example, suppose users John, Firuzeh and Jane are all users of the Payroll application, and they need access to the Payroll schema on the Finance database. None of them needs to create his or her own objects in the database; in fact, they need only access objects associated with the Payroll schema, such as the Employees table, the Salary table, and so forth. Release 8.1.6 allows you to separate users from schemas, so that many enterprise users can access a single, shared application schema. Instead of creating a user account (that is, a user schema) in each database a user needs to access, you need only create an enterprise user in the directory, and “point” or “map” the user to a shared schema that many other enterprise users can also access. For example, if John, Firuzeh and Jane all access the Sales database, you need only create a single schema in the database, e.g. ‘sales_application’ which all three enterprise users can access, instead of creating an account for each user on the Sales database. Enterprise users may also share schemas on multiple databases. For example, Firuzeh and Jane may also access the shared schema ‘financials’ on the General Ledger database. Organizations deploying Internet applications reap the greatest benefit of user/schema separation. These organizations want to have identified users, but cannot afford the management or storage Oracle Advanced Security: Security and Directory Integration Features Overview , Release 8.1.6 November 1999 3
  • 4. overhead of creating potentially hundreds of thousands of users, certainly not in the applications and databases behind their Internet front-end. However, directories excel at management, search, and retrieval of hundreds of thousand of user records. Creating “Internet application users” Ÿthat is, enterprise users Ÿ as directory entries gives organizations the benefit of keeping track of their users (and their users’ preferences), with high security and low overhead. The separation of users from schemas is truly the payoff for deploying a directory service. Thousands of users can connect to a database, be known to the database (and audited in the database), with specific privileges in the database, without being created in the database. Now, you can truly create an enterprise user once, in the directory Ÿ a single enterprise user account Ÿ who nonetheless can access multiple databases, using only the privileges she needs to perform her job. Enterprise user management thus offers the following benefits: Oracle Advanced Security: Security and Directory Integration Features Overview , Release 8.1.6 November 1999 4 · Fewer User Accounts Ÿ Enterprise users no longer need to be database users nor have identified schemas. · Internet Scalability Ÿ You can support hundreds of thousands of users, who are known to multiple databases, accountable (and audited in) multiple databases, without creating thousands of database user accounts. · Easily-Enforced Security Ÿ If a user changes jobs or leaves, his privileges can be altered or removed, everywhere, merely by changing his user entry in Oracle Internet Directory. Organizations no longer need to worry about “orphan” accounts or out-of-date privileges, which consume valuable system resources and are targets for hackers. · Reduced Cost of Ownership Ÿ Organizations save significant resources by managing a single enterprise user account and assigning enterprise roles once, instead of creating multiple user accounts with multiple passwords, each having multiple authorizations. Single Station Administration (SSA) Managing thousands of user accounts is one of the largest administration challenges facing large organizations. Creating user accounts and assigning privileges is often a multi-step process, requiring multiple tools. Significant new functionality has been added in Release 8.1.6 to address this need. Oracle Enterprise Security Manager (an extension to Oracle Enterprise Manager) provides single station administration. From a single console, an administrator can perform the following: · Create enterprise users in Oracle Internet Directory. · Create shared schemas in databases · Map enterprise users to shared schemas · Create enterprise roles that span multiple databases. · Assign one or more enterprise roles to a user. · Configure Access Control Lists on directory objects Oracle Enterprise Security Manager provides one tool for enterprise user management, resulting in a lower cost of user administration throughout the enterprise. Another benefit of single station administration is that if security is easy to administer, organizations are more likely to implement strong security throughout the enterprise.
  • 5. Oracle Advanced Security: Security and Directory Integration Features Overview , Release 8.1.6 November 1999 5 Robust Directory Services Oracle Internet Directory is a native LDAP version 3 implementation that combines the mission-critical strength of Oracle’s database technology with the flexibility of the Internet standard. Oracle Internet Directory is the default data repository for accessing Oracle8i enterprise user information, including enterprise roles and shared schema information. Oracle Internet Directory offers flexible, highly-granular access control mechanisms which protect the sensitivity of common application information as well as Oracle’s enterprise user information. Oracle Internet Directory’s Access Control Lists (ACLs) can be used to specify, at the attribute level, the users entitled to access and the type of access permitted. For example, a user’s manager may have read and write access to a user’s salary attribute, the user can read his own salary, but no other user has access to it. Oracle Internet Directory also offers configurable default, guest, and super-user permissions, to enable users to have “least privilege”Ÿ just the privileges they need to perform their jobs, and no more. Oracle Internet Directory can be automatically configured with the schema and required Access Control Lists (ACLs) the Oracle8i database needs for enterprise user management, Oracle Internet Directory exploits the built-in availability and performance of the underlying Oracle8i data server, as well as offering bulk loading, deletion, and updates of directory entries, high-speed backup and recovery tools, the ability to add or delete directory nodes without service disruption, and other high availability features. Availability Integrated security and directory services are available with Release 8.1.6 of Oracle Advanced Security, including Oracle Wallet Manager, Oracle Enterprise Login Assistant, Oracle Enterprise Security Manager, use of SSL for encryption, authentication and single sign-on, user/schema separation and the use of Oracle Internet Directory for enterprise user management. Oracle Internet Directory may also be purchased separately. Summary Oracle Advanced Security’s integration of security and directory services offers strong user authentication through standards-based single sign-on, and reduces users’ frustration with too many passwords. Administrators spend less time managing user accounts, because they are able to centrally administer users across multiple databases. The Single Enterprise User offers even greater benefits for organizations that need only create one account per user for the entire organization. Oracle environments may store their entire definition of a user, and the user’s roles and privileges, within a directory service. The Single Enterprise User enables organizations deploying Internet applications to support thousands of users securely, with reduced cost of ownership, and scale to tens of thousands, hundreds of thousands, or even millions of users over a distributed enterprise.
  • 6. Oracle Advanced Security: Security and Directory Integration Features Overview , Release 8.1.6 November 1999 6 Key Security and Directory Features Authentication · SSL offers strong, standards-based authentication and single sign-on to Oracle · Mutual authentication of databases over SSL · SSL authentication of Oracle8i to Oracle Internet Directory Management/Ease of Use · Single Station Administration of users across multiple Oracle8i databases using Oracle Enterprise Security Manager · Oracle Enterprise Login Assistant for easy-to- use single sign-on · Single Enterprise User defined and managed in a directory · Easy installation of certificates and certificate trustpoints using Oracle Wallet Manager · Bundled, well-integrated LDAP v3- compliant directory service · Default Access Control Lists Application Integration · Support for NDS and Active Directory · Support for multiple standards, including LDAP (version 3), X.509(version 3), and SSL Performance · Oracle Internet Directory leverages high availability and scalability of the underlying Oracle8i data server Encryption · SSL encryption of IIOP, LDAP, and Net8 connections
  • 7. Oracle Advanced Security: Security and Directory Integration Features Overview , Release 8.1.6 November 1999 7 Oracle Corporation World Headquarters 500 Oracle Parkway Redwood Shores, CA 94065 U.S.A. Worldwide Inquiries: +1.650.506.7000 Fax +1.650.506.7200 http://www.oracle.com/ Copyright © Oracle Corporation 1998 All Rights Reserved This document is provided for informational purposes only, and the information herein is subject to change without notice. Please report any errors herein to Oracle Corporation. Oracle Corporation does not provide any warranties covering and specifically disclaims any liability in connection with this document. Oracle is a registered trademark, and Enabling the Information Age, Oracle8I, Oracle7, Oracle8, and Net8 are trademarks of Oracle Corporation. All other company and product names mentioned are used for identification purposes only and may be trademarks of their respective owners.
  • 8. Oracle Advanced Security: Security and Directory Integration Features Overview , Release 8.1.6 November 1999 8