SlideShare una empresa de Scribd logo
1 de 47
Descargar para leer sin conexión
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Administering User Security
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Objectives
After completing this lesson, you should be able to:
• Create and manage database user accounts:
– Authenticate users
– Assign default storage areas (tablespaces)
• Grant and revoke privileges
• Create and manage roles
• Create and manage profiles:
– Implement standard password security features
– Control resource usage by users
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Database User Accounts
Each database user account has:
• A unique username
• An authentication method
• A default tablespace
• A temporary tablespace
• A user profile
• An initial consumer group
• An account status
A schema:
• Is a collection of database objects that are owned by a
database user
• Has the same name as the user account
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Predefined Administrative Accounts
• SYS account:
– Is granted the DBA role, as well as several other roles.
– Has all privileges with ADMIN OPTION
– Is required for startup, shutdown, and some
maintenance commands
– Owns the data dictionary and the Automatic Workload
Repository (AWR)
• SYSTEM account is granted the DBA, MGMT_USER, and
AQ_ADMINISTRATOR_ROLE roles.
• DBSNMP account is granted the OEM_MONITOR role.
• SYSMAN account is granted the MGMT_USER, RESOURCE
and SELECT_CATALOG_ROLE roles.
• These accounts are not used for routine operations.
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
SYSOPER and SYSDBA
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Creating a User
Select Server > Users, and then click the Create button.
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Authenticating Users
• Password
• External
• Global
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Fixed Database Links
• Create a public fixed database link:
• Use a public database link:
CREATE PUBLIC DATABASE LINK dblk_orcl10g_hr
CONNECT TO hr IDENTIFIED BY oracle USING
‘ORCL10g’;
SELECT * FROM employees@dblk_orcl10g_hr;
ORCL10g
connect hr/oracle
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Viewing Database Link Passwords
• A privileged user may view database link
passwords:
• The passwords for fixed links are stored in clear
text in 10g:
SELECT USERID,PASSWORD
FROM SYS.LINK$
WHERE PASSWORD IS NOT NULL;
USERID PASSWORD
---------- ----------
SYSTEM ORACLE
SCOTT TIGER
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Database Links Without Credentials
• Creating a connected user database link:
• Creating a current user database link:
CREATE DATABASE LINK sales.division3.acme.com
USING 'sales';
CREATE DATABASE LINK sales
CONNECT TO CURRENT_USER USING 'sales';
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Audit Database Links
Local database audits
jane
FINANCE
connect scott/tigerconnect jane/doe
Remote database audits
scott
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Administrator Authentication
Operating system security:
• DBAs must have the OS privileges to create and delete
files.
• Typical database users should not have the OS
privileges to create or delete database files.
Administrator security:
• For SYSDBA, SYSOPER, and SYSASM connections:
– DBA user by name is audited for password file and
strong authentication methods
– OS account name is audited for OS authentication
– OS authentication takes precedence over password file
authentication for privileged users
– Password file uses case-sensitive passwords
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Locking and Expiring Default
User Accounts
• The Database Configuration Assistant (DBCA)
expires and locks all accounts, except:
– SYS
– SYSTEM
– SYSMAN
– DBSNMP
• For a manual installation, lock and
expire accounts by using:
ALTER USER hr PASSWORD EXPIRE ACCOUNT LOCK;
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Privileges
There are two types of user privileges:
• System: Enables users to perform particular actions in
the database
• Object: Enables users to access and manipulate a
specific object
System privilege:
Create session
HR_DBA
Object privilege:
Update employees
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
System Privileges
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Object Privileges
To grant object privileges:
• Choose the object type.
• Select objects.
• Select privileges.
Search
and
select
objects.
1
2
3
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
GRANT
REVOKE
Revoking System Privileges
with ADMIN OPTION
REVOKE CREATE
TABLE FROM joe;
User
Privilege
Object
DBA Joe Emily
Joe EmilyDBA
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
GRANT
REVOKE
Revoking Object Privileges
with GRANT OPTION
Bob Joe Emily
EmilyJoeBob
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Benefits of Roles
• Easier privilege management
• Dynamic privilege management
• Selective availability of privileges
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Assigning Privileges to Roles and
Assigning Roles to Users
Users
Privileges
Roles HR_CLERKHR_MGR
Jenny David Rachel
Delete
employees.
Select
employees.
Update
employees.
Insert
employees.
Create
Job.
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Predefined Roles
Role Privileges Included
CONNECT CREATE SESSION
RESOURCE CREATE CLUSTER, CREATE INDEXTYPE, CREATE
OPERATOR, CREATE PROCEDURE, CREATE SEQUENCE,
CREATE TABLE, CREATE TRIGGER, CREATE TYPE
SCHEDULER_ ADMIN CREATE ANY JOB, CREATE EXTERNAL JOB, CREATE
JOB, EXECUTE ANY CLASS, EXECUTE ANY PROGRAM,
MANAGE SCHEDULER
DBA Most system privileges; several other roles. Do not grant
to nonadministrators.
SELECT_
CATALOG_ROLE
No system privileges; HS_ADMIN_ROLE and over 1,700
object privileges on the data dictionary
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Creating a Role
Select Server > Roles.
Click OK
when
finished.
Add privileges and roles
from the appropriate tab.
Add privileges and roles
from the appropriate tab.
Add privileges and roles
from the appropriate tab.
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
CREATE ROLE secure_application_role
IDENTIFIED USING <security_procedure_name>;
Secure Application Roles
• Roles can be nondefault and enabled when required.
• Roles can be protected
through authentication.
• Roles can also be secured programmatically.
SET ROLE vacationdba;
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Implementing a Secure Application Role
1. Create the role.
2. Create the package that sets the role:
a. Create the package specification.
b. Create the package body.
3. Grant the execute privilege on the package.
4. Write the application server code that sets the role.
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
CREATE ROLE oe_sales_rep
IDENTIFIED USING secure.oe_roles;
Step 1: Create the Role
• The CREATE ROLE command identifies the package
that sets the role.
• The package does not need to exist.
• Example:
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
CREATE OR REPLACE PACKAGE oe_roles
AUTHID CURRENT_USER
IS
PROCEDURE set_sales_rep_role;
END;
/
Step 2.1: Create the Package Specification
• The OE_ROLES package is referenced in the
CREATE ROLE command.
• The AUTHID CURRENT_USER clause is required to
properly set the role.
• Example:
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
...
SELECT id
INTO v_id
FROM oe.app_roles
WHERE username = sys_context
('userenv','current_user')
AND role = 'SALES_REP'
AND ip_address = sys_context
('userenv','ip_address');
dbms_session.set_role('oe_sales_rep');
...
Step 2.2: Create the Package Body
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
GRANT execute
ON oe_roles
TO appsrv;
Step 3: Grant the EXECUTE Privilege
on the Package
• The application server connects as the appsrv
user.
• It sets the role after it starts the user’s session.
• Example:
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Step 4: Write the Application Server
Code That Sets the Role
• When starting, the application server:
– Connects as the APPSRV user
– Creates a connection pool
• When starting a session for a user, the application
server:
– Gets a connection from the pool
– Starts a session for the user
– Sets the user’s role
• Set the user’s role by using:
secure.oe_roles.set_sales_rep_role;
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Data Dictionary Views
SQL> SELECT *
2 FROM dba_application_roles
3 WHERE ROLE = 'OE_SALES_REP';
ROLE SCHEMA PACKAGE
------------- ------- --------
OE_SALES_REP SECURE OE_ROLES
SQL>
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Assigning Roles to Users
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Quiz
All passwords created in Oracle Database 11g are not
case-sensitive by default.
1. True
2. False
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Quiz
A database role:
1. Can be enabled or disabled
2. Can consist of system and object privileges
3. Is owned by its creator
4. Cannot be protected by a password
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Profiles and Users
Users are assigned only
one profile at a time.
Profiles:
• Control resource
consumption
• Manage account
status and
password
expiration
Note: RESOURCE_LIMIT must be set to TRUE before profiles can impose
resource limitations.
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Implementing Password
Security Features
Password
history
Account
locking
Password aging
and expiration
Password
complexity
verification
User Setting up
profiles
Note: Do not use profiles that cause the SYS, SYSMAN, and DBSNMP
passwords to expire and the accounts to be locked.
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Creating a Password Profile
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Supplied Password Verification Function:
VERIFY_FUNCTION_11G
The VERIFY_FUNCTION_11G function insures that the
password is:
• At least eight characters
• Different from the username, username with a number,
or username reversed
• Different from the database name or the database
name with a number
• A string with at least one alphabetic and one numeric
character
• Different from the previous password by
at least three letters
Tip: Use this function as a template to create
your own customized password verification.
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Assigning Quotas to Users
Users who do not have the UNLIMITED TABLESPACE
system privilege must be given a quota before they can
create objects in a tablespace.
Quotas can be:
• A specific value in megabytes or kilobytes
• Unlimited
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Applying the Principle of Least Privilege
• Protect the data dictionary:
• Revoke unnecessary privileges from PUBLIC.
• Use access control lists (ACL) to control network
access.
• Restrict the directories accessible by users.
• Limit users with administrative privileges.
• Restrict remote database authentication:
O7_DICTIONARY_ACCESSIBILITY=FALSE
REMOTE_OS_AUTHENT=FALSE
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Protect Privileged Accounts
Privileged accounts can be protected by:
• Using password file with case-sensitive passwords
• Enabling strong authentication for administrator roles
SYSDBA
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Separation of Responsibilities
Users with DBA privileges must be trusted, but
separation of responsibilities can:
• Prevent abuse of trust
• Allow audit trails to protect the trusted position
To implement separation of trust:
• DBA responsibilities must be shared
• Accounts must never be shared
• DBA and system administrator must be different
people
• SYSOPER and SYSDBA responsibilities must be
separated.
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Quiz
Applying the principle of least privilege is not enough to
harden the Oracle database.
1. True
2. False
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Quiz
With RESOURCE_LIMIT set at its default value of FALSE,
profile password limitations are ignored.
1. True
2. False
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Summary
In this lesson, you should have learned how to:
• Create and manage database user accounts:
– Authenticate users
– Assign default storage areas (tablespaces)
• Grant and revoke privileges
• Create and manage roles
• Create and manage profiles:
– Implement standard password security features
– Control resource usage by users
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Q&A

Más contenido relacionado

La actualidad más candente

Securing Hadoop with OSSEC
Securing Hadoop with OSSECSecuring Hadoop with OSSEC
Securing Hadoop with OSSEC
Vic Hargrave
 
Isaca sql server 2008 r2 security & auditing
Isaca sql server 2008 r2 security & auditingIsaca sql server 2008 r2 security & auditing
Isaca sql server 2008 r2 security & auditing
Antonios Chatzipavlis
 
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout SuiteCloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
OWASP Kyiv
 
Whitepaper MS SQL Server on Linux
Whitepaper MS SQL Server on LinuxWhitepaper MS SQL Server on Linux
Whitepaper MS SQL Server on Linux
Roger Eisentrager
 

La actualidad más candente (20)

2019 Blackhat Booth Presentation - PowerUpSQL
2019 Blackhat Booth Presentation - PowerUpSQL2019 Blackhat Booth Presentation - PowerUpSQL
2019 Blackhat Booth Presentation - PowerUpSQL
 
DerbyCon2016 - Hacking SQL Server on Scale with PowerShell
DerbyCon2016 - Hacking SQL Server on Scale with PowerShellDerbyCon2016 - Hacking SQL Server on Scale with PowerShell
DerbyCon2016 - Hacking SQL Server on Scale with PowerShell
 
2016 aRcTicCON - Hacking SQL Server on Scale with PowerShell (Slide Updates)
2016 aRcTicCON - Hacking SQL Server on Scale with PowerShell (Slide Updates)2016 aRcTicCON - Hacking SQL Server on Scale with PowerShell (Slide Updates)
2016 aRcTicCON - Hacking SQL Server on Scale with PowerShell (Slide Updates)
 
Chapter 14 sql injection
Chapter 14 sql injectionChapter 14 sql injection
Chapter 14 sql injection
 
Présentation et démo ELK/SIEM/Wazuh
Présentation et démo ELK/SIEM/Wazuh Présentation et démo ELK/SIEM/Wazuh
Présentation et démo ELK/SIEM/Wazuh
 
Securing Hadoop with OSSEC
Securing Hadoop with OSSECSecuring Hadoop with OSSEC
Securing Hadoop with OSSEC
 
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using YubikeyPalo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
 
SqlSa94
SqlSa94SqlSa94
SqlSa94
 
Isaca sql server 2008 r2 security & auditing
Isaca sql server 2008 r2 security & auditingIsaca sql server 2008 r2 security & auditing
Isaca sql server 2008 r2 security & auditing
 
Oracle Audit vault
Oracle Audit vaultOracle Audit vault
Oracle Audit vault
 
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout SuiteCloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
 
Server hardening
Server hardeningServer hardening
Server hardening
 
Securing Windows web servers
Securing Windows web serversSecuring Windows web servers
Securing Windows web servers
 
Memory forensics cheat sheet
Memory forensics cheat sheetMemory forensics cheat sheet
Memory forensics cheat sheet
 
What's New in AlienVault v3.0?
What's New in AlienVault v3.0?What's New in AlienVault v3.0?
What's New in AlienVault v3.0?
 
Audit Vault Database Firewall 12.2.0.1.0 installation
Audit Vault Database Firewall 12.2.0.1.0 installationAudit Vault Database Firewall 12.2.0.1.0 installation
Audit Vault Database Firewall 12.2.0.1.0 installation
 
Whitepaper MS SQL Server on Linux
Whitepaper MS SQL Server on LinuxWhitepaper MS SQL Server on Linux
Whitepaper MS SQL Server on Linux
 
Install oracle database 12c software on windows
Install oracle database 12c software on windowsInstall oracle database 12c software on windows
Install oracle database 12c software on windows
 
BlueHat v18 || Malicious user profiling using a deep neural net
BlueHat v18 || Malicious user profiling using a deep neural netBlueHat v18 || Malicious user profiling using a deep neural net
BlueHat v18 || Malicious user profiling using a deep neural net
 
Trusted extensions-gdansk-v1 0
Trusted extensions-gdansk-v1 0Trusted extensions-gdansk-v1 0
Trusted extensions-gdansk-v1 0
 

Destacado (7)

Oracle Berkeley Db 11g R2
Oracle Berkeley Db 11g R2Oracle Berkeley Db 11g R2
Oracle Berkeley Db 11g R2
 
Osobní bezpečnost na internetu
Osobní bezpečnost na internetuOsobní bezpečnost na internetu
Osobní bezpečnost na internetu
 
Oracle db subprograms
Oracle db subprogramsOracle db subprograms
Oracle db subprograms
 
Auditing security of Oracle DB (Karel Miko)
Auditing security of Oracle DB (Karel Miko)Auditing security of Oracle DB (Karel Miko)
Auditing security of Oracle DB (Karel Miko)
 
Secure Technical Implementation Guide for databases by Martin Obst
Secure Technical Implementation Guide for databases by Martin ObstSecure Technical Implementation Guide for databases by Martin Obst
Secure Technical Implementation Guide for databases by Martin Obst
 
1 z0 052
1 z0 0521 z0 052
1 z0 052
 
Oracle Compute Cloud Service快速实践
Oracle Compute Cloud Service快速实践Oracle Compute Cloud Service快速实践
Oracle Compute Cloud Service快速实践
 

Similar a Oracle security 02-administering user security

Less06 users
Less06 usersLess06 users
Less06 users
Imran Ali
 
Reviewing sql server permissions tech republic
Reviewing sql server permissions   tech republicReviewing sql server permissions   tech republic
Reviewing sql server permissions tech republic
Kaing Menglieng
 
Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1...
 Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1... Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1...
Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1...
WebStackAcademy
 
Cache Security- Configuring a Secure Environment
Cache Security- Configuring a Secure EnvironmentCache Security- Configuring a Secure Environment
Cache Security- Configuring a Secure Environment
InterSystems Corporation
 

Similar a Oracle security 02-administering user security (20)

Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQLKangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
 
Less06 users
Less06 usersLess06 users
Less06 users
 
Oracle Database
Oracle DatabaseOracle Database
Oracle Database
 
Reviewing sql server permissions tech republic
Reviewing sql server permissions   tech republicReviewing sql server permissions   tech republic
Reviewing sql server permissions tech republic
 
98_364_Slides_Lesson05.ppt
98_364_Slides_Lesson05.ppt98_364_Slides_Lesson05.ppt
98_364_Slides_Lesson05.ppt
 
Dealing with SQL Security from ADO.NET
Dealing with SQL Security from ADO.NETDealing with SQL Security from ADO.NET
Dealing with SQL Security from ADO.NET
 
Securing your Oracle Fusion Middleware Environment, On-Prem and in the Cloud
Securing your Oracle Fusion Middleware Environment, On-Prem and in the CloudSecuring your Oracle Fusion Middleware Environment, On-Prem and in the Cloud
Securing your Oracle Fusion Middleware Environment, On-Prem and in the Cloud
 
Dealing with SQL Security from ADO.NET
Dealing with SQL Security from ADO.NETDealing with SQL Security from ADO.NET
Dealing with SQL Security from ADO.NET
 
Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1...
 Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1... Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1...
Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1...
 
Moodle + Adobe Connect
Moodle + Adobe Connect Moodle + Adobe Connect
Moodle + Adobe Connect
 
Where should I be encrypting my data?
Where should I be encrypting my data? Where should I be encrypting my data?
Where should I be encrypting my data?
 
Explore RBAC and PIM in M365
Explore RBAC and PIM in M365Explore RBAC and PIM in M365
Explore RBAC and PIM in M365
 
CQ Provisionning & Authoring
CQ Provisionning & AuthoringCQ Provisionning & Authoring
CQ Provisionning & Authoring
 
Ch 9 Attacking Data Stores (Part 2)
Ch 9 Attacking Data Stores (Part 2)Ch 9 Attacking Data Stores (Part 2)
Ch 9 Attacking Data Stores (Part 2)
 
Presentation database security enhancements with oracle
Presentation   database security enhancements with oraclePresentation   database security enhancements with oracle
Presentation database security enhancements with oracle
 
CNIT 129S Ch 9: Attacking Data Stores (Part 2 of 2)
CNIT 129S Ch 9: Attacking Data Stores (Part 2 of 2)CNIT 129S Ch 9: Attacking Data Stores (Part 2 of 2)
CNIT 129S Ch 9: Attacking Data Stores (Part 2 of 2)
 
Cache Security- Configuring a Secure Environment
Cache Security- Configuring a Secure EnvironmentCache Security- Configuring a Secure Environment
Cache Security- Configuring a Secure Environment
 
Geek Sync | SQL Security Principals and Permissions 101
Geek Sync | SQL Security Principals and Permissions 101Geek Sync | SQL Security Principals and Permissions 101
Geek Sync | SQL Security Principals and Permissions 101
 
RESETTING THE LOST ORACLE DBA PASSWORD
RESETTING THE LOST ORACLE DBA PASSWORDRESETTING THE LOST ORACLE DBA PASSWORD
RESETTING THE LOST ORACLE DBA PASSWORD
 
SQL Server 2016: Just a Few of Our DBA's Favorite Things
SQL Server 2016: Just a Few of Our DBA's Favorite ThingsSQL Server 2016: Just a Few of Our DBA's Favorite Things
SQL Server 2016: Just a Few of Our DBA's Favorite Things
 

Más de Zhaoyang Wang

Más de Zhaoyang Wang (20)

海通证券金融云思考与实践(数据技术嘉年华2017)
海通证券金融云思考与实践(数据技术嘉年华2017)海通证券金融云思考与实践(数据技术嘉年华2017)
海通证券金融云思考与实践(数据技术嘉年华2017)
 
云管理平台助力海通金融云建设
云管理平台助力海通金融云建设云管理平台助力海通金融云建设
云管理平台助力海通金融云建设
 
海通证券数据库备份恢复云平台实践(OTN Tour Shanghai 2017)
海通证券数据库备份恢复云平台实践(OTN Tour Shanghai 2017)海通证券数据库备份恢复云平台实践(OTN Tour Shanghai 2017)
海通证券数据库备份恢复云平台实践(OTN Tour Shanghai 2017)
 
Oracle Compute Cloud Service介绍
Oracle Compute Cloud Service介绍Oracle Compute Cloud Service介绍
Oracle Compute Cloud Service介绍
 
Oracle cloud 使用云市场快速搭建小型电商网站
Oracle cloud 使用云市场快速搭建小型电商网站Oracle cloud 使用云市场快速搭建小型电商网站
Oracle cloud 使用云市场快速搭建小型电商网站
 
Oracle cloud ravello介绍及测试账户申请
Oracle cloud ravello介绍及测试账户申请Oracle cloud ravello介绍及测试账户申请
Oracle cloud ravello介绍及测试账户申请
 
Oracle cloud 云介绍及测试账户申请
Oracle cloud 云介绍及测试账户申请Oracle cloud 云介绍及测试账户申请
Oracle cloud 云介绍及测试账户申请
 
New awesome features in MySQL 5.7
New awesome features in MySQL 5.7New awesome features in MySQL 5.7
New awesome features in MySQL 5.7
 
Performance Tuning Tool01-Statspack
Performance Tuning Tool01-StatspackPerformance Tuning Tool01-Statspack
Performance Tuning Tool01-Statspack
 
SQL Tuning02-Intorduction to the CBO Optimizer
SQL Tuning02-Intorduction to the CBO OptimizerSQL Tuning02-Intorduction to the CBO Optimizer
SQL Tuning02-Intorduction to the CBO Optimizer
 
SQL Tuning04-Interpreting Execution Plans
SQL Tuning04-Interpreting Execution PlansSQL Tuning04-Interpreting Execution Plans
SQL Tuning04-Interpreting Execution Plans
 
SQL Tuning01-Introduction to SQL Tuning
SQL Tuning01-Introduction to SQL TuningSQL Tuning01-Introduction to SQL Tuning
SQL Tuning01-Introduction to SQL Tuning
 
MySQL Fulltext Search Tutorial
MySQL Fulltext Search TutorialMySQL Fulltext Search Tutorial
MySQL Fulltext Search Tutorial
 
Data Organization in InnoDB
Data Organization in InnoDBData Organization in InnoDB
Data Organization in InnoDB
 
Oracle enterprise manager cloud control 12c release 5 installation on oracle ...
Oracle enterprise manager cloud control 12c release 5 installation on oracle ...Oracle enterprise manager cloud control 12c release 5 installation on oracle ...
Oracle enterprise manager cloud control 12c release 5 installation on oracle ...
 
Oracle enterprise manager cloud control 12c r5 agent installation
Oracle enterprise manager cloud control 12c r5 agent installationOracle enterprise manager cloud control 12c r5 agent installation
Oracle enterprise manager cloud control 12c r5 agent installation
 
Why use MySQL
Why use MySQLWhy use MySQL
Why use MySQL
 
MYSQLCLONE Introduction
MYSQLCLONE IntroductionMYSQLCLONE Introduction
MYSQLCLONE Introduction
 
Interpreting execution plans
Interpreting execution plansInterpreting execution plans
Interpreting execution plans
 
Intorduction to the cbo optimizer
Intorduction to the cbo optimizerIntorduction to the cbo optimizer
Intorduction to the cbo optimizer
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Oracle security 02-administering user security

  • 1. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Administering User Security
  • 2. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Objectives After completing this lesson, you should be able to: • Create and manage database user accounts: – Authenticate users – Assign default storage areas (tablespaces) • Grant and revoke privileges • Create and manage roles • Create and manage profiles: – Implement standard password security features – Control resource usage by users
  • 3. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Database User Accounts Each database user account has: • A unique username • An authentication method • A default tablespace • A temporary tablespace • A user profile • An initial consumer group • An account status A schema: • Is a collection of database objects that are owned by a database user • Has the same name as the user account
  • 4. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Predefined Administrative Accounts • SYS account: – Is granted the DBA role, as well as several other roles. – Has all privileges with ADMIN OPTION – Is required for startup, shutdown, and some maintenance commands – Owns the data dictionary and the Automatic Workload Repository (AWR) • SYSTEM account is granted the DBA, MGMT_USER, and AQ_ADMINISTRATOR_ROLE roles. • DBSNMP account is granted the OEM_MONITOR role. • SYSMAN account is granted the MGMT_USER, RESOURCE and SELECT_CATALOG_ROLE roles. • These accounts are not used for routine operations.
  • 5. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com SYSOPER and SYSDBA
  • 6. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Creating a User Select Server > Users, and then click the Create button.
  • 7. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Authenticating Users • Password • External • Global
  • 8. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Fixed Database Links • Create a public fixed database link: • Use a public database link: CREATE PUBLIC DATABASE LINK dblk_orcl10g_hr CONNECT TO hr IDENTIFIED BY oracle USING ‘ORCL10g’; SELECT * FROM employees@dblk_orcl10g_hr; ORCL10g connect hr/oracle
  • 9. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Viewing Database Link Passwords • A privileged user may view database link passwords: • The passwords for fixed links are stored in clear text in 10g: SELECT USERID,PASSWORD FROM SYS.LINK$ WHERE PASSWORD IS NOT NULL; USERID PASSWORD ---------- ---------- SYSTEM ORACLE SCOTT TIGER
  • 10. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Database Links Without Credentials • Creating a connected user database link: • Creating a current user database link: CREATE DATABASE LINK sales.division3.acme.com USING 'sales'; CREATE DATABASE LINK sales CONNECT TO CURRENT_USER USING 'sales';
  • 11. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Audit Database Links Local database audits jane FINANCE connect scott/tigerconnect jane/doe Remote database audits scott
  • 12. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Administrator Authentication Operating system security: • DBAs must have the OS privileges to create and delete files. • Typical database users should not have the OS privileges to create or delete database files. Administrator security: • For SYSDBA, SYSOPER, and SYSASM connections: – DBA user by name is audited for password file and strong authentication methods – OS account name is audited for OS authentication – OS authentication takes precedence over password file authentication for privileged users – Password file uses case-sensitive passwords
  • 13. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Locking and Expiring Default User Accounts • The Database Configuration Assistant (DBCA) expires and locks all accounts, except: – SYS – SYSTEM – SYSMAN – DBSNMP • For a manual installation, lock and expire accounts by using: ALTER USER hr PASSWORD EXPIRE ACCOUNT LOCK;
  • 14. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Privileges There are two types of user privileges: • System: Enables users to perform particular actions in the database • Object: Enables users to access and manipulate a specific object System privilege: Create session HR_DBA Object privilege: Update employees
  • 15. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com System Privileges
  • 16. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Object Privileges To grant object privileges: • Choose the object type. • Select objects. • Select privileges. Search and select objects. 1 2 3
  • 17. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com GRANT REVOKE Revoking System Privileges with ADMIN OPTION REVOKE CREATE TABLE FROM joe; User Privilege Object DBA Joe Emily Joe EmilyDBA
  • 18. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com GRANT REVOKE Revoking Object Privileges with GRANT OPTION Bob Joe Emily EmilyJoeBob
  • 19. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Benefits of Roles • Easier privilege management • Dynamic privilege management • Selective availability of privileges
  • 20. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Assigning Privileges to Roles and Assigning Roles to Users Users Privileges Roles HR_CLERKHR_MGR Jenny David Rachel Delete employees. Select employees. Update employees. Insert employees. Create Job.
  • 21. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Predefined Roles Role Privileges Included CONNECT CREATE SESSION RESOURCE CREATE CLUSTER, CREATE INDEXTYPE, CREATE OPERATOR, CREATE PROCEDURE, CREATE SEQUENCE, CREATE TABLE, CREATE TRIGGER, CREATE TYPE SCHEDULER_ ADMIN CREATE ANY JOB, CREATE EXTERNAL JOB, CREATE JOB, EXECUTE ANY CLASS, EXECUTE ANY PROGRAM, MANAGE SCHEDULER DBA Most system privileges; several other roles. Do not grant to nonadministrators. SELECT_ CATALOG_ROLE No system privileges; HS_ADMIN_ROLE and over 1,700 object privileges on the data dictionary
  • 22. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Creating a Role Select Server > Roles. Click OK when finished. Add privileges and roles from the appropriate tab. Add privileges and roles from the appropriate tab. Add privileges and roles from the appropriate tab.
  • 23. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com CREATE ROLE secure_application_role IDENTIFIED USING <security_procedure_name>; Secure Application Roles • Roles can be nondefault and enabled when required. • Roles can be protected through authentication. • Roles can also be secured programmatically. SET ROLE vacationdba;
  • 24. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Implementing a Secure Application Role 1. Create the role. 2. Create the package that sets the role: a. Create the package specification. b. Create the package body. 3. Grant the execute privilege on the package. 4. Write the application server code that sets the role.
  • 25. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com CREATE ROLE oe_sales_rep IDENTIFIED USING secure.oe_roles; Step 1: Create the Role • The CREATE ROLE command identifies the package that sets the role. • The package does not need to exist. • Example:
  • 26. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com CREATE OR REPLACE PACKAGE oe_roles AUTHID CURRENT_USER IS PROCEDURE set_sales_rep_role; END; / Step 2.1: Create the Package Specification • The OE_ROLES package is referenced in the CREATE ROLE command. • The AUTHID CURRENT_USER clause is required to properly set the role. • Example:
  • 27. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com ... SELECT id INTO v_id FROM oe.app_roles WHERE username = sys_context ('userenv','current_user') AND role = 'SALES_REP' AND ip_address = sys_context ('userenv','ip_address'); dbms_session.set_role('oe_sales_rep'); ... Step 2.2: Create the Package Body
  • 28. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com GRANT execute ON oe_roles TO appsrv; Step 3: Grant the EXECUTE Privilege on the Package • The application server connects as the appsrv user. • It sets the role after it starts the user’s session. • Example:
  • 29. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Step 4: Write the Application Server Code That Sets the Role • When starting, the application server: – Connects as the APPSRV user – Creates a connection pool • When starting a session for a user, the application server: – Gets a connection from the pool – Starts a session for the user – Sets the user’s role • Set the user’s role by using: secure.oe_roles.set_sales_rep_role;
  • 30. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Data Dictionary Views SQL> SELECT * 2 FROM dba_application_roles 3 WHERE ROLE = 'OE_SALES_REP'; ROLE SCHEMA PACKAGE ------------- ------- -------- OE_SALES_REP SECURE OE_ROLES SQL>
  • 31. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Assigning Roles to Users
  • 32. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Quiz All passwords created in Oracle Database 11g are not case-sensitive by default. 1. True 2. False
  • 33. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Quiz A database role: 1. Can be enabled or disabled 2. Can consist of system and object privileges 3. Is owned by its creator 4. Cannot be protected by a password
  • 34. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Profiles and Users Users are assigned only one profile at a time. Profiles: • Control resource consumption • Manage account status and password expiration Note: RESOURCE_LIMIT must be set to TRUE before profiles can impose resource limitations.
  • 35. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Implementing Password Security Features Password history Account locking Password aging and expiration Password complexity verification User Setting up profiles Note: Do not use profiles that cause the SYS, SYSMAN, and DBSNMP passwords to expire and the accounts to be locked.
  • 36. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Creating a Password Profile
  • 37. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Supplied Password Verification Function: VERIFY_FUNCTION_11G The VERIFY_FUNCTION_11G function insures that the password is: • At least eight characters • Different from the username, username with a number, or username reversed • Different from the database name or the database name with a number • A string with at least one alphabetic and one numeric character • Different from the previous password by at least three letters Tip: Use this function as a template to create your own customized password verification.
  • 38. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Assigning Quotas to Users Users who do not have the UNLIMITED TABLESPACE system privilege must be given a quota before they can create objects in a tablespace. Quotas can be: • A specific value in megabytes or kilobytes • Unlimited
  • 39. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Applying the Principle of Least Privilege • Protect the data dictionary: • Revoke unnecessary privileges from PUBLIC. • Use access control lists (ACL) to control network access. • Restrict the directories accessible by users. • Limit users with administrative privileges. • Restrict remote database authentication: O7_DICTIONARY_ACCESSIBILITY=FALSE REMOTE_OS_AUTHENT=FALSE
  • 40. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Protect Privileged Accounts Privileged accounts can be protected by: • Using password file with case-sensitive passwords • Enabling strong authentication for administrator roles SYSDBA
  • 41. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Separation of Responsibilities Users with DBA privileges must be trusted, but separation of responsibilities can: • Prevent abuse of trust • Allow audit trails to protect the trusted position To implement separation of trust: • DBA responsibilities must be shared • Accounts must never be shared • DBA and system administrator must be different people • SYSOPER and SYSDBA responsibilities must be separated.
  • 42. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
  • 43. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
  • 44. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Quiz Applying the principle of least privilege is not enough to harden the Oracle database. 1. True 2. False
  • 45. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Quiz With RESOURCE_LIMIT set at its default value of FALSE, profile password limitations are ignored. 1. True 2. False
  • 46. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Summary In this lesson, you should have learned how to: • Create and manage database user accounts: – Authenticate users – Assign default storage areas (tablespaces) • Grant and revoke privileges • Create and manage roles • Create and manage profiles: – Implement standard password security features – Control resource usage by users
  • 47. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Q&A