Skip Headers
Oracle® Database Vault Administrator's Guide
11g Release 1 (11.1)
Part Number B31222-06
Home
Book List
Index
Master Index
Contact Us
Next
View PDF
Contents
List of Examples
List of Figures
List of Tables
Title and Copyright Information
Preface
Audience
Documentation Accessibility
Related Documents
Conventions
1
Introducing Oracle Database Vault
1.1
What Is Oracle Database Vault?
1.2
Components of Oracle Database Vault
1.2.1
Oracle Database Vault Access Control Components
1.2.2
Oracle Database Vault Administrator (DVA)
1.2.3
Oracle Database Vault Configuration Assistant (DVCA)
1.2.4
Oracle Database Vault DVSYS and DVF Schemas
1.2.5
Oracle Database Vault PL/SQL Interfaces and Packages
1.2.6
Oracle Database Vault and Oracle Label Security PL/SQL APIs
1.2.7
Oracle Database Vault Reporting and Monitoring Tools
1.3
How Oracle Database Vault Addresses Compliance Regulations
1.4
How Oracle Database Vault Addresses Insider Threats
1.5
How Oracle Database Vault Allows for Flexible Security Policies
1.6
How Oracle Database Vault Addresses Database Consolidation Concerns
2
What to Expect After You Install Oracle Database Vault
2.1
Initialization and Password Parameter Settings That Change
2.2
How Oracle Database Vault Restricts User Authorizations
2.3
Using New Database Roles to Enforce Separation of Duties
2.4
Privileges That Are Revoked or Prevented from Existing Users and Roles
3
Getting Started with Oracle Database Vault
3.1
Starting Oracle Database Vault Administrator
3.2
Quick Start Tutorial: Securing a Schema from DBA Access
3.2.1
Step 1: Adding the SYSTEM User to the Data Dictionary Realm
3.2.2
Step 2: Log On as SYSTEM to Access the HR Schema
3.2.3
Step 3: Create a Realm
3.2.4
Step 4: Secure the EMPLOYEES Table in the HR Schema
3.2.5
Step 5: Create an Authorization for the Realm
3.2.6
Step 6: Test the Realm
3.2.7
Step 7: Run a Report
3.2.8
Step 8: Remove the Components for This Tutorial
4
Configuring Realms
4.1
What Are Realms?
4.2
Default Realms
4.3
Creating a Realm
4.4
Editing a Realm
4.5
Creating Realm-Secured Objects
4.6
Defining Realm Authorization
4.7
Disabling and Enabling a Realm
4.8
Deleting a Realm
4.9
How Realms Work
4.10
How Authorizations Work in a Realm
4.11
Example of How Realms Work
4.12
How Realms Affect Other Oracle Database Vault Components
4.13
Guidelines for Designing Realms
4.14
How Realms Affect Performance
4.15
Related Reports and Data Dictionary Views
5
Configuring Rule Sets
5.1
What Are Rule Sets?
5.2
Default Rule Sets
5.3
Creating a Rule Set
5.4
Configuring or Editing a Rule Set
5.5
Creating a Rule to Add to a Rule Set
5.5.1
Creating a New Rule
5.5.2
Adding Existing Rules to a Rule Set
5.6
Deleting a Rule Set
5.7
How Rule Sets Work
5.7.1
How Oracle Database Vault Evaluates Rules
5.7.2
Improving Performance by Setting the Order in Which Rules Appear in a Rule Set
5.7.3
Nesting Rules Within a Rule Set
5.7.4
Creating Rules to Apply to Everyone Except One User
5.8
Tutorial: Creating an E-mail Alert for Security Violations
5.8.1
Step 1: Install and Configure the UTL_MAIL PL/SQL Package
5.8.2
Step 2: Create an E-mail Security Alert PL/SQL Procedure
5.8.3
Step 3: Configure an Access Control List File for Network Services
5.8.4
Step 4: Create a Rule Set and a Command Rule to Use the E-mail Security Alert
5.8.5
Step 5: Test the E-mail Security Alert
5.8.6
Step 6: Remove the Components for This Tutorial
5.9
Guidelines for Designing Rule Sets
5.10
How Rule Sets Affect Performance
5.11
Related Reports and Data Dictionary Views
6
Configuring Command Rules
6.1
What Are Command Rules?
6.2
Default Command Rules
6.3
SQL Statements That Can Be Protected by Command Rules
6.4
Creating and Editing a Command Rule
6.5
Deleting a Command Rule
6.6
How Command Rules Work
6.7
Tutorial: Using a Command Rule to Control Table Creations by a User
6.7.1
Step 1: Connect as User SCOTT and Create a Table
6.7.2
Step 2: Connect Using the DVOWNER Role and Create a Command Rule
6.7.3
Step 3: Test the Command Rule
6.7.4
Step 4: Remove the Components for this Tutorial
6.8
Guidelines for Configuring Command Rules for SQL Statements
6.9
How Command Rules Affect Performance
6.10
Related Reports and Data Dictionary View
7
Configuring Factors
7.1
What Are Factors?
7.2
Default Factors
7.3
Creating a Factor
7.4
Editing a Factor
7.5
Adding an Identity to a Factor
7.5.1
About Factor Identities
7.5.2
Creating and Configuring a Factor Identity
7.5.3
Using Identity Mapping to Configure an Identity to Use Other Factors
7.6
Deleting a Factor
7.7
How Factors Work
7.7.1
How Factors Are Processed When a Session Is Established
7.7.2
How Factors Are Retrieved
7.7.3
How Factors Are Set
7.8
Tutorial: Preventing Ad Hoc Tool Access to the Database
7.8.1
Step 1: Enable the SCOTT User Account
7.8.2
Step 2: Create the Module Factor
7.8.3
Step 3: Create the Limit SQL*Plus Access Rule and Rule Set
7.8.4
Step 4: Create the CONNECT Command Rule
7.8.5
Step 5: Test the Ad Hoc Tool Access Restriction
7.8.6
Step 6: Remove the Components for This Tutorial
7.9
Tutorial: Restricting User Activities Based on Session Data
7.9.1
Step 1: Create an Administrative User
7.9.2
Step 2: Add Identities to the Domain Factor
7.9.3
Step 3: Map the Domain Factor Identities to the Client_IP Factor
7.9.4
Step 4: Create a Rule Set to Set the Hours and Select the Factor Identity
7.9.5
Step 5: Create a Command Rule That Uses the Rule Set
7.9.6
Step 6: Test the Factor Identity Settings
7.9.7
Step 7: Remove the Components for This Tutorial
7.10
Guidelines for Designing Factors
7.11
How Factors Affect Performance
7.12
Related Reports and Data Dictionary Views
8
Configuring Secure Application Roles for Oracle Database Vault
8.1
What Are Secure Application Roles in Oracle Database Vault?
8.2
Creating and Editing Secure Application Roles
8.3
Securing a Secure Application Role
8.4
Deleting a Secure Application Role
8.5
How Secure Application Roles Work
8.6
Tutorial: Granting Access with Database Vault Secure Application Roles
8.6.1
Step 1: Create Users for This Tutorial
8.6.2
Step 2: Enable the OE User Account
8.6.3
Step 3: Create the Rule Set and Its Rules
8.6.4
Step 4: Create the Database Vault Secure Application Role
8.6.5
Step 5: Grant the SELECT Privilege to the Secure Application Role
8.6.6
Step 6: Test the Database Vault Secure Application Role
8.6.7
Step 7: Remove the Components for This Tutorial
8.7
How Secure Application Roles Affect Performance
8.8
Related Reports and Data Dictionary View
9
Integrating Oracle Database Vault with Other Oracle Products
9.1
Integrating Oracle Database Vault with Enterprise User Security
9.2
Integrating Oracle Database Vault with Transparent Data Encryption
9.3
Attaching Factors to an Oracle Virtual Private Database
9.4
Integrating Oracle Database Vault with Oracle Label Security
9.4.1
How Oracle Database Vault Is Integrated with Oracle Label Security
9.4.2
Requirements for Using Oracle Database Vault with Oracle Label Security
9.4.3
Using an Oracle Database Vault Factor with an Oracle Label Security Policy
9.4.4
Tutorial: Integrating Oracle Database Vault with Oracle Label Security
9.4.4.1
Step 1: Create Users for This Tutorial
9.4.4.2
Step 2: Create the Oracle Label Security Policy
9.4.4.3
Step 3: Create Oracle Database Vault Rules to Control the OLS Authorization
9.4.4.4
Step 4: Update the ALTER SYSTEM Command Rule to Use the Rule Set
9.4.4.5
Step 5: Test the Authorizations
9.4.4.6
Step 6: Remove the Components for This Tutorial
9.4.5
Related Reports and Data Dictionary Views
10
Oracle Database Vault Objects
10.1
Oracle Database Vault Schemas
10.1.1
DVSYS Schema
10.1.2
DVF Schema
10.2
Oracle Database Vault Roles
10.2.1
About Oracle Database Vault Roles
10.2.2
Oracle Database Vault Owner Role, DV_OWNER
10.2.3
Oracle Database Vault Realm DBA Role, DV_REALM_OWNER
10.2.4
Oracle Database Vault Application Resource Owner Role, DV_REALM_RESOURCE
10.2.5
Oracle Database Vault Configuration Administrator Role, DV_ADMIN
10.2.6
Oracle Database Vault Account Manager Role, DV_ACCTMGR
10.2.7
Oracle Database Vault PUBLIC Role, DV_PUBLIC
10.2.8
Oracle Database Vault Security Analyst Role, DV_SECANALYST
10.3
Oracle Database Vault Accounts
10.4
Oracle Database Vault Data Dictionary Views
10.4.1
DBA_DV_CODE View
10.4.2
DBA_DV_COMMAND_RULE View
10.4.3
DBA_DV_FACTOR View
10.4.4
DBA_DV_FACTOR_LINK View
10.4.5
DBA_DV_FACTOR_TYPE View
10.4.6
DBA_DV_IDENTITY View
10.4.7
DBA_DV_IDENTITY_MAP View
10.4.8
DBA_DV_MAC_POLICY View
10.4.9
DBA_DV_MAC_POLICY_FACTOR View
10.4.10
DBA_DV_POLICY_LABEL View
10.4.11
DBA_DV_PUB_PRIVS View
10.4.12
DBA_DV_REALM View
10.4.13
DBA_DV_REALM_AUTH View
10.4.14
DBA_DV_REALM_OBJECT View
10.4.15
DBA_DV_ROLE View
10.4.16
DBA_DV_RULE View
10.4.17
DBA_DV_RULE_SET View
10.4.18
DBA_DV_RULE_SET_RULE View
10.4.19
DBA_DV_USER_PRIVS View
10.4.20
DBA_DV_USER_PRIVS_ALL View
11
Using the DVSYS.DBMS_MACADM Package
11.1
About the DVSYS.DBMS_MACADM Package
11.2
Realm Procedures Within DVSYS.DBMS_MACADM
11.2.1
ADD_AUTH_TO_REALM Procedure
11.2.2
ADD_AUTH_TO_REALM Procedure
11.2.3
ADD_AUTH_TO_REALM Procedure
11.2.4
ADD_AUTH_TO_REALM Procedure
11.2.5
ADD_OBJECT_TO_REALM Procedure
11.2.6
CREATE_REALM Procedure
11.2.7
DELETE_AUTH_FROM_REALM Procedure
11.2.8
DELETE_OBJECT_FROM_REALM Procedure
11.2.9
DELETE_REALM Procedure
11.2.10
DELETE_REALM_CASCADE Procedure
11.2.11
RENAME_REALM Procedure
11.2.12
UPDATE_REALM Procedure
11.2.13
UPDATE_REALM_AUTH Procedure
11.3
Rule Set Procedures Within DVSYS.DBMS_MACADM
11.3.1
ADD_RULE_TO_RULE_SET Procedure
11.3.2
ADD_RULE_TO_RULE_SET Procedure
11.3.3
ADD_RULE_TO_RULE_SET Procedure
11.3.4
CREATE_RULE Procedure
11.3.5
CREATE_RULE_SET Procedure
11.3.6
DELETE_RULE Procedure
11.3.7
DELETE_RULE_FROM_RULE_SET Procedure
11.3.8
DELETE_RULE_SET Procedure
11.3.9
RENAME_RULE Procedure
11.3.10
RENAME_RULE_SET Procedure
11.3.11
SYNC_RULES Procedure
11.3.12
UPDATE_RULE Procedure
11.3.13
UPDATE_RULE_SET Procedure
11.4
Command Rule Procedures Within DVSYS.DBMS_MACADM
11.4.1
CREATE_COMMAND_RULE Procedure
11.4.2
DELETE_COMMAND_RULE Procedure
11.4.3
UPDATE_COMMAND_RULE Procedure
11.5
Factor Procedures and Functions Within DVSYS.DBMS_MACADM
11.5.1
ADD_FACTOR_LINK Procedure
11.5.2
ADD_POLICY_FACTOR Procedure
11.5.3
CHANGE_IDENTITY_FACTOR Procedure
11.5.4
CHANGE_IDENTITY_VALUE Procedure
11.5.5
CREATE_DOMAIN_IDENTITY Procedure
11.5.6
CREATE_FACTOR Procedure
11.5.7
CREATE_FACTOR_TYPE Procedure
11.5.8
CREATE_IDENTITY Procedure
11.5.9
CREATE_IDENTITY_MAP Procedure
11.5.10
DELETE_FACTOR Procedure
11.5.11
DELETE_FACTOR_LINK Procedure
11.5.12
DELETE_FACTOR_TYPE Procedure
11.5.13
DELETE_IDENTITY Procedure
11.5.14
DELETE_IDENTITY_MAP Procedure
11.5.15
DROP_DOMAIN_IDENTITY Procedure
11.5.16
GET_INSTANCE_INFO Function
11.5.17
GET_SESSION_INFO Function
11.5.18
RENAME_FACTOR Procedure
11.5.19
RENAME_FACTOR_TYPE Procedure
11.5.20
UPDATE_FACTOR Procedure
11.5.21
UPDATE_FACTOR_TYPE Procedure
11.5.22
UPDATE_IDENTITY Procedure
11.6
Secure Application Role Procedures Within DVSYS.DBMS_MACADM
11.6.1
CREATE_ROLE Procedure
11.6.2
DELETE_ROLE Procedure
11.6.3
RENAME_ROLE Procedure
11.6.4
UPDATE_ROLE Procedure
11.7
Oracle Label Security Policy Procedures Within DVSYS.DBMS_MACADM
11.7.1
CREATE_MAC_POLICY Procedure
11.7.2
CREATE_POLICY_LABEL Procedure
11.7.3
DELETE_MAC_POLICY_CASCADE Procedure
11.7.4
DELETE_POLICY_FACTOR Procedure
11.7.5
DELETE_POLICY_LABEL Procedure
11.7.6
UPDATE_MAC_POLICY Procedure
12
Using the DVSYS.DBMS_MACSEC_ROLES Package
12.1
About the DVSYS.DBMS_MACSEC_ROLES Package
12.2
CAN_SET_ROLE Function
12.3
SET_ROLE Procedure
13
Using the DVSYS.DBMS_MACUTL Package
13.1
About the DVSYS.DBMS_MACUTL Package
13.2
DVSYS.DBMS_MACUTL Constants
13.2.1
DVSYS.DBMS_MACUTL Listing of Constants
13.2.2
Examples of Using the DVSYS.DBMS_MACUTL Constants
13.3
Procedures and Functions Within the DVSYS.DBMS_MACUTL Package
13.3.1
CHECK_DVSYS_DML_ALLOWED Procedure
13.3.2
GET_CODE_VALUE Function
13.3.3
GET_SECOND Function
13.3.4
GET_MINUTE Function
13.3.5
GET_HOUR Function
13.3.6
GET_DAY Function
13.3.7
GET_MONTH Function
13.3.8
GET_YEAR Function
13.3.9
GET_SQL_TEXT Function
13.3.10
IS_ALPHA Function
13.3.11
IS_DIGIT Function
13.3.12
IS_DVSYS_OWNER Function
13.3.13
IS_OLS_INSTALLED Function
13.3.14
IS_OLS_INSTALLED_VARCHAR Function
13.3.15
USER_HAS_OBJECT_PRIVILEGE Function
13.3.16
USER_HAS_ROLE Function
13.3.17
USER_HAS_ROLE_VARCHAR Function
13.3.18
USER_HAS_SYSTEM_PRIVILEGE Function
14
Using the Oracle Database Vault PL/SQL Interfaces
14.1
Oracle Database Vault Run-Time PL/SQL Procedures and Functions
14.1.1
SET_FACTOR Procedure
14.1.2
GET_FACTOR Function
14.1.3
GET_TRUST_LEVEL Function
14.1.4
GET_TRUST_LEVEL_FOR_IDENTITY Function
14.1.5
ROLE_IS_ENABLED Function
14.1.6
GET_FACTOR_LABEL Function
14.2
Oracle Database Vault PL/SQL Factor Functions
14.3
Oracle Database Vault PL/SQL Rule Functions
14.4
Oracle Database Vault PL/SQL Packages
15
Monitoring Oracle Database Vault
15.1
Security Violation Attempts
15.2
Database Configuration and Structural Changes
15.3
Security Policy Changes by Category
15.4
Security Policy Changes Detail
16
Oracle Database Vault Reports
16.1
Categories of Oracle Database Vault Reports
16.2
Who Can Run the Oracle Database Vault Reports?
16.3
How to Run Oracle Database Vault Reports
16.4
Generating Oracle Database Vault Reports
16.4.1
Oracle Database Vault Configuration Issues Reports
16.4.1.1
Command Rule Configuration Issues Report
16.4.1.2
Factor Configuration Issues Report
16.4.1.3
Factor Without Identities Report
16.4.1.4
Identity Configuration Issues Report
16.4.1.5
Realm Authorization Configuration Issues Report
16.4.1.6
Rule Set Configuration Issues Report
16.4.1.7
Secure Application Configuration Issues Report
16.4.2
Oracle Database Vault Auditing Reports
16.4.2.1
Realm Audit Report
16.4.2.2
Command Rule Audit Report
16.4.2.3
Factor Audit Report
16.4.2.4
Label Security Integration Audit Report
16.4.2.5
Core Database Vault Audit Trail Report
16.4.2.6
Secure Application Role Audit Report
16.5
Generating General Security Reports
16.5.1
Object Privilege Reports
16.5.1.1
Object Access By PUBLIC Report
16.5.1.2
Object Access Not By PUBLIC Report
16.5.1.3
Direct Object Privileges Report
16.5.1.4
Object Dependencies Report
16.5.2
Database Account System Privileges Reports
16.5.2.1
Direct System Privileges By Database Account Report
16.5.2.2
Direct and Indirect System Privileges By Database Account Report
16.5.2.3
Hierarchical System Privileges by Database Account Report
16.5.2.4
ANY System Privileges for Database Accounts Report
16.5.2.5
System Privileges By Privilege Report
16.5.3
Sensitive Objects Reports
16.5.3.1
Execute Privileges to Strong SYS Packages Report
16.5.3.2
Access to Sensitive Objects Report
16.5.3.3
Public Execute Privilege To SYS PL/SQL Procedures Report
16.5.3.4
Accounts with SYSDBA/SYSOPER Privilege Report
16.5.4
Privilege Management - Summary Reports
16.5.4.1
Privileges Distribution By Grantee Report
16.5.4.2
Privileges Distribution By Grantee, Owner Report
16.5.4.3
Privileges Distribution By Grantee, Owner, Privilege Report
16.5.5
Powerful Database Accounts and Roles Reports
16.5.5.1
WITH ADMIN Privilege Grants Report
16.5.5.2
Accounts With DBA Roles Report
16.5.5.3
Security Policy Exemption Report
16.5.5.4
BECOME USER Report
16.5.5.5
ALTER SYSTEM or ALTER SESSION Report
16.5.5.6
Password History Access Report
16.5.5.7
WITH GRANT Privileges Report
16.5.5.8
Roles/Accounts That Have a Given Role Report
16.5.5.9
Database Accounts With Catalog Roles Report
16.5.5.10
AUDIT Privileges Report
16.5.5.11
OS Security Vulnerability Privileges Report
16.5.6
Initialization Parameters and Profiles Reports
16.5.6.1
Security Related Database Parameters Report
16.5.6.2
Resource Profiles Report
16.5.6.3
System Resource Limits Report
16.5.7
Database Account Password Reports
16.5.7.1
Database Account Default Password Report
16.5.7.2
Database Account Status Report
16.5.8
Security Audit Report: Core Database Audit Report
16.5.9
Other Security Vulnerability Reports
16.5.9.1
Java Policy Grants Report
16.5.9.2
OS Directory Objects Report
16.5.9.3
Objects Dependent on Dynamic SQL Report
16.5.9.4
Unwrapped PL/SQL Package Bodies Report
16.5.9.5
Username/Password Tables Report
16.5.9.6
Tablespace Quotas Report
16.5.9.7
Non-Owner Object Trigger Report
A
Oracle Database Vault Auditing
A.1
Oracle Database Vault Specific Audit Events
A.1.1
Oracle Database Vault Audit Events
A.1.2
Format of the Oracle Database Vault Audit Trail
A.2
Archiving and Purging the Oracle Database Vault Audit Trail
A.3
Oracle Database Audit Settings Created for Oracle Database Vault
B
Enabling and Disabling Oracle Database Vault
B.1
When You Must Disable Oracle Database Vault
B.2
Checking if Oracle Database Vault Is Enabled or Disabled
B.3
Step 1: Disable Oracle Database Vault
B.3.1
Disabling Oracle Database Vault on UNIX Systems
B.3.2
Disabling Oracle Database Vault on Windows Systems
B.4
Step 2: Perform the Required Tasks
B.5
Step 3: Enable Oracle Database Vault
B.5.1
Enabling Oracle Database Vault on UNIX Systems
B.5.2
Enabling Oracle Database Vault on Windows Systems
C
Post-Installation Oracle Database Vault Procedures
C.1
Registering Oracle Database Vault
C.2
Manually Deploying Oracle Database Vault Administrator
C.3
Setting the Time-out Value for Oracle Database Vault Administrator
C.4
Configuring Oracle Database Vault on RAC Nodes
C.4.1
Syntax for Using DVCA -action optionrac
C.4.2
Procedure for Configuring Oracle Database Vault on RAC Nodes
C.5
Adding Languages to Oracle Database Vault
C.5.1
Syntax for Using DVCA -action addlanguages
C.5.2
Procedure for Adding Languages to Oracle Database Vault
D
Oracle Database Vault Security Guidelines
D.1
Accounts and Roles Trusted by Oracle Database Vault
D.2
Accounts and Roles That Should be Limited to Trusted Individuals
D.2.1
Managing Users with Root Access to the Operating System
D.2.2
Managing the Oracle Software Owner
D.2.3
Managing SYSDBA Access
D.2.4
Managing SYSOPER Access
D.3
Secure Configuration Guidelines
D.3.1
Security Considerations for the UTL_FILE and DBMS_FILE_TRANSFER Packages
D.3.2
Security Considerations for the Recycle Bin
D.3.3
Security Considerations for the CREATE ANY JOB and CREATE JOB Privileges
D.3.4
Security Considerations for the CREATE EXTERNAL JOB Privilege
D.3.5
Security Considerations for the LogMiner Packages
D.3.6
Security Considerations for the ALTER SYSTEM and ALTER SESSION Privileges
D.3.7
Security Considerations for Java Stored Procedures and Oracle Database Vault
D.3.7.1
Limiting Access to Java Stored Procedures
D.3.7.2
Securing Java Stored Procedures
D.3.7.3
Step 1: Identifying the Java Stored Procedures Created with Definer's Rights
D.3.7.4
Step 2: Finding Java Stored Procedures That Access Realm-Protected Objects
D.3.7.5
Step 3: Creating a Package to Wrap Procedures Accessing Realm-Protected Objects
D.3.7.6
Step 4: Identifying the Java Stored Procedures Created with Invoker's Rights
D.3.7.7
Step 5: Blocking Execution of Java Stored Procedures
D.3.7.8
Step 6: Verifying Oracle Database Vault Protection for Java Stored Procedures
D.3.7.9
Step 7: Securing Invoker's Rights for New Java Stored Procedures
D.3.8
Security Considerations for External C Callouts and Oracle Database Vault
D.3.8.1
Securing EXECUTE ANY PROCEDURE by Limiting Access to External C Callouts
D.3.8.2
Securing External C Callouts
D.3.8.3
Step 1: Identifying the External C Callouts Created with Definer's Rights
D.3.8.4
Step 2: Finding the External C Callouts That Access Realm-Protected Objects
D.3.8.5
Step 3: Creating a Package to Wrap C Callouts That Access Realm-Protected Objects
D.3.8.6
Step 4: Identifying the External C Callouts Created with Invoker's Rights
D.3.8.7
Step 5: Blocking Execution of External C Callouts
D.3.8.8
Step 6: Verifying Oracle Database Vault Protection for External C Callouts
D.3.8.9
Step 7: Securing Invoker's Rights for New External C Callouts
E
Troubleshooting Oracle Database Vault
E.1
Using Trace Files to Diagnose Events in the Database
E.2
General Diagnostic Tips
E.3
Configuration Problems with Oracle Database Vault Components
Index