Contents

List of Examples

List of Figures

List of Tables

Title and Copyright Information

Preface

Changes in This Release for Oracle Database Security Guide

1 Introduction Oracle Database Security

Part I Managing User Authentication and Authorization

2 Managing Security for Oracle Database Users

3 Configuring Authentication

4 Configuring Privilege and Role Authorization

5 Managing Security for Definer's Rights and Invoker's Rights

6 Managing Fine-Grained Access in PL/SQL Packages and Types

7 Managing Security for a Multitenant Environment in Enterprise Manager

Part II Application Development Security

8 Managing Security for Application Developers

Part III Controlling Access to Data

9 Using Application Contexts to Retrieve User Information

10 Using Oracle Virtual Private Database to Control Data Access

11 Using Transparent Sensitive Data Protection

12 Manually Encrypting Data

Part IV Securing Data on the Network

13 Configuring Network Data Encryption and Integrity

14 Configuring the Thin JDBC Client Network

Part V Managing Strong Authentication

15 Introduction to Strong Authentication

16 Strong Authentication Administration Tools

17 Configuring Kerberos Authentication

18 Configuring Secure Sockets Layer Authentication

19 Configuring RADIUS Authentication

20 Customizing the Use of Strong Authentication

Part VI Monitoring Database Activity with Auditing

21 Introduction to Auditing

22 Configuring Audit Policies

23 Administering the Audit Trail

Part VII Appendixes

A Keeping Your Oracle Database Secure

B Data Encryption and Integrity Parameters

C Kerberos, SSL, and RADIUS Authentication Parameters

D Integrating Authentication Devices Using RADIUS

E Oracle Database FIPS 140 Settings

F Using the orapki Utility to Manage PKI Elements

G How the Unified Auditing Migration Affects Individual Audit Features

Glossary

Index