Enforcing database security policies
Here is a script that displays the attributes you’ll use most often for enforcing database security policies:
This view provides useful information that can be used in implementing your security policies. For example, the user’s IP address and authentication mode are available and can be used to govern what a user has access to. The Client Identifier can be set by an application and used to track and trace connected sessions.
Reference:
Effective Oracle Database 10g Security by Design by David Knox
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment