Chapter 1. Basic Database Security
In this chapter, we will cover the following tasks:
- Creating a password profile
- Creating password-authenticated users
- Changing a user's password
- Creating a user with the same credentials on another database
- Locking a user account
- Expiring a user's password
- Creating and using OS-authenticated users
- Creating and using proxy users
- Creating and using database roles
- The
sysbackup
privilege - how, when, and why should you use it? - The
syskm
privilege - how, when, and why should you use it? - The
sysdg
privilege - how, when, and why should you use it?