Chapter 1. Basic Database Security
In this chapter, we will cover the following tasks:
Creating a password profile
Creating password-authenticated users
Changing a user's password
Creating a user with the same credentials on another database
Locking a user account
Expiring a user's password
Creating and using OS-authenticated users
Creating and using proxy users
Creating and using database roles
The
sysbackup
privilege - how, when, and why should you use it?The
syskm
privilege - how, when, and why should you use it?The
sysdg
privilege - how, when, and why should you use it?