les--Proxy数据库安全审计课件.ppt
- 【下载声明】
1. 本站全部试题类文档,若标题没写含答案,则无答案;标题注明含答案的文档,主观题也可能无答案。请谨慎下单,一旦售出,不予退换。
2. 本站全部PPT文档均不含视频和音频,PPT中出现的音频或视频标识(或文字)仅表示流程,实际无音频或视频文件。请谨慎下单,一旦售出,不予退换。
3. 本页资料《les--Proxy数据库安全审计课件.ppt》由用户(晟晟文业)主动上传,其收益全归该用户。163文库仅提供信息存储空间,仅对该用户上传内容的表现方式做保护处理,对上传内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知163文库(点击联系客服),我们立即给予删除!
4. 请根据预览情况,自愿下载本文。本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
5. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007及以上版本和PDF阅读器,压缩文件请下载最新的WinRAR软件解压。
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- les_Proxy 数据库 安全 审计 课件
- 资源描述:
-
1、9Copyright 2009,Oracle.All rights reserved.Using Proxy AuthenticationCopyright 2009,Oracle.All rights reserved.9-2ObjectivesAfter completing this lesson,you should be able to do the following:Describe how proxy authentication worksManage users authenticated by proxy authenticationAudit users authent
2、icated by proxyCopyright 2009,Oracle.All rights reserved.9-3User Authentication Identify the user in the following ways:Basic authentication Database user identified by a password Database user identified by the operating systemStrong authenticationEnterprise User SecurityProxy authenticationCopyrig
3、ht 2009,Oracle.All rights reserved.9-4Security Challenges ofThree-Tier ComputingIdentify the real userAuthenticate the end user to the database Restrict the privileges of the middle tierApplication serverDatabaseUserCopyright 2009,Oracle.All rights reserved.9-5Identifying the Real UserThe database n
4、eeds the end-user identity for the following security functions:Authentication Data access control AuditingApplication-level security requires that:Security must be coded in every application Applications must be the only method to access the dataApplication serverDatabaseUserAbuserCopyright 2009,Or
5、acle.All rights reserved.9-6Identifying the Real User(continued)Copyright 2009,Oracle.All rights reserved.9-7Common Implementations of Authentication Pass through:The user is unknown to the application.One big-application user:The user is unknown to the database.Other methods:The user is reauthentic
6、ated to the database.The user is identified to the database.The user is proxied.Application serverDatabaseUserCopyright 2009,Oracle.All rights reserved.9-8Copyright 2009,Oracle.All rights reserved.9-9User ReauthenticationTypes of authentication in three-tier systems:Middle tier-to-database authentic
7、ationClient-to-middle tier authenticationClient reauthentication through the middle tier to the database:Does the end user need to log in multiple times?Can the end users database account information be stored in the application?Can the user be authenticated by using Lightweight Directory Access Pro
8、tocol(LDAP)?Point-to-point protocols,such as secure sockets layer(SSL),can authenticate to only one node.Single authenticationCopyright 2009,Oracle.All rights reserved.9-10Copyright 2009,Oracle.All rights reserved.9-11Restricting the Privileges of the Middle TierMiddle tier with high privileges:Conn
9、ects with one database user for all application users Has all privileges for all application users for all connections Does not identify the end user to the database.Middle tier with limited privileges:Adjusts privileges by user identity May identify user to databaseCopyright 2009,Oracle.All rights
10、reserved.9-12Implementing Proxy Authentication SolutionsProxy authentication solutions depend on the type of the end user:Known to the database:Database user and enterprise user Possible to reauthenticate to the database Auditing actions taken on behalf of the real userUnknown to the database:End us
11、er known only to the application Support for application-user models Limiting the privilege of the middle tierCopyright 2009,Oracle.All rights reserved.9-13Copyright 2009,Oracle.All rights reserved.9-14Authenticating Database andEnterprise UsersUse Oracle Call Interface(OCI)or Java Database Connecti
12、vity(JDBC).The authentication process includes the following steps:1.The client authenticates to the middle tier.2.The middle tier authenticates to the database.3.The middle tier creates the end users session.4.The database verifies that the middle tier can:Create the session for the userAssign the
13、roles assigned to the userDatabase users can be:Authenticated to the application serverReauthenticated to the databaseCopyright 2009,Oracle.All rights reserved.9-15Copyright 2009,Oracle.All rights reserved.9-16Using Proxy Authenticationfor Database UsersAuthenticate the user without a database passw
14、ord:Authenticate the user with a database password:ALTER USER phallGRANT CONNECTTHROUGH APPSVR;ALTER USER phallGRANT CONNECTTHROUGH APPSVRAUTHENTICATION REQUIRED PASSWORD;Copyright 2009,Oracle.All rights reserved.9-17Copyright 2009,Oracle.All rights reserved.9-18Using Proxy Authentication for Enterp
15、rise UsersAuthenticate the user with a distinguished name:Authenticate the user with a certificate:ALTER USER phall GRANT CONNECT THROUGH APPSVR AUTHENTICATED USING DISTINGUISHED NAME;ALTER USER phallGRANT CONNECT THROUGH APPSVRAUTHENTICATED USING CERTIFICATETYPE X.509 VERSION 3;Copyright 2009,Oracl
展开阅读全文