书签 分享 收藏 举报 版权申诉 / 36
上传文档赚钱

类型les--Proxy数据库安全审计课件.ppt

  • 上传人(卖家):晟晟文业
  • 文档编号:4009216
  • 上传时间:2022-11-03
  • 格式:PPT
  • 页数:36
  • 大小:185.47KB
  • 【下载声明】
    1. 本站全部试题类文档,若标题没写含答案,则无答案;标题注明含答案的文档,主观题也可能无答案。请谨慎下单,一旦售出,不予退换。
    2. 本站全部PPT文档均不含视频和音频,PPT中出现的音频或视频标识(或文字)仅表示流程,实际无音频或视频文件。请谨慎下单,一旦售出,不予退换。
    3. 本页资料《les--Proxy数据库安全审计课件.ppt》由用户(晟晟文业)主动上传,其收益全归该用户。163文库仅提供信息存储空间,仅对该用户上传内容的表现方式做保护处理,对上传内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知163文库(点击联系客服),我们立即给予删除!
    4. 请根据预览情况,自愿下载本文。本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
    5. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007及以上版本和PDF阅读器,压缩文件请下载最新的WinRAR软件解压。
    配套讲稿:

    如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。

    特殊限制:

    部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。

    关 键  词:
    les_Proxy 数据库 安全 审计 课件
    资源描述:

    1、9Copyright 2009,Oracle.All rights reserved.Using Proxy AuthenticationCopyright 2009,Oracle.All rights reserved.9-2ObjectivesAfter completing this lesson,you should be able to do the following:Describe how proxy authentication worksManage users authenticated by proxy authenticationAudit users authent

    2、icated by proxyCopyright 2009,Oracle.All rights reserved.9-3User Authentication Identify the user in the following ways:Basic authentication Database user identified by a password Database user identified by the operating systemStrong authenticationEnterprise User SecurityProxy authenticationCopyrig

    3、ht 2009,Oracle.All rights reserved.9-4Security Challenges ofThree-Tier ComputingIdentify the real userAuthenticate the end user to the database Restrict the privileges of the middle tierApplication serverDatabaseUserCopyright 2009,Oracle.All rights reserved.9-5Identifying the Real UserThe database n

    4、eeds the end-user identity for the following security functions:Authentication Data access control AuditingApplication-level security requires that:Security must be coded in every application Applications must be the only method to access the dataApplication serverDatabaseUserAbuserCopyright 2009,Or

    5、acle.All rights reserved.9-6Identifying the Real User(continued)Copyright 2009,Oracle.All rights reserved.9-7Common Implementations of Authentication Pass through:The user is unknown to the application.One big-application user:The user is unknown to the database.Other methods:The user is reauthentic

    6、ated to the database.The user is identified to the database.The user is proxied.Application serverDatabaseUserCopyright 2009,Oracle.All rights reserved.9-8Copyright 2009,Oracle.All rights reserved.9-9User ReauthenticationTypes of authentication in three-tier systems:Middle tier-to-database authentic

    7、ationClient-to-middle tier authenticationClient reauthentication through the middle tier to the database:Does the end user need to log in multiple times?Can the end users database account information be stored in the application?Can the user be authenticated by using Lightweight Directory Access Pro

    8、tocol(LDAP)?Point-to-point protocols,such as secure sockets layer(SSL),can authenticate to only one node.Single authenticationCopyright 2009,Oracle.All rights reserved.9-10Copyright 2009,Oracle.All rights reserved.9-11Restricting the Privileges of the Middle TierMiddle tier with high privileges:Conn

    9、ects with one database user for all application users Has all privileges for all application users for all connections Does not identify the end user to the database.Middle tier with limited privileges:Adjusts privileges by user identity May identify user to databaseCopyright 2009,Oracle.All rights

    10、reserved.9-12Implementing Proxy Authentication SolutionsProxy authentication solutions depend on the type of the end user:Known to the database:Database user and enterprise user Possible to reauthenticate to the database Auditing actions taken on behalf of the real userUnknown to the database:End us

    11、er known only to the application Support for application-user models Limiting the privilege of the middle tierCopyright 2009,Oracle.All rights reserved.9-13Copyright 2009,Oracle.All rights reserved.9-14Authenticating Database andEnterprise UsersUse Oracle Call Interface(OCI)or Java Database Connecti

    12、vity(JDBC).The authentication process includes the following steps:1.The client authenticates to the middle tier.2.The middle tier authenticates to the database.3.The middle tier creates the end users session.4.The database verifies that the middle tier can:Create the session for the userAssign the

    13、roles assigned to the userDatabase users can be:Authenticated to the application serverReauthenticated to the databaseCopyright 2009,Oracle.All rights reserved.9-15Copyright 2009,Oracle.All rights reserved.9-16Using Proxy Authenticationfor Database UsersAuthenticate the user without a database passw

    14、ord:Authenticate the user with a database password:ALTER USER phallGRANT CONNECTTHROUGH APPSVR;ALTER USER phallGRANT CONNECTTHROUGH APPSVRAUTHENTICATION REQUIRED PASSWORD;Copyright 2009,Oracle.All rights reserved.9-17Copyright 2009,Oracle.All rights reserved.9-18Using Proxy Authentication for Enterp

    15、rise UsersAuthenticate the user with a distinguished name:Authenticate the user with a certificate:ALTER USER phall GRANT CONNECT THROUGH APPSVR AUTHENTICATED USING DISTINGUISHED NAME;ALTER USER phallGRANT CONNECT THROUGH APPSVRAUTHENTICATED USING CERTIFICATETYPE X.509 VERSION 3;Copyright 2009,Oracl

    16、e.All rights reserved.9-19Copyright 2009,Oracle.All rights reserved.9-20Proxy Access Through SQL*PlusProxy access through SQL*Plus when:User is known to the database User is unknown to the database(Enterprise User Proxy)CONNECT rajeevAPPSVR/rajeev_pwdCONNECT APPSVRPHALL/appsvr_pwdCopyright 2009,Orac

    17、le.All rights reserved.9-21Enterprise User ProxyUse enterprise users with current applications.Let the directory authenticate the users.Connect as a database user.CONNECT georgeAPPSVR/george_pwdgeorgegeorgeAPPSVRAPPSVRCopyright 2009,Oracle.All rights reserved.9-22Enterprise User Proxy:ExampleCONNECT

    18、 RAJEEVPARTS_GUEST/pwdCONNECT JIMPARTS_GUEST/pwdRajeevJimPARTS_DBCopyright 2009,Oracle.All rights reserved.9-23Copyright 2009,Oracle.All rights reserved.9-24Revoking Proxy AuthenticationRevoke proxy authentication through a middle tier:Do not use the AUTHENTICATED USING or AUTHENTICATION REQUIRED cl

    19、ause with REVOKE.ALTER USER phall REVOKE CONNECT THROUGH APPSVR;Copyright 2009,Oracle.All rights reserved.9-25Application-User ModelUse the OCI,thin JDBC,or thick JDBC.End-user identity is set by the middle tier.The authentication process is as follows:1.The middle tier authenticates to the database

    20、.2.The end user authenticates to the middle tier.3.The middle tier allocates a session to the user,identifying the user with client_identifier.4.Optionally,the middle tier can enable roles to restrict the privileges of the user.Examples:CertificateApplication username and passwordCopyright 2009,Orac

    21、le.All rights reserved.9-26Copyright 2009,Oracle.All rights reserved.9-27Data Dictionary Views forProxy AuthenticationDBA_PROXIES:All proxy connectionsUSER_PROXIES:Connections that the current user is allowed to proxyPROXY_USERS:Users who can assume the identity of other usersV$SESSION_CONNECT_INFO:

    22、Network connections for all current sessionsV$SESSION:Session-connect details:The PROGRAM column shows“proxy-user”The MODULE column shows“proxy-user”Copyright 2009,Oracle.All rights reserved.9-28Data Dictionary Views:DBA_PROXIES and USER_PROXIES SQL SELECT proxy,client,authentication,2 authorization

    23、_constraint 3 FROM dba_proxiesPROXY CLIENT AUTH AUTHORIZATION_CONSTRAINT-HRUSER PHALL NO PROXY MAY ACTIVATE ROLEAPPSVR PHALL NO NO CLIENT ROLES MAY BE ACTIVATEDHRUSER PFAY YES PROXY MAY ACTIVATE ALL CLIENT ROLESCopyright 2009,Oracle.All rights reserved.9-29Data Dictionary Views:V$SESSION_CONNECT_INF

    24、OSQL select SID,AUTHENTICATION_TYPE,2 OSUSER,NETWORK_SERVICE_BANNER 3 from v$session_connect_info where SID=148;SID AUTHENTICA OSUSER NETWORK_SERVICE_BANNER-148 DATABASE oracle TCP/IP NT Protocol Adapter for Linux:Version 11.1.0.6.0-Production 148 DATABASE oracle Oracle Advanced Security:encryption

    25、service for Linux:Version 11.1.0.6.0-Production 148 DATABASE oracle Oracle Advanced Security:crypto-checksumming service for Linux:Version 11.1.0.6.0-ProductionCopyright 2009,Oracle.All rights reserved.9-30Auditing Actions Taken on Behalfof the Real UserAudit SELECTs on the EMPLOYEES table that HRAP

    26、PSERVER initiates for PHALL as follows:Audit SELECTs on the EMPLOYEES table that HRAPPSERVER initiates for any user as follows:The statements in this slide audit only SELECTs initiated by HRAPPSERVER.You cannot audit CONNECT ON BEHALF OF DN.AUDIT SELECT TABLE ON employees BY hrappserver ON BEHALF OF

    27、 phall;AUDIT SELECT TABLE ON employees BY hrappserver ON BEHALF OF ANY;Copyright 2009,Oracle.All rights reserved.9-31Copyright 2009,Oracle.All rights reserved.9-32Data Dictionary Views:DBA_STMT_AUDIT_OPTSDBA_STMT_AUDIT_OPTS describes the current system auditing options.USER_NAME column:ANY CLIENT:Au

    28、diting access by a proxy NULL:Systemwide auditingPROXY_NAME column:The name of the proxy user performing an operation for the client NULL if the client is performing the operation directlyCopyright 2009,Oracle.All rights reserved.9-33Data Dictionary Views:DBA_AUDIT_TRAILThese views list audit-trail

    29、entries:DBA_AUDIT_TRAIL USER_AUDIT_TRAILThe COMMENT_TEXT column can indicate how the user has been authenticated:DATABASE:Authentication done by the password NETWORK:Authentication done by Oracle Net Services or Oracle Advanced Security PROXY:Authentication by another user EXTERNAL NAME:The distingu

    30、ished name(DN)of the Enterprise User Security(EUS)userCopyright 2009,Oracle.All rights reserved.9-34Practice 9 Overview:Implementing Proxy AuthenticationThis practice covers the following topics:Implementing and testing database proxy authenticationImplementing EUS proxyCopyright 2009,Oracle.All rights reserved.9-35SummaryIn this lesson,you should have learned how to:Describe how proxy authentication worksManage users authenticated by proxy authenticationAudit users authenticated by proxyCopyright 2009,Oracle.All rights reserved.9-36

    展开阅读全文
    提示  163文库所有资源均是用户自行上传分享,仅供网友学习交流,未经上传用户书面授权,请勿作他用。
    关于本文
    本文标题:les--Proxy数据库安全审计课件.ppt
    链接地址:https://www.163wenku.com/p-4009216.html

    Copyright@ 2017-2037 Www.163WenKu.Com  网站版权所有  |  资源地图   
    IPC备案号:蜀ICP备2021032737号  | 川公网安备 51099002000191号


    侵权投诉QQ:3464097650  资料上传QQ:3464097650
       


    【声明】本站为“文档C2C交易模式”,即用户上传的文档直接卖给(下载)用户,本站只是网络空间服务平台,本站所有原创文档下载所得归上传人所有,如您发现上传作品侵犯了您的版权,请立刻联系我们并提供证据,我们将在3个工作日内予以改正。

    163文库