ASGC Site Update Yi-Ping Wu Jeng-Hsueh Wu. Two Significant Researches 1.Oracle Security issues and Studies for 3D 2.Streams Replications Study Report.

Slides:



Advertisements
Similar presentations
Active Directory: Final Solution to Enterprise System Integration
Advertisements

6.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
1 Chapter 1 Introduction to Windows Server Two main goals for Net Admin Make network resources available to users Files, folders, printers, etc.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Chapter 8: Network Operating Systems and Windows Server 2003-Based Networking Network+ Guide to Networks Third Edition.
Module 2: Planning to Install SQL Server. Overview Hardware Installation Considerations SQL Server 2000 Editions Software Installation Considerations.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 7 Configuring File Services in Windows Server 2008.
Understanding Active Directory
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
Windows Server 2008 Chapter 8 Last Update
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Configuring Active Directory Certificate Services Lesson 13.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
(ITI310) SESSIONS : Active Directory By Eng. BASSEM ALSAID.
Chapter 8 Hardening Your SQL Server Instance. Hardening  Hardening The process of making your SQL Server Instance more secure  New features Policy based.
Module 1 Introduction to Managing Microsoft® Windows Server® 2008 Environment.
Session 6 Windows Platform Dina Alkhoudari. Learning Objectives What is Active Directory Logical components of active directory Physical components of.
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 3: Introducing Active Directory.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
GRID Centralized management of the Globus grid-mapfile Carlo Rocca INFN, Catania.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
11 Copyright © 2005, Oracle. All rights reserved. Configuring the Oracle Network Environment.
The Directory A distributed database Distributed maintenance.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
A detailed look at the Microsoft Windows Infrastructure at UWE including Active Directory (AD), MIIS, Exchange, SMS, IIS, SQL Server, Terminal Services.
Course ILT Internet/intranet support Unit objectives Use the Internet Information Services snap-in to manage IIS, Web sites, virtual directories, and WebDAV.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
INTRODUCTION What is a Web-Enabled Database? Problem and its Importance Two-tier Architecture Three-tier Architecture Need for a compatible centralized.
Simplify and Strengthen Security with Oracle Application Server Allan L Haensgen Senior Principal Instructor Oracle Corporation Session id:
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
Introduction to Microsoft Management Console (MMC) MMC is a common console framework for management applications. MMC provides a common environment for.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Sudha Iyer Principal Product Manager Oracle Corporation.
Kyle Brokaw – LDS Church Russ Lowenthal – Oracle Corp. Session #102 Enterprise User Security – One Companies Experience.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Lecture 5: User Accounts & Directory Service Instructor: Dr. Najla Al-Nabhan
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Chapter 8: Objectives Explain how to use a server in a home or office network Install a server Set up a server Manage and monitor a server Design a server-based.
Securing Your Enterprise with Enterprise Manager 10g Amir Najmi Principal Member of Technical Staff System Management Products Oracle Corporation Session.
Network Infrastructure Microsoft Windows 2003 Network Infrastructure MCSE Study Guide for Exam
GRID Centralized Management of the Globus grid-mapfile Carlo Rocca, INFN Catania.
Introduction to Active Directory
Module 10: Identity and Access Services in Windows Server 2008 Active Directory.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
Hussain Ali Department of Computer Engineering KFUPM, Dhahran, Saudi Arabia Active Directory.
Global Catalog and Flexible Single Master Operations (FSMO) Roles BAI516.
Lotus IBM Lotus Notes Domino 8 System Administration Fundamentals Thousands of IT Professionals before you have already passed their certification.
Directory Services CS5493/7493. Directory Services Directory services represent a technological breakthrough by integrating into a single management tool:
1 Introduction to Active Directory Directory Services Uniquely identify users and resources on a network Provide a single point of network management.
MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition (70-294) Chapter 1: Overview of the Active.
C Copyright © 2007, Oracle. All rights reserved. Security New Features.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
1 Directory Services  What is a Directory Service?  Directory Services model  Directory Services naming model  X.500 and LDAP  Implementations of.
Basharat Institute of Higher Education
Module Overview Installing and Configuring a Network Policy Server
(ITI310) SESSIONS 6-7-8: Active Directory.
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts.
Common Security Mistakes
Unit 27: Network Operating Systems
Goals Introduce the Windows Server 2003 family of operating systems
A Network Operating System Edited By Maysoon AlDuwais
Windows Active Directory Environment
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

ASGC Site Update Yi-Ping Wu Jeng-Hsueh Wu

Two Significant Researches 1.Oracle Security issues and Studies for 3D 2.Streams Replications Study Report in Oracle 10.2g

1.Oracle Security issues and Studies for 3D 2.Streams Replications Study Report in Oracle 10.2g

Oracle Security issues and Studies for 3D Yi-Ping Wu

Outline Enterprise User Security Introduction Oracle Advanced Security Introduction and SSL Configuration Enterprise User Security Configuration

Enterprise User Security Introduction Oracle Advanced Security Introduction and SSL Configuration Enterprise User Security Configuration

Oracle Enterprise Security A distributed environment makes the issues more critical about “who is a user “ and “what are they allowed to do”. However, the user management price may deduct the cost saving gained from grid computing. Oracle Advanced Security provides the solution to the security in enterprise grid computing environments.

How Enterprise User Security Works An administrator uses Oracle Net Configuration Assistant to (i) select the Oracle Context in the directory, or to (ii) create an Oracle Context as necessary. A member of the OracleDBCreators group uses the Database Configuration Assistant or Oracle Enterprise Security Manager to register the database with the directory. An administrator uses Oracle Enterprise Security Manager to set up both enterprise users and enterprise roles in the directory and relevant domains. A user initiates an SSL connection to the database by logging on with "connect /", and the database uses SSL to authenticate the user. The database searches locally on the database for a schema exclusively owned by this user. If no appropriate user schema is found locally, the database searches for one in the directory.If it finds one, the database retrieves the user's enterprise roles from the directory, and enables any associated global roles applicable to that database.

Directory Server A directory server can be used to provide centralized storage and management of user and authentication information.

Enterprise User Security Introduction Oracle Advanced Security Introduction and SSL Configuration Enterprise User Security Configuration

Oracle Advanced Security Configurations Configuring Secure Sockets Layer (SSL) Authentication

Authentication by the Secure Socket Layer Protocol SSL can be used for user authentication to a database, independent of global user management in Oracle Internet Directory. That is, users can use SSL to authenticate to the database without implying anything about their directory access. However, if you wish to use the enterprise user functionality to manage users and their privileges in a directory, the user must use SSL to authenticate to the database.

Tasks for SSL Configuration Task 1: Install Oracle Advanced Security and Related Products Task 2: Configure SSL on the Client Task 3: Configure SSL on the Server Task 4: Log on to the Database

Process of SSL Configuration Found related document about SSL configuration System Environment Operation CA Acquirement Oracle Wallet Configuration

SSL Related Documents Oracle Database Advanced Security Administrator's Guide 10g Database Security Guide 10g METALINK NOTE: : Configuring Net8 TCP/IP via SSL Found related document about SSL configuration System Environment Operation CA Aquirement Oracle Wallet Configuration

System Environment Operation Operating System Oracle 10g Enterprise Edition installation Oracle Net Configuration Found related document about SSL configuration System Environment Operation CA Acquirement Oracle Wallet Configuration

CA Acquirement Globus ToolKit Oracle Certificate Authority Found related document about SSL configuration System Environment Operation CA Acquirement Oracle Wallet Configuration

Import the Entrust Certificate and User Certificate into the Wallet Indicate the wallet location path at Oracle Net Manager Found related document about SSL configuration System Environment Operation CA Acquirement Oracle Wallet Configuration

Enterprise User Security Introduction Oracle Advanced Security Introduction and SSL Configuration Enterprise User Security Configuration

Process of Enterprise User Security Configuration

Main steps to set up Enterprise Security 1. Enabling database for LDAP network connectivity 2. Configuring database for LDAP authentication with OID 3. Configure your database schema mappings using Enterprise Security Manager 4. Test user authentication against the database 5. Configuring a Shared Schema for Groups 6. Configure "Enterprise Role" for group authentication

Testing Verify that the database server can bind to the OID server  ldapbind –h -p -U 3 –W “file: -P Verify that the database is registered with OID  RDBMS_SERVER_DN=‘CN=ORA9pc,cn=OracleContext,dc=oracle,dc=com’ corresponding to user wallet DN entry Verify that the new user has been created Verify that the database locate the enterprise domain  ldapsearch –h p- -U 3 –W “file:,database wallet location>” –P -b“cn=OracleDBSecurity,cn=Products,dn=OracleContext, ” “objectclass=orcldbenterprisedomain”

Conclusion Oracle provides a complete infrastructure, Identity Management, for the security solution. During the past months, we have already collected sufficient documents and have the general understanding of Oracle Identity Management and Advanced Security. SSL authentication has been successfully configured, which is essential for the future security environment settings. We are currently testing the Enterprise User Security with password authentication, and our next step will be Enterprise User Security with SSL authentication.

Related Documents Oracle Database Advanced Security Administrator's Guide 10g Database Security Guide 10g Oracle Identity Management Online Training html/sec_idm_training/html_masters/gsmain.htm Oracle Internet Directory Online Training html/oidqs/html_masters/gsmain.htm

Streams Replications Study Report in Oracle 10.2g

Official Docs and References Oracle Streams configuration by Eva Sample Scripts by EM in 10g R2 Streams Concepts and Administration Streams Replication Administrator's Guide PL/SQL Packages and Types Reference

Streams Replications Study Report in Oracle 10.2g Jeng-Hsueh Wu

Official Docs and References Oracle Streams configuration by Eva Sample Scripts by EM in 10g R2 Streams Concepts and Administration Streams Replication Administrator's Guide PL/SQL Packages and Types Reference

1.Oracle Security issues and Studies for 3D 2.Streams Replications Study Report in Oracle 10.2g

Environment SLC 305 Oracle Hardware –Intel Pentium 1.8G –1G physical memory –15G partition for oracle

3 Stages

Scripts and Notes by ASGC Concepts for Oracle Streams Replications – Scripts for building the streams with type "hub and spoke" and bi-directional –

Environment SLC 305 Oracle Hardware –Intel Pentium 1.8G –1G physical memory –15G partition for oracle

3 Stages

Scripts and Notes by ASGC Concepts for Oracle Streams Replications – Scripts for building the streams with type "hub and spoke" and bi-directional –