Changes in This Release for Oracle Database Vault Administrator's Guide
This preface contains:
Changes in Oracle Database Vault 12c Release 2 (12.2.0.1)
The following are changes in Oracle Database Vault Administrator's Guide for Oracle Database 12c release 2 (12.2.0.1):
New Features
The following features are new for this release:
- Ability to Create Oracle Database Vault Policies
An Oracle Database Vault policy groups and manages realms and command rules that have something in common in a single policy. - Ability to Configure Simulation Mode Protection
Simulation mode protects Oracle Database Vault security objects so that SQL commands are not blocked, but violations to the security controls are logged. - Privilege Analysis Enhancements
Privilege analysis policies now capture more privilege use than in previous releases, find unused privilege grants, and create named capture runs. - Ability to Create Common Realms and Common Command Rules for Oracle Multitenant
In a multitenant environment, you now can create common realms and common command rules within the application PDB context. - ALTER SESSION, ALTER SYSTEM, and CONNECT Command Rule Enhancements
Command rules now provide moreALTER SESSION
andALTER SYSTEM
functionality, and CONNECT command rule enhancements. - Enhancements for the Authentication_Method Default Factor
Starting with this release, the Authentication_Method default factor can be used for external and global user authentication. - Changed Default Value for SQL92_SECURITY Parameter
Starting with this release, the default value for theSQL92_SECURITY
parameter has changed fromFALSE
toTRUE
. - Oracle Database Vault Support for Flashback Technology and ILM
You now can use Oracle Flashback Technology features and Information Lifecycle Management (ILM) features in an Oracle Database Vault-enabled database. - Support for Rolling Upgrades for Data Guard Logical Standby Databases
Oracle Data Guard logical standby databases can perform rolling upgrades for Oracle Database Vault-enabled systems using transient logical standby and theDBMS_ROLLING
package.
Ability to Create Oracle Database Vault Policies
An Oracle Database Vault policy groups and manages realms and command rules that have something in common in a single policy.
For example, the realms and command rules can have an application or schema in common.
The status of the realms and command rules in this policy can be updated at once, in a single command, instead of performing the update individually on each security object. Also new to this release is the DV_POLICY_OWNER
role, which provides the grantee user the authority to perform basic administration tasks. This user can add authorized users to the realms that are included in the policy and change the policy state without being granted the powerful DV_OWNER
role.
The following new functionality supports this feature:
-
DBMS_MACADM
PL/SQL procedures:-
DBMS_MACADM.ADD_CMD_RULE_TO_POLICY
-
DBMS_MACADM.ADD_OWNER_TO_POLICY
-
DBMS_MACADM.ADD_REALM_TO_POLICY
-
DBMS_MACADM.CREATE_POLICY
-
DBMS_MACADM.DELETE_CMD_RULE_FROM_POLICY
-
DBMS_MACADM.DELETE_OWNER_FROM_POLICY
-
DBMS_MACADM.DELETE_REALM_FROM_POLICY
-
DBMS_MACADM.DROP_POLICY
-
DBMS_MACADM.RENAME_POLICY
-
DBMS_MACADM.UPDATE_POLICY_DESCRIPTION
-
DBMS_MACADM.UPDATE_POLICY_STATE
-
-
Role:
-
DV_POLICY_OWNER
-
-
Data dictionary views:
-
DVSYS.DBA_DV_POLICY
-
DVSYS.DBA_DV_POLICY_OBJECT
-
DVSYS.DBA_DV_POLICY_OWNER
-
DVSYS.POLICY_OWNER_COMMAND_RULE
-
DVSYS.POLICY_OWNER_POLICY
-
DVSYS.POLICY_OWNER_REALM
-
DVSYS.POLICY_OWNER_REALM_AUTH
-
DVSYS.POLICY_OWNER_REALM_OBJECT
-
DVSYS.POLICY_OWNER_RULE
-
DVSYS.POLICY_OWNER_RULE_SET
-
DVSYS.POLICY_OWNER_RULE_SET_RULE
-
Ability to Configure Simulation Mode Protection
Simulation mode protects Oracle Database Vault security objects so that SQL commands are not blocked, but violations to the security controls are logged.
Simulation mode can also be set for the new Oracle Database Vault policy, which then sets it on embedded objects. This status is between the full protection of being enabled and blocking the access of SQL statements and being disabled. When realms and command rules are set to the simulation mode, violations that occur to these security controls are only logged to the simulation log file. They are not enforced or deny access to the user. This enables you to more quickly certify applications with Oracle Database Vault and to move new realms and command rules to production. You can implement a mandatory realm on a test application database schema and then set it to simulation mode. After running the full test application regression test, you then can analyze the simulation mode log to determine which users and which trusted paths to authorize to the test application schema. You can also develop new command rules and migrate them to production in simulation mode for a period of time to determine the impact they would have when they are enabled.
The simulation mode log is available for viewing in the DBA_DV_SIMULATION_LOG
data dictionary view. After you have finished testing the realm and command rule, you can clear the contents of the DBA_DV_SIMULATION_LOG
view for the next time you need to test Database Vault configurations in a test environment.
The following functionality supports this features:
-
New or changed
DBMS_MACADM
PL/SQL procedures:-
DBMS_MACADM.CREATE_REALM
(changed) -
DBMS_MACADM.UPDATE_REALM
(changed) -
DBMS_MACADM.CREATE_COMMAND_RULE
(changed) -
DBMS_MACADM.UPDATE_COMMAND_RULE
(changed) -
DBMS_MACADM.DELETE_COMMAND_RULE
(changed) -
DBMS_MACADM.CREATE_CONNECT_COMMAND_RULE
(new) -
DBMS_MACADM.UPDATE_CONNECT_COMMAND_RULE
(new) -
DBMS_MACADM.DELETE_CONNECT_COMMAND_RULE
(new) -
DBMS_MACADM.CREATE_SESSION_EVENT_CMD_RULE
(new) -
DBMS_MACADM.UPDATE_SESSION_EVENT_CMD_RULE
(new) -
DBMS_MACADM.DELETE_SESSION_EVENT_CMD_RULE
(new) -
DBMS_MACADM.CREATE_SYSTEM_EVENT_CMD_RULE
(new) -
DBMS_MACADM.UPDATE_SYSTEM_EVENT_CMD_RULE
(new) -
DBMS_MACADM.DELETE_SYSTEM_EVENT_CMD_RULE
(new)
-
-
New data dictionary view and table:
-
DBA_DV_SIMULATION_LOG
data dictionary view -
DVSYS.SIMULATION_LOG$
table
-
Privilege Analysis Enhancements
Privilege analysis policies now capture more privilege use than in previous releases, find unused privilege grants, and create named capture runs.
-
Additional privilege captures: You now can create privilege analysis policies that capture compilation privileges that are used for definer’s rights and invoker’s rights program units, that capture privileges that were used for Code Based Access Control (CBAC) role use, and that capture secure application role use.
-
Unused privilege grants: The privilege capture reports now indicate which privilege grants were not used by users or roles.
-
Capture runs: A capture run defines the period of time that a privilege capture takes place. You define the capture run when you enable the policy. You can create multiple capture runs for use with one policy and then use these capture runs in comparison reports.
Related Topics
Ability to Create Common Realms and Common Command Rules for Oracle Multitenant
In a multitenant environment, you now can create common realms and common command rules within the application PDB context.
The benefit of creating common realms and command rules (that is, in the application root) is that you can manage them from a central location in a multitenant environment, rather than in individual pluggable databases (PDBs). Realms for the application root common objects must be configured in the application PDB or root. Local realms and local command rules can still be implemented on individual PDBs over and above any common realms and common command rules.
Common realms can only be created on common objects in the application root. You cannot create common realms in the CDB root. However, you can create common command rules in either the application root or the CDB root. A common command rule in the application root applies to its associated PDBs. Common command rules that are in the CDB root will apply to all PDBs in the CDB environment. When you create a common object in the application root and in the CDB root, you must synchronize it so that it is visible in the individual PDBs. To synchronize an object in the application root, you use the ALTER PLUGGABLE DATABASE APPLICATION
statement with the SYNC
clause.
The following functionality supports this feature:
-
New or changed
DBMS_MACADM
PL/SQL procedures:-
All realm-related
DBMS_MACADM
PL/SQL procedures -
All command rule-related
DBMS_MACADM
PL/SQL procedures -
DBMS_MACADM.ADD_CMD_RULE_TO_POLICY
(new) -
DBMS_MACADM.DELETE_CMD_RULE_FROM_POLICY
(new)
-
-
New or changed data dictionary views:
-
DBA_DV_COMMAND_RULE
-
DVSYS.DBA_DV_POLICY_OBJECT
(new) -
DBA_DV_REALM
-
DVSYS.DV$REALM
-
DBA_DV_REALM_AUTH
-
DBA_DV_REALM_OBJECT
-
DBA_DV_RULE_SET
-
DBA_DV_RULE_SET_RULE
-
ALTER SESSION, ALTER SYSTEM, and CONNECT Command Rule Enhancements
Command rules now provide more ALTER SESSION
and ALTER SYSTEM
functionality, and CONNECT command rule enhancements.
In previous releases, you could create command rules for the ALTER SESSION
and ALTER SYSTEM
statements, but the functionality that you could include was limited. Starting with this release, Oracle Database Vault provides the ability to include event settings that are commonly used by ALTER SESSION
and ALTER SYSTEM
. The options for these special command rules enable you to use many of the features of the ALTER SESSION
and ALTER SYSTEM
statements, such as the ability to use the SET
clause for parameter settings.
In addition, Oracle has made the management of the CONNECT command rule easier to maintain. In previous releases, you could create a CONNECT command rule, but if, for example, you had to create four different command rules for four different users, then you had to create a complex rule with OR
and AND
keywords to account for the multiple users in one command rule. With this release, you can create a CONNECT command rule for each user.
The changed and new DBMS_MACADM
PL/SQL procedures to manage the ALTER SESSION, ALTER SYSTEM, and CONNECT command rules are as follows:
-
DBMS_MACADM.CREATE_COMMAND_RULE
(changed) -
DBMS_MACADM.UPDATE_COMMAND_RULE
(changed) -
DBMS_MACADM.CREATE_CONNECT_COMMAND_RULE
(new) -
DBMS_MACADM.UPDATE_CONNECT_COMMAND_RULE
(new) -
DBMS_MACADM.DELETE_CONNECT_CONNECT_RULE
(new) -
DBMS_MACADM.CREATE_SESSION_EVENT_CMD_RULE
(new) -
DBMS_MACADM.UPDATE_SESSION_EVENT_CMD_RULE
(new) -
DBMS_MACADM.DELETE_SESSION_EVENT_CMD_RULE
(new) -
DBMS_MACADM.CREATE_SYSTEM_EVENT_CMD_RULE
(new) -
DBMS_MACADM.UPDATE_SYSTEM_EVENT_CMD_RULE
(new) -
DBMS_MACADM.DELETE_SYSTEM_EVENT_CMD_RULE
(new)
Enhancements for the Authentication_Method Default Factor
Starting with this release, the Authentication_Method default factor can be used for external and global user authentication.
This enhancement provides for global and external authentication when the Kerberos and Secure Sockets Layer (SSL) strong authentication features are used.
Related Topics
Changed Default Value for SQL92_SECURITY Parameter
Starting with this release, the default value for the SQL92_SECURITY
parameter has changed from FALSE
to TRUE
.
Oracle Database Vault Support for Flashback Technology and ILM
You now can use Oracle Flashback Technology features and Information Lifecycle Management (ILM) features in an Oracle Database Vault-enabled database.
The Oracle Flashback Technology enhancement enables you to use Database Vault realms and command rules to control access to database objects while you are using the Oracle Flashback features. You can protect the PURGE TABLE
, PURGE INDEX
, FLASHBACK TABLE
, PURGE TABLESPACE
, PURGE RECYCLEBIN
, PURGE DBA_RECYCLEBIN
, CREATE FLASHBACK ARCHIVE
, ALTER FLASHBACK ARCHIVE
, DROP FLASHBACK ARCHIVE
SQL statements with Database Vault command rules.
The ILM enhancement enables you to use Database Vault realms and command rules with the Automatic Data Optimization (ADO) features, including granting to users the authorization to enable an ADO administrative user to perform ILM operations on Database Vault-protected objects. This enhancement enables ILM to meet regulatory compliance requirements for data retention and protection, and to store large amounts of data at the lowest cost, using storage tiering. To manage authorizations for users to perform ILM operations, two new procedures are introduced with this release: DBMS_MACADM.AUTHORIZE_MAINTENANCE_USER
and DBMS_MACADM.UNAUTHORIZE_MAINTENANCE_USER
. To find information about ILM authorization grants, a new data dictionary view, DBA_DV_MAINTENANCE_AUTH
, is provided.
See Also:
-
About Realms for more information about how realms are affected by this enhancement
-
About Command Rules for more information about command rules
-
SQL Statements That Can Be Protected by Command Rules for a list of the Oracle Flashback Technology SQL statements that can be protected by Database Vault command rules
-
Using Information Lifecycle Management with Oracle Database Vault for information about granting users authorization to perform ILM tasks in a Database Vault environment
-
AUTHORIZE_MAINTENANCE_USER Procedure for information about the
DBMS_MACADM.AUTHORIZE_MAINTAINANCE_USER
procedure -
UNAUTHORIZE_MAINTENANCE_USER Procedure for information about the
DBMS_MACADM.UNAUTHORIZE_MAINTAINANCE_USER
procedure -
DBA_DV_MAINTENANCE_AUTH View for information about the
DBA_DV_MAINTENANCE_USER
data dictionary view -
Oracle Database VLDB and Partitioning Guide for more information about ILM
-
Oracle Database Backup and Recovery User’s Guide for more information about Oracle Flashback Recovery
Support for Rolling Upgrades for Data Guard Logical Standby Databases
Oracle Data Guard logical standby databases can perform rolling upgrades for Oracle Database Vault-enabled systems using transient logical standby and the DBMS_ROLLING
package.
See Integrating Oracle Database Vault with Oracle Data Guard for more information.
Related Topics
Deprecated Features
The following features have been deprecated for this release.
- Deprecated Rules and Rule Sets
Several default rules and rule sets are no longer included in a fresh installation of Oracle Database Vault. - Deprecated UTL_FILE_DIR Parameter
TheUTL_FILE_DIR
parameter has been deprecated for this release.
Deprecated Rules and Rule Sets
Several default rules and rule sets are no longer included in a fresh installation of Oracle Database Vault.
The following rules are no longer included in a fresh installation of an Oracle Database 12c release 2 (12.2) database:
-
Is _system_trig_enabled Parameters Allowed
-
Is o7_dictionary_accessibility Parameters Allowed
-
Is _dynamic_rls_init Parameters Allowed
-
Is Alter DVSYS Allowed
-
Are System Security Parameters Allowed
-
Are Dump or Dest Parameters Allowed
-
Are Backup Restore Parameters Allowed
-
Are Database File Parameters Allowed
-
Are Optimizer Parameters Allowed
-
Are PL-SQL Parameters Allowed
-
Are Security Parameters Allowed
The following default rule sets are not included in fresh installations of Oracle Database 12c release 2 (12.2):
-
Allow System Parameters
-
Allow Fine Grained Control of System Parameters
These rules and rule sets are replaced by new rules and rule sets that are more secure.
Related Topics