11.2 Overview of Manually Administering External Users and Roles
Instead of using Oracle Administration Assistant for Windows, you can manually configure administrators, operators, users, and roles to be authenticated by the operating system.
Manual configuration involves using Oracle Database command-line tools, editing the registry, and creating local groups in Active Directory Users and Computers.
All of the following can be manually configured to access Oracle Database without a password:
-
External operating system users
-
Windows database administrators (with
SYSDBA
privilege) -
Windows database operators (with
SYSOPER
privilege)
In addition, you can manually create and grant local and external database roles to Windows domain users and global groups.
This section describes:
-
About Manually Creating an External Operating System User
Describes how to authenticate external operating system users (not database administrators) using Windows, so that a password is not required when accessing the database. When you use Windows to authenticate external operating system users, your database relies solely on the operating system to restrict access to database user names.
-
Overview of Manually Granting Administrator, Operator, and Task-Specific Privileges for Databases
Describes how to enable Windows to grant the database administrator (
SYSDBA
), database operator (SYSOPER
), database administrator for ASM (SYSASM
), and new task-specific and less privileged than theORA_DBA/SYSDBA
system privileges to administrators. -
Managing New Users and User Groups
During Oracle Database installation,
ORA_INSTALL, ORA_DBA, ORA_OPER, ORA_HOMENAME_DBA, ORA_HOMENAME_OPER, ORA_HOMENAME_SYSDG, ORA_HOMENAME_SYSBACKUP, ORA_HOMENAME_SYSKM, ORA_ASMADMIN, ORA_ASMDBA
, andORA_ASMOPER
user groups are automatically created with the required privileges. -
Overview of Manually Creating an External Role
Describes how to grant Oracle Database roles to users directly through Windows (known as external roles). When you use Windows to authenticate users, Windows local groups can grant these users external roles.
-
About Manually Migrating Users
You can migrate local or external users to enterprise users with User Migration Utility. Migrating from a database user model to an enterprise user model provides solutions to administrative, security, and usability challenges in an enterprise environment. In an enterprise user model, all user information is moved to an LDAP directory service, which provides the following benefits:
Note:
Use extreme care when manually configuring administrators, operators, users, and roles to be authenticated by the operating system. If possible, use Oracle Administration Assistant for Windows to perform configuration procedures.
Topics:
- About Manually Creating an External Operating System User
Describes how to authenticate external operating system users (not database administrators) using Windows, so that a password is not required when accessing the database. - Overview of Manually Granting Administrator, Operator, and Task-Specific Privileges for Databases
Describes how to enable Windows to grant the database administrator (SYSDBA
), database operator (SYSOPER
), database administrator for ASM (SYSASM
), and new task-specific and less privileged than theORA_DBA
/SYSDBA
system privileges to administrators. - Managing New Users and User Groups
Learn how to manage new users and user groups. - Overview of Manually Creating an External Role
Describes how to grant Oracle Database roles to users directly through Windows (known as external roles). - About Manually Migrating Users
You can migrate local or external users to enterprise users with User Migration Utility.
11.2.1 About Manually Creating an External Operating System User
Describes how to authenticate external operating system users (not database administrators) using Windows, so that a password is not required when accessing the database.
When you use Windows to authenticate external operating system users, your database relies solely on the operating system to restrict access to database user names.
Note that if a Windows Local User is used as the Oracle Home User for an Oracle home, then external user authentication of the Windows Local users is only supported from the same computer. Oracle recommends using Windows Domain User or Windows built-in user as the Oracle Home User to support external authentication of the Windows Domain User from the same computer or a different computer.
In the following procedure, two Windows user names are authenticated:
-
Local user
jones
-
Domain user
jones
on domainsales
Local user jones
logs into its local Windows client computer to access an Oracle Database server, which can be on a different computer. To access other databases and resources on other computers, the local user must provide a user name and password each time.
Domain user jones
on domain sales
logs into a sales
domain that includes many other Windows computers and resources, one of which contains an Oracle Database server. The domain user can access all the resources the domain provides with a single user name and password.
Topics:
- Performing External User Authentication Tasks on the Oracle Database Server
Use this procedure to perform external user authentication tasks. - Performing External User Authentication Tasks on the Client Computer
Use this procedure to perform external user authentication tasks on the client computer.
11.2.1.1 Performing External User Authentication Tasks on the Oracle Database Server
Use this procedure to perform external user authentication tasks.
Perform the following external user authentication tasks on the Oracle Database server:
11.2.2 Overview of Manually Granting Administrator, Operator, and Task-Specific Privileges for Databases
Describes how to enable Windows to grant the database administrator (SYSDBA
), database operator (SYSOPER
), database administrator for ASM (SYSASM
), and new task-specific and less privileged than the ORA_DBA
/SYSDBA
system privileges to administrators.
With these privileges, the administrator can issue the following commands from a client computer and connect to Oracle Database without entering a password:
SQL> CONNECT / AS SYSOPER SQL> CONNECT / AS SYSDBA SQL> CONNECT / AS SYSASM SQL> CONNECT / AS SYSBACKUP SQL> CONNECT / AS SYSDG SQL> CONNECT / AS SYSKM
To enable this feature, a Windows local or a domain user name of the administrator must belong to one of the Windows local groups listed in Windows Local Groups with SYSDBA, SYSOPER, SYSASM, SYSDG, SYSBACKUP, and SYSKM Privileges.
Table 11-1 Windows Local Groups with SYSDBA, SYSOPER, SYSASM, SYSDG, SYSBACKUP, and SYSKM Privileges
Local Group | System Privileges |
---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Note
All the groups mentioned in the table above are automatically created during installation and the Oracle Home User is automatically added to ORA_
HOMENAME
_DBA
group. See section "Overview of Operating System Authentication Enabled at Installation" for information.
See Also:
The manual procedure for enabling administrators to connect as SYSOPER
, SYSDBA
, SYSASM
, SYSDG
, SYSKM
, or SYSBACKUP
without a password is divided into two sets of tasks performed on different computers:
Topics:
- Running System Privilege Authentication Tasks on the Oracle Database Server
Learn about running system privilege authentication tasks on the Oracle Database server. - Running System Privilege Authentication Tasks on the Client Computer
Learn about running system privilege authentication tasks on the client computer.
11.2.2.1 Running System Privilege Authentication Tasks on the Oracle Database Server
Learn about running system privilege authentication tasks on the Oracle Database server.
11.2.3 Managing New Users and User Groups
Learn how to manage new users and user groups.
During Oracle Database installation, ORA_INSTALL
, ORA_DBA
, ORA_OPER
, ORA_
HOMENAME
_DBA
, ORA_
HOMENAME
_OPER
, ORA_
HOMENAME
_SYSDG
, ORA_
HOMENAME
_SYSBACKUP
, ORA_
HOMENAME
_SYSKM
, ORA_ASMADMIN
, ORA_ASMDBA
, and ORA_ASMOPER
user groups are automatically created with the required privileges.
11.2.4 Overview of Manually Creating an External Role
Describes how to grant Oracle Database roles to users directly through Windows (known as external roles).
When you use Windows to authenticate users, Windows local groups can grant these users external roles.
All privileges for these roles are active when the user connects. When using external roles, all roles are granted and managed through the operating system. You cannot use both external roles and Oracle Database roles at the same time.
Consider the following example. With external roles enabled, you log on to a Windows domain with domain user name sales\jones
(sales
is the domain name and jones
is the domain user name). You then connect to Oracle Database as Oracle Database user smith
. In this case, you receive the roles granted to sales\jones
but not the roles granted to smith
.
The procedure for manually creating an external role is divided into two sets of authorization tasks performed on different computers:
Topics:
- Performing External Role Authorization Tasks on the Oracle Database Server
Learn how to perform external role authorization tasks on the Oracle Database server. - Performing External Role Authorization Tasks on the Client Computer
Learn how to perform external role authorization tasks on the client computer.
11.2.4.1 Performing External Role Authorization Tasks on the Oracle Database Server
Learn how to perform external role authorization tasks on the Oracle Database server.
See Also:
Your operating system documentation for instructions on managing users and groups
11.2.5 About Manually Migrating Users
You can migrate local or external users to enterprise users with User Migration Utility.
Migrating from a database user model to an enterprise user model provides solutions to administrative, security, and usability challenges in an enterprise environment. In an enterprise user model, all user information is moved to an LDAP directory service, which provides the following benefits:
-
Centralized storage and management of user information
-
Centralized user authentication
-
Enhanced security
User Migration Utility is a command-line tool. Its syntax is of the form:
C:\ umu parameters
To get a list of User Migration Utility parameters, enter:
C:\ umu help=yes
See Also:
Oracle Database Enterprise User Security Administrator's Guide in "Using the User Migration Utility."