les__Proxy数据库安全审计课件.ppt
《les__Proxy数据库安全审计课件.ppt》由会员分享,可在线阅读,更多相关《les__Proxy数据库安全审计课件.ppt(36页珍藏版)》请在三一办公上搜索。
1、Using Proxy Authentication,Using Proxy Authentication,Objectives,After completing this lesson, you should be able to do the following:Describe how proxy authentication worksManage users authenticated by proxy authenticationAudit users authenticated by proxy,ObjectivesAfter completing thi,User Authen
2、tication,Identify the user in the following ways:Basic authenticationDatabase user identified by a passwordDatabase user identified by the operating systemStrong authenticationEnterprise User SecurityProxy authentication,User Authentication Identify t,Security Challenges ofThree-Tier Computing,Ident
3、ify the real userAuthenticate the end user to the database Restrict the privileges of the middle tier,Security Challenges ofThree-T,Identifying the Real User,The database needs the end-user identity for the following security functions:AuthenticationData access controlAuditingApplication-level secur
4、ity requires that:Security must be coded in every applicationApplications must be the only method to access the data,Application server,Database,User,Abuser,Identifying the Real UserThe d,Identifying the Real User (continued),Identifying the Real User (con,Common Implementations of Authentication,Pa
5、ss through: The user is unknown to the application. One big-application user: The user is unknown to the database. Other methods: The user is reauthenticated to the database.The user is identified to the database.The user is proxied.,Application server,Database,User,Common Implementations of Aut,les
6、_Proxy数据库安全审计课件,User Reauthentication,Types of authentication in three-tier systems:Middle tier-to-database authenticationClient-to-middle tier authenticationClient reauthentication through the middle tier to the database:Does the end user need to log in multiple times?Can the end users database acc
7、ount information be stored in the application?Can the user be authenticated by using Lightweight Directory Access Protocol (LDAP)?Point-to-point protocols, such as secure sockets layer (SSL), can authenticate to only one node.Single authentication,User ReauthenticationTypes of,les_Proxy数据库安全审计课件,Res
8、tricting the Privileges of the Middle Tier,Middle tier with high privileges:Connects with one database user for all application usersHas all privileges for all application users for all connectionsDoes not identify the end user to the database.Middle tier with limited privileges:Adjusts privileges b
9、y user identityMay identify user to database,Restricting the Privileges of,Implementing Proxy Authentication Solutions,Proxy authentication solutions depend on the type of the end user:Known to the database:Database user and enterprise userPossible to reauthenticate to the databaseAuditing actions t
10、aken on behalf of the real userUnknown to the database:End user known only to the applicationSupport for application-user modelsLimiting the privilege of the middle tier,Implementing Proxy Authenticat,les_Proxy数据库安全审计课件,Authenticating Database andEnterprise Users,Use Oracle Call Interface (OCI) or J
11、ava Database Connectivity (JDBC).The authentication process includes the following steps:The client authenticates to the middle tier.The middle tier authenticates to the database.The middle tier creates the end users session.The database verifies that the middle tier can:Create the session for the u
12、serAssign the roles assigned to the userDatabase users can be:Authenticated to the application serverReauthenticated to the database,Authenticating Database andEn,les_Proxy数据库安全审计课件,Using Proxy Authenticationfor Database Users,Authenticate the user without a database password:Authenticate the user w
13、ith a database password:,ALTER USER phallGRANT CONNECTTHROUGH APPSVR;,ALTER USER phallGRANT CONNECTTHROUGH APPSVRAUTHENTICATION REQUIRED PASSWORD;,Using Proxy Authenticationfor,les_Proxy数据库安全审计课件,Using Proxy Authentication for Enterprise Users,Authenticate the user with a distinguished name:Authenti
14、cate the user with a certificate:,ALTER USER phall GRANT CONNECTTHROUGH APPSVR AUTHENTICATED USING DISTINGUISHED NAME;,ALTER USER phallGRANT CONNECTTHROUGH APPSVRAUTHENTICATED USING CERTIFICATETYPE X.509 VERSION 3;,Using Proxy Authentication fo,les_Proxy数据库安全审计课件,Proxy Access Through SQL*Plus,Proxy
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- les_Proxy 数据库 安全 审计 课件
![提示](https://www.31ppt.com/images/bang_tan.gif)
链接地址:https://www.31ppt.com/p-1286178.html