xvi
How to Implement Policy Groups ......................................................................................... 14-32
Step 1: Set Up a Driving Context..................................................................................... 14-32
Step 2: Add a Policy to the Default Policy Group......................................................... 14-33
Step 3: Add a Policy to the HR Policy Group................................................................ 14-33
Step 4: Add a Policy to the FINANCE Policy Group ................................................... 14-34
Validation of the Application Used to Connect ................................................................... 14-34
How to Add a Policy to a Table, View, or Synonym................................................................. 14-35
DBMS_RLS.ADD_POLICY Procedure Policy Types........................................................... 14-36
Optimizing Performance by Enabling Static and Context Sensitive Policies .................. 14-38
About Static Policies.......................................................................................................... 14-39
About Context Sensitive Policies..................................................................................... 14-39
Adding Policies for Column-Level VPD............................................................................... 14-40
Default Behavior................................................................................................................ 14-41
Column Masking Behavior .............................................................................................. 14-42
Enforcing VPD Policies on Specific SQL Statement Types................................................. 14-44
Enforcing Policies on Index Maintenance...................................................................... 14-44
How to Check for Policies Applied to a SQL Statement......................................................... 14-44
Users Who Are Exempt from VPD Policies............................................................................... 14-45
SYS User Exempted from VPD Policies................................................................................. 14-45
EXEMPT ACCESS POLICY System Privilege ...................................................................... 14-46
Automatic Reparse.......................................................................................................................... 14-46
VPD Policies and Flashback Query............................................................................................. 14-47
15 Preserving User Identity in Multitiered Environments
Security Challenges of Three-tier Computing............................................................................ 15-2
Who Is the Real User? ................................................................................................................ 15-2
Does the Middle Tier Have Too Much Privilege?.................................................................. 15-2
How to Audit? Whom to Audit?.............................................................................................. 15-3
What Are the Authentication Requirements for Three-tier Systems? ................................ 15-3
Client to Middle Tier Authentication ............................................................................... 15-3
Middle Tier to Database Authentication.......................................................................... 15-3
Client Re-Authentication Through Middle Tier to Database........................................ 15-4
Oracle Database Solutions for Preserving User Identity.......................................................... 15-5
Proxy Authentication................................................................................................................. 15-5
Passing Through the Identity of the Real User by Using Proxy Authentication ....... 15-5