Session_11_all_slides1-37

Session_11_all_slides1-37 - Database Security Oracle Label...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
1 1 Database Security Oracle Label Based Security Session 11 2 Create Data Label • EXECUTE SA_LABEL_ADMIN.CREATE_LABEL('TE ST', 22121, 'S:NATO,ATOM:EU'); • Parameters – policy_name TEST – label_tag 22121 (must be unique) – label_value S:NATO,ATOM:EU • S = LEVEL; NATO,ATOM = COMPONENTS; EU = GROUP
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 3 Create Data Label • EXECUTE SA_LABEL_ADMIN.CREATE_LABEL('TE ST', 32121, 'C:NATO,ATOM,CYBR:G'); • EXECUTE SA_LABEL_ADMIN.CREATE_LABEL('TE ST', 43120, 'SE:NATO,ATOM,CYBR,VEGAS:S'); 4 Alter Data Label • EXECUTE SA_LABEL_ADMIN.ALTER_LABEL('TES T', 50000, 'C:NATO:S'); • Label Must Already Exist • Paramaters – policy_name TEST – label_tag 50000 – label_value C:NATO:S
Background image of page 2
3 5 Drop Data Label • EXECUTE SA_LABEL_ADMIN.DROP_LABEL('TEST' , 666666); • EXECUTE SA_LABEL_ADMIN.DROP_LABEL('TEST' ,'C'); • Parameters; policy_name (TEST); label_value (666666); or label_value (C) 6 Administering User Labels and Privileges
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 7 Set User Levels • EXECUTE SA_USER_ADMIN.SET_LEVELS('TEST', 'ABLE', 'C', 'S', 'C', 'S'); • Parameters – policy_name TEST – user_name ABLE – max_level Highest Level for Read/Write Access – min_level Lowest Level for Write Access – def_level = or > than min; = or < than max – row_level = or > than min; = or < def 8 Set User Compartments • EXECUTE SA_USER_ADMIN.SET_COMPARTMENTS('TE ST', 'ABLE', 'NATO,CYBR,ATOM,VEGAS', 'NATO,ATOM,CYBR', 'VEGAS,NATO', 'NATO'); • Parameters – policy_name TEST – user_name ABLE – read_comps Comma-Separated list of compartments authorized for read access
Background image of page 4
5 9 Set User Compartments • EXECUTE SA_USER_ADMIN.SET_COMPARTMENTS('TE ST', 'ABLE', 'NATO,CYBR,ATOM,VEGAS', 'NATO,ATOM,CYBR', 'VEGAS,NATO', 'NATO'); • Parameters – policy_name TEST – user_name ABLE – read_comps Comma-Separated list of compartments authorized for read access
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 19

Session_11_all_slides1-37 - Database Security Oracle Label...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online