1、,Active Directory and Windows Security Integration with Oracle Database,Alex Keh Principal Product Manager, Windows and .NET Oracle,Agenda,Database Registration and Name Resolution Single Sign-On Windows Native Authentication Kerberos Security for Web Applications on Windows Enterprise User Security
2、 and Virtual Directory,Database Registration and Name Resolution Overview,Store and resolve Net names through Active Directory Eliminate tnsnames.ora on clients Centralize configuration, reduce administration Authenticated connection to Active Directory (11g) Enhanced tools support for storing Net n
3、aming AD Users and Computers Oracle DB Configuration Assistant, Net Configuration Assistant and Net Manager,Database Registration and Name Resolution Active Directory support,DB Names and Connect Descriptors Repository,Database Registration and Name Resolution Configuration/Administration,Windows Ad
4、min,Active Directory,2 Register Schema with NetCA,Client Systems,5 - Configure Directory Naming and AD Usage with NetCA,1 Ensure Admin can modify Schema in AD,3 - Create Naming Context using NetCA,4 - Register DB in AD using DBCA or Net Manager,Database Registration and Name Resolution Run-time,1 Us
5、er signs on to Desktop,2 User issues Connect Request,DB Names and Connect Descriptors Repository,3 - Retrieves Connect Descriptor,4 - Connect to DB using Connect Descriptor,(Any Platform),Oracle DB,AD/KDC,Database Registration and Name Resolution Demo Environment,Windows XP SP2,Windows Server 2003 E
6、E SP1 (Domain Controller),Machine Name: xpclient.adnet.dev User: oracle Database Server: orcl,Machine Name: w2k3s.adnet.dev Domain: adnet.dev,Tools installed on Windows XP Support Tools (under Support directory on CD) - ADSI Edit is part of it Admin Tools (under i386 directory on CD) - AD users & co
7、mputers, etc (These are available on Windows 2003 media,),D E M O N S T R A T I O N,Database Registration and Name Resolution,Database Registration and Name Resolution Summary,Ensure that Administrator can modify Schema in Active Directory Register Schema using NetCA (one time for the entire AD fore
8、st) Create Naming Context using NetCA (once per domain or the entire forest depending on where you create it) Register Database in AD using DBCA or Net Manager Configure Directory Naming and Directory Usage (AD) using NetCA (on systems that want to use AD) on clients Set NAMES.LDAP_AUTHENTICATE_BIND
9、=Yes in SQLNET.ORA on all 11g client systems To support pre-11g clients Enable anonymous bind in AD Change ACLs for Oracle Naming Context and Database/Net Services objects to allow anonymous access,Please refer to the white paper Configuring Microsoft Active Directory for Net Naming for detailed inf
10、ormation,Agenda,Database Registration and Name Resolution Single Sign-On Windows Native Authentication Kerberos Security for Web Applications on Windows Enterprise User Security and Virtual Directory Q&A,Single Sign-On,Windows Native Authentication,Enabled by default and can work across systems Very
11、 easy to configure and use Windows user logon credentials used for database authentication Authentication protocol (Kerberos or NTLM) negotiated based on OS and Domain Controller Oracle Administration Assistant can be used to manage user authentication and role authorization Independent of Database
12、Registration and Name Resolution feature,Windows Native Authentication Use of Windows Groups,ORA_DBA: all members get SYSDBA privileges ORA_OPER: all members get SYSOPER privileges For any other Windows user, an external user needs to be created in Oracle DB create user “Salesfrank” identified exter
13、nally; Windows groups can be used to assign roles (if os_roles is true) create role sales identified externally; Corresponding Windows group for a database with SID orcl: ORA_orcl_sales_d if this should be a default role (If Oracle Administration Assistant is used, it makes appropriate changes in AD
14、 and Database),Windows Native Authentication,2 - User attempts to sign on to Oracle,1 - User signs on to desktop,4 - Identify as specific External User,5 Find Windows Group memberships (if os_roles is true),3 Negotiate security protocol and exchange security tokens,6 Assign roles based on DB roles o
15、r group memberships (based on os_roles),Oracle DB,AD/KDC,Windows Native Authentication Configuration,Set os_authent_prefix to “” in init.ora Ensure that sqlnet.authentication_services is set to NTS in sqlnet.ora (default set up) Set os_roles to true in init.ora if you want to use Windows Group Membe
16、rship for role authorization,D E M O N S T R A T I O N,Windows Native Authentication,Kerberos Authentication,Integrated with Microsoft Key Distribution Center (MSKDC) Supports heterogeneous systems A Windows client can connect to a non-Windows server and vice versa Uses External User mechanisms in D
17、atabase Can also be supported with Enterprise User Security EE and ASO (Advanced Security Option) feature,Kerberos Enhancements,Constrained Delegation support for better support of Windows middle tier applications Connected User dblink support over Kerberos IPv6 Support Stronger encryption algorithm
18、s (AES) Support default encryption type supported by MS KDC Use DNS Domain Name as Kerberos REALM name by default Kerberos authentication to Oracle database in a MS cross-domain setup Removal of 30 character limit on the Kerberos user name,Kerberos Authentication Windows Client Configuration,Create
19、Kerberos and sqlnet configuration files using Oracle Net Manager Set sqlnet.kerberos5_cc_name to “OSMSFT:” in sqlnet.ora so that the credential is retrieved from Microsoft Credential Cache,Kerberos Authentication Server configuration (non-Windows),Create Kerberos and sqlnet configuration files on th
20、e server using Oracle Net Manager Create user in Active Directory for Database Server On the Domain Controller, use ktpass utility (available from Microsoft) to Create Database Service Principal in AD Map the Principal to AD user Create keytab file Copy keytab file to DB server node Set os_authent_p
21、refix to “” in init.ora,Kerberos Authentication,User attempts to sign on to Oracle,User signs on to desktop,Example: SQL CREATE USER KRBUSER IDENTIFIED EXTERNALLY AS KerberosUserSOMEORGANIZATION.COM; SQL Grant connect, resource to KRBUSER;,Oracle DB,AD/KDC,Identify as specific External User and assi
22、gn DB roles accordingly,Agenda,Database Registration and Name Resolution Single Sign-On Windows Native Authentication Kerberos Security for Web Applications on Windows Enterprise User Security and Virtual Directory,Oracle DB,Service Test Monitoring,User Communities,Web Apps On Windows (IIS),Web User
23、 Authentication,Web Application to DB Authentication,Web Applications on Windows,AD/KDC,Web User Authentication Solutions,Oracle Identity Management solutions Integrated with Active Directory Supports heterogeneous environments Check http:/ ASP.NET Membership and Role Provider for Oracle Validate an
24、d manage user and authorization information for your ASP.NET web applications in Oracle Database Deployment time option Oracle Database can be on any platform These are Oracle provided solutions which can be used in addition to the solutions provided by Microsoft,Web Application to Database Authenti
25、cation,Windows native authentication Run Web Applications as specific Windows users or use IIS mechanisms for mapping Web users to Windows users Use OS authenticated connection pool (ODP.NET supports it) Database must be on Windows Kerberos authentication can be used when Database is on a non-Window
26、s platform User ID/Password If you must use it, use Secure External Password Store (in Oracle Wallet) to store the password securely Database can be on any platform Evaluate other security solutions: Oracle Advanced Security Recommend the use of Application Context/Client ID for end-to-end auditing
27、and security,Agenda,Database Registration and Name Resolution Single Sign-On Windows Native Authentication Kerberos Security Integration for Web Applications on Windows Enterprise User Security and Virtual Directory,Identity Management Options,Enterprise User Security (EUS),User Management 4 Databas
28、es (UM4DB),Enterprise User Security,Centralize user accounts and roles into enterprise directoryRequires Oracle Virtual Directory or Oracle Internet Directory,What is Oracle Virtual Directory,Service that aggregates identity data without consolidation reducing the time it takes to deploy LDAP, Web S
29、ervice and Database applications,EUS OVD Architecture,User Management for Databases (UM4DB),Provides centralized life-cycle management for databases From hire to exit Provides self-service Audit/Compliance reportsRestricted License of OIM and OVD/OID,UM4DB,Helpdesk,Administrator,Value: Automated Com
30、pliance Reporting,EUS and OVD Summary,EUS centralizes database account management into a directoryEUS works across heterogeneous operating systemsOVD enables EUS to work with 3rd party directories without synchronization,Session Summary,Most comprehensive solutions for integration with Active Direct
31、ory and Windows Security Support client/server and web applications Support homogeneous and heterogeneous environments Oracle solutions extend Microsoft offerings,For More Information,Windows Server System Center http:/ Oracle Net Services http:/ Oracle Database Security http:/ Oracle Virtual Direct
32、ory (OVD) http:/ Oracle Identity & Access Management http:/ For questions, email ,The preceding is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracles products remains at the sole discretion of Oracle.,