User's Manual

Enterprise User Security Conguration Tasks and Troubleshooting 12-1
12
Enterprise User Security Configuration
Tasks and Troubleshooting
This chapter describes the sequence of steps involved to configure Enterprise User
Security from the initial database and directory preparation through connecting to
the database as either a password-, Kerberos-, or SSL-authenticated enterprise user.
In addition, a troubleshooting section is also included that will help you when
testing your Enterprise User Security implementation.
This chapter contains the following topics:
Enterprise User Security Configuration Overview
Enterprise User Security Configuration Roadmap
Preparing the Directory for Enterprise User Security
Configuring Enterprise User Security Objects in the Database and the Directory
Configuring Enterprise User Security for Password Authentication
Configuring Enterprise User Security for Kerberos Authentication
Configuring Enterprise User Security for SSL Authentication
Enabling Current User Database Links
Troubleshooting Enterprise User Security
Enterprise User Security Configuration Overview
Configuring EnterpriseUser Securityessentially consistsof creating sharedschemas
and global roles in databases that you want to be accessible to enterprise users.
Then you configure the identity management realm in the directory to reflect those
database roles and schemas, and, finally, associate directory users with them.