User's Manual
Post Installation Checks
D-4 Oracle Database Advanced Security Administrator's Guide
Post Installation Checks
After the installation, the following permissions must be verified in the operating
system:
■ Execute permissions must be set on all Oracle Advanced Security executable
files so as to prevent execution of Oracle Advanced Security by users who are
unauthorized to do so in accordance with the system security policy.
■ Read and write permissions must be set on all executable files so as to prevent
accidental or deliberate reading or modification of Oracle Advanced Security
files by any user.
To comply with FIPS 140-1 Level 2 requirements, the security policy must include
procedures to prevent unauthorized users from reading or modifying executing
Oracle Advanced Security processes and the memory they are using in the
operating system.
Status Information
Status information for Oracle Advanced Security is available after the connection
has been established. The information is contained in the RDBMS virtual table
v$session_connect_info.
Running the query SELECT * from V$SESSION_CONNECT_INFO displays all of the
product banner information for the active connection. Table D–1 shows an example
of a connection configuration where both DES encryption and MD5 data integrity is
defined:
Table D–1 Sample Output from v$session_connect_info
SID AUTHENTICATION OSUSER NETWORK_SERVICE_BANNER
7 DATABASE oracle Oracle Bequeath operating system adapter for
Solaris, v8.1.6.0.0
7 DATABASE oracle Oracle Advanced Security: encryption service for
Solaris
7 DATABASE oracle Oracle Advanced Security: DES encryption service
adapter
7 DATABASE oracle Oracle Advanced Security: crypto-checksumming
service
7 DATABASE oracle Oracle Advanced Security: MD5
crypto-checksumming service adapter.