Corporation Network Router User Manual
Enterprise User Security Configuration Tasks and Troubleshooting 12-1
12
Enterprise User Security Configuration
Tasks and Troubleshooting
This chapter describes the sequence of steps involved to configure Enterprise User
Security from the initial database and directory preparation through connecting to
the database as either a password-, Kerberos-, or SSL-authenticated enterprise user.
In addition, a troubleshooting section is also included that will help you when
testing your Enterprise User Security implementation.
This chapter contains the following topics:
■ Enterprise User Security Configuration Overview
■ Enterprise User Security Configuration Roadmap
■ Preparing the Directory for Enterprise User Security
■ Configuring Enterprise User Security Objects in the Database and the Directory
■ Configuring Enterprise User Security for Password Authentication
■ Configuring Enterprise User Security for Kerberos Authentication
■ Configuring Enterprise User Security for SSL Authentication
■ Enabling Current User Database Links
■ Troubleshooting Enterprise User Security
Enterprise User Security Configuration Overview
Configuring EnterpriseUser Securityessentially consistsof creating sharedschemas
and global roles in databases that you want to be accessible to enterprise users.
Then you configure the identity management realm in the directory to reflect those
database roles and schemas, and, finally, associate directory users with them.