|
 |
|
Oracle Tips by Burleson |
Chapter 7 Oracle Network Security
Figure 7.8
Typical Client and Server Restrictions Based on Departments
In this network, the application servers
CLAIMS1 and CLAIMS2 access the database on server CLAIMDBSVR. Since
we know that no client machines other than the ones shown here are
going to access the server database, the Net8 listener on the
database server can be configured to accept connections only from
these machines. The network also has some other servers, such as the
application servers ENROLLMENT1 and ENROLLMENT2 accessing the
database on server ENROLLDBSVR. The listener on CLAIMDBSVR can be
configured so that the connection requests from ENROLLMENT1 and
ENROLLMENT2 are rejected and CLAIMS1 and CLAIMS2 are accepted.
This can be done suing a
facility called Valid Node Checking in Net8. A set of parameters can
be placed in
The above text is
an excerpt from
the bestselling book:
Oracle
Privacy Security Auditing.
It's only $39.95 and has an
download of working security scripts:
This is the only authoritative
book on Oracle Security, Oracle Privacy, and Oracle Auditing written
by two of the world’s leading Oracle Security experts.
This indispensable book is only $39.95 and has an
download of working security scripts:
http://rampant-books.com/book_2003_2_audit.htm
Download your Oracle scripts now:
www.oracle-script.com
The
definitive Oracle Script collection for every Oracle professional DBA
|
|