Incentives to reduce key account sharing
|
This follows the same premise as the first
requirement – users should have their own user ids, be they in
database, in some directory, or in some application user table.
This is possible by using unique ids for all users. |
Single-use or token based passwords |
This is not strictly within a database
framework. It means the ability to assign a password that can be
used only once, after which the password expires. This can be
implemented in an indirect way, using triggers to capture when
the user logged in and then altering the DBA to expire the
account, or change the password. |
Token card plus password or PIN |
This security model requires two forms of
authentication –a password and a token card. This combination is
challenging for the hackers to break. Oracle Advanced Security
provides several options to use Token Card Authentication in
addition to passwords. |