Skip Headers

Oracle® Label Security Administrator's Guide
10g Release 1 (10.1)

Part Number B10774-01
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Index
Index
Go to Master Index
Master Index
Go to Feedback page
Feedback

Go to previous page
Previous
Go to next page
Next
View PDF


Preface

Oracle Label Security enables access control to reach specific (labeled) rows of a database. With Oracle Label Security in place, users with varying privilege levels automatically have (or are excluded from) the right to see or alter labeled rows of data.

This Oracle Label Security Administrator's Guide describes how to use Oracle Label Security to protect sensitive data. It explains the basic concepts behind label-based security and provides examples to show how it is used.

This preface contains these topics:

Audience

The Oracle Label Security Administrator's Guide is intended for database administrators (DBAs), application programmers, security administrators, system operators, and other Oracle users who perform the following tasks:

To use this document, you need a working knowledge of SQL and Oracle fundamentals. You should also be familiar with Oracle security features described in "Related Documentation". To use SQL*Loader, you must know how to use the file management facilities of your operating system.

Documentation Accessibility

Our goal is to make Oracle products, services, and supporting documentation accessible, with good usability, to the disabled community. To that end, our documentation includes features that make information available to users of assistive technology. This documentation is available in HTML format, and contains markup to facilitate access by the disabled community. Standards will continue to evolve over time, and Oracle is actively engaged with other market-leading technology vendors to address technical obstacles so that our documentation can be accessible to all of our customers. For additional information, visit the Oracle Accessibility Program Web site at

http://www.oracle.com/accessibility/

Accessibility of Code Examples in Documentation

JAWS, a Windows screen reader, may not always correctly read the code examples in this document. The conventions for writing code require that closing braces should appear on an otherwise empty line; however, JAWS may not always read a line of text that consists solely of a bracket or brace.

Accessibility of Links to External Web Sites in Documentation

This documentation may contain links to Web sites of other companies or organizations that Oracle does not own or control. Oracle neither evaluates nor makes any representations regarding the accessibility of these Web sites.

Organization

This document contains:

Part I: Concepts

This part introduces basic conceptual information about Oracle Label Security.

Chapter 1, "Introduction to Oracle Label Security"

This chapter introduces Oracle Label Security in the larger context of data security. It gives an overview of computer security issues and data access controls, and outlines the architecture and major features of Oracle Label Security.

Chapter 2, "Understanding Data Labels and User Labels"

This chapter discusses the fundamental concepts of data labels and user authorizations, and introduces the terminology that will help you understand Oracle Label Security. It covers label components, label syntax and type, and explains how data labels and user authorizations work together.

Chapter 3, "Understanding Access Controls and Privileges"

This chapter presents the access controls and privileges that determine the type of access users can have to the rows affected. It introduces the concepts of session label and row label, and explains how rows are evaluated for access mediation.

Part II: Using Oracle Label Security Functionality

This part provides the information needed by users of Oracle Label Security policies.

Chapter 4, "Working with Labeled Data"

This chapter explains how to use Oracle Label Security features to manage labeled data. It then shows how to view and change the value of security attributes for a session.

Chapter 5, "Oracle Label Security Using Oracle Internet Directory"

This chapter explains the integration of Oracle Label Security features with those of Oracle Internet Directory. Enabling Oracle Label Security to take advantage of the central directory simplifies management of data labels, user labels and privileges, policies, and enterprise users across multiple databases and domains.

Part III: Administering an Oracle Label Security Application

This part explains how to create and manage an Oracle Label Security application.

Chapter 6, "Creating an Oracle Label Security Policy"

This chapter explains how to create an Oracle Label Security policy, and its underlying label components and labels.

Chapter 7, "Administering User Labels and Privileges"

This chapter explains how you can set authorizations for users, and grant privileges to users or stored program units by means of the available Oracle Label Security packages, or Oracle Policy Manager.

Chapter 8, "Implementing Policy Enforcement Options and Labeling Functions"

This chapter explains how to customize the enforcement of Oracle Label Security policies, and how to implement labeling functions and SQL predicates.

Chapter 9, "Applying Policies to Tables and Schemas"

This chapter describes the SA_POLICY_ADMIN package, which enables you to administer policies on tables and schemas.

Chapter 10, "Administering and Using Trusted Stored Program Units"

This chapter explains how to use trusted stored program units to enhance system security.

Chapter 11, "Auditing Under Oracle Label Security"

This chapter explains how Oracle Label Security supplements the Oracle9i audit facility by tracking use of its own administrative operations and policy privileges. It describes the SA_AUDIT_ADMIN package, which enables you to set and change the policy auditing options.

Chapter 12, "Using Oracle Label Security with a Distributed Database"

This chapter describes special considerations for using Oracle Label Security in a distributed configuration.

Chapter 13, "Performing DBA Functions Under Oracle Label Security"

The standard Oracle9i utilities can be used under Oracle Label Security, but certain restrictions apply, and extra steps may be required to get the expected results. This chapter describes these special considerations.

Chapter 14, "Releasability Using Inverse Groups"

This chapter discusses the Oracle Label Security implementation of releasability using inverse groups.

Part IV: Appendices

Appendix A, "Advanced Topics in Oracle Label Security"

This appendix describes dominance relationships, and other ways in which the relationships between labels can be analyzed. It also describes the OCI interface for setting session labels.

Appendix C, "Reference"

This appendix documents the MAX_LABEL_POLICIES initialization parameter, the Oracle Label Security data dictionary tables, and Oracle Label Security restrictions.

Related Documentation

For more information, see these Oracle resources:

Many of the examples in the documentation set use the sample schemas of the seed database, which is installed by default when you install Oracle. Refer to Oracle Database Sample Schemas for information on how these schemas were created and how you can use them yourself.

In North America, printed documentation is available for sale in the Oracle Store at

http://oraclestore.oracle.com/

Other customers can contact their Oracle representative to purchase printed documentation.

To download free release notes, installation documentation, white papers, or other collateral, please visit the Oracle Technology Network (OTN). You must register online before using OTN; registration is free and can be done at

http://otn.oracle.com/admin/account/membership.html

If you already have a username and password for OTN, then you can go directly to the documentation section of the OTN Web site at

http://otn.oracle.com/docs/index.htm

Conventions

This section describes the conventions used in the text and code examples of this documentation set. It describes:

Conventions in Text

We use various conventions in text to help you more quickly identify special terms. The following table describes those conventions and provides examples of their use.

Convention Meaning Example

Bold

Bold typeface indicates terms that are defined in the text or terms that appear in a glossary, or both.

When you specify this clause, you create an index-organized table.

Italics

Italic typeface indicates book titles or emphasis.

Oracle Database Concepts

Ensure that the recovery catalog and target database do not reside on the same disk.

UPPERCASE monospace (fixed-width) font

Uppercase monospace typeface indicates elements supplied by the system. Such elements include parameters, privileges, datatypes, RMAN keywords, SQL keywords, SQL*Plus or utility commands, packages and methods, as well as system-supplied column names, database objects and structures, usernames, and roles.

You can specify this clause only for a NUMBER column.

You can back up the database by using the BACKUP command.

Query the TABLE_NAME column in the USER_TABLES data dictionary view.

Use the DBMS_STATS.GENERATE_STATS procedure.

lowercase monospace (fixed-width) font

Lowercase monospace typeface indicates executables, filenames, directory names, and sample user-supplied elements. Such elements include computer and database names, net service names, and connect identifiers, as well as user-supplied database objects and structures, column names, packages and classes, usernames and roles, program units, and parameter values.

Note: Some programmatic elements use a mixture of UPPERCASE and lowercase. Enter these elements as shown.

Enter sqlplus to open SQL*Plus.

The password is specified in the orapwd file.

Back up the datafiles and control files in the /disk1/oracle/dbs directory.

The department_id, department_name, and location_id columns are in the hr.departments table.

Set the QUERY_REWRITE_ENABLED initialization parameter to true.

Connect as oe user.

The JRepUtil class implements these methods.

lowercase italic monospace (fixed-width) font

Lowercase italic monospace font represents placeholders or variables.

You can specify the parallel_clause.

Run Uold_release.SQL where old_release refers to the release you installed prior to upgrading.

Conventions in Code Examples

Code examples illustrate SQL, PL/SQL, SQL*Plus, or other command-line statements. They are displayed in a monospace (fixed-width) font and separated from normal text as shown in this example:

SELECT username FROM dba_users WHERE username = 'MIGRATE';

The following table describes typographic conventions used in code examples and provides examples of their use.

Convention Meaning Example

[ ]

Brackets enclose one or more optional items. Do not enter the brackets.

DECIMAL (digits [ , precision ])

{ }

Braces enclose two or more items, one of which is required. Do not enter the braces.

{ENABLE | DISABLE}

|

A vertical bar represents a choice of two or more options within brackets or braces. Enter one of the options. Do not enter the vertical bar.

{ENABLE | DISABLE}

[COMPRESS | NOCOMPRESS]

...

Horizontal ellipsis points indicate either:

  • That we have omitted parts of the code that are not directly related to the example
  • That you can repeat a portion of the code

CREATE TABLE ... AS subquery;

SELECT col1, col2, ... , coln FROM employees;

.

.

.

Vertical ellipsis points indicate that we have omitted several lines of code not directly related to the example.

 

Other notation

You must enter symbols other than brackets, braces, vertical bars, and ellipsis points as shown.

acctbal NUMBER(11,2);

acct CONSTANT NUMBER(4) := 3;

Italics

Italicized text indicates placeholders or variables for which you must supply particular values.

CONNECT SYSTEM/system_password

DB_NAME = database_name

UPPERCASE

Uppercase typeface indicates elements supplied by the system. We show these terms in uppercase in order to distinguish them from terms you define. Unless terms appear in brackets, enter them in the order and with the spelling shown. However, because these terms are not case sensitive, you can enter them in lowercase.

SELECT last_name, employee_id FROM employees;

SELECT * FROM USER_TABLES;

DROP TABLE hr.employees;

lowercase

Lowercase typeface indicates programmatic elements that you supply. For example, lowercase indicates names of tables, columns, or files.

Note: Some programmatic elements use a mixture of UPPERCASE and lowercase. Enter these elements as shown.

SELECT last_name, employee_id FROM employees;

sqlplus hr/hr

CREATE USER mjones IDENTIFIED BY ty3MU9;