<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Controlling access to sqlplus in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/controlling-access-to-sqlplus/m-p/4022759#M746166</link>
    <description>Normally  sqlplus is installed with user:groups same as the Oracle instance. Just remove all users from that group (dba) and control access to sqlplus via sudo.&lt;BR /&gt;&lt;BR /&gt;regards,&lt;BR /&gt;ivan</description>
    <pubDate>Tue, 19 Jun 2007 08:56:31 GMT</pubDate>
    <dc:creator>Ivan Krastev</dc:creator>
    <dc:date>2007-06-19T08:56:31Z</dc:date>
    <item>
      <title>Controlling access to sqlplus</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/controlling-access-to-sqlplus/m-p/4022756#M746163</link>
      <description>Hi,&lt;BR /&gt;We have a Production database. There have been instances when someone logged into the database via SqlPlus and performed some service impacting transactions. &lt;BR /&gt;&lt;BR /&gt;We would like to know if there's any way to prevent this. &lt;BR /&gt;How do we restrict access to the database? &lt;BR /&gt;What is the strategy that can be applied?&lt;BR /&gt;&lt;BR /&gt;Please let me know.&lt;BR /&gt;&lt;BR /&gt;Thanks and regards,&lt;BR /&gt;Kaustubh Kane.&lt;BR /&gt;</description>
      <pubDate>Tue, 19 Jun 2007 08:38:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/controlling-access-to-sqlplus/m-p/4022756#M746163</guid>
      <dc:creator>Kaustubh Kane</dc:creator>
      <dc:date>2007-06-19T08:38:19Z</dc:date>
    </item>
    <item>
      <title>Re: Controlling access to sqlplus</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/controlling-access-to-sqlplus/m-p/4022757#M746164</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;You must look at Oracle Security Guide book.&lt;BR /&gt;&lt;BR /&gt;I think "5 Authorization: Privileges, Roles, Profiles, and Resource Limitations" section for 10GR2 is useful for you &lt;BR /&gt;&lt;A href="http://download-uk.oracle.com/docs/cd/B19306_01/network.102/b14266/authoriz.htm#sthref427" target="_blank"&gt;http://download-uk.oracle.com/docs/cd/B19306_01/network.102/b14266/authoriz.htm#sthref427&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;If your database different from 10GR2 please look at related page from OTN.&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;Murat&lt;BR /&gt;HP</description>
      <pubDate>Tue, 19 Jun 2007 08:52:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/controlling-access-to-sqlplus/m-p/4022757#M746164</guid>
      <dc:creator>Murat SULUHAN</dc:creator>
      <dc:date>2007-06-19T08:52:20Z</dc:date>
    </item>
    <item>
      <title>Re: Controlling access to sqlplus</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/controlling-access-to-sqlplus/m-p/4022758#M746165</link>
      <description>Outside of what Murat suggested you can use sudo or RBAC.</description>
      <pubDate>Tue, 19 Jun 2007 08:55:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/controlling-access-to-sqlplus/m-p/4022758#M746165</guid>
      <dc:creator>Court Campbell</dc:creator>
      <dc:date>2007-06-19T08:55:30Z</dc:date>
    </item>
    <item>
      <title>Re: Controlling access to sqlplus</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/controlling-access-to-sqlplus/m-p/4022759#M746166</link>
      <description>Normally  sqlplus is installed with user:groups same as the Oracle instance. Just remove all users from that group (dba) and control access to sqlplus via sudo.&lt;BR /&gt;&lt;BR /&gt;regards,&lt;BR /&gt;ivan</description>
      <pubDate>Tue, 19 Jun 2007 08:56:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/controlling-access-to-sqlplus/m-p/4022759#M746166</guid>
      <dc:creator>Ivan Krastev</dc:creator>
      <dc:date>2007-06-19T08:56:31Z</dc:date>
    </item>
    <item>
      <title>Re: Controlling access to sqlplus</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/controlling-access-to-sqlplus/m-p/4022760#M746167</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;If the connection comes from a remote client, it's difficult to have such a control as to what tools the client can or cannot use to login into the database. You may try checking the v$session.PROGRAM column (plus others) to see if a user is logged in using sqlplus, but that can be easily fooled.&lt;BR /&gt;&lt;BR /&gt;The problem then comes down to restricting your users' privileges to the minimum required. Now, if they already have privileges to update the database in such a way that can potentially harm your services, then you could start auditing transactions. Furthermore, if those users have DBA privileges (meaning no need for explicit grants to update the db), then you may want to take a look at latest Oracle's database vault technology available in Oracle 10g and for some ports in 9i terminal release.&lt;BR /&gt;&lt;BR /&gt;HTH,&lt;BR /&gt;&lt;BR /&gt;-Ariel&lt;BR /&gt;</description>
      <pubDate>Tue, 19 Jun 2007 20:28:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/controlling-access-to-sqlplus/m-p/4022760#M746167</guid>
      <dc:creator>Ariel Cary</dc:creator>
      <dc:date>2007-06-19T20:28:52Z</dc:date>
    </item>
    <item>
      <title>Re: Controlling access to sqlplus</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/controlling-access-to-sqlplus/m-p/4022761#M746168</link>
      <description>Hi,&lt;BR /&gt;I had this problem in a past and I fixed this writing some pl/sql code.&lt;BR /&gt;I'm sorry but I'm not able to share it to you.&lt;BR /&gt;BTW the flow was:&lt;BR /&gt;1. define in a table the users able to use sqlplus (or more in general other program)&lt;BR /&gt;&lt;BR /&gt;2. use a trigger at logon to identify which program is using the user queryng v$session (module or program)&lt;BR /&gt;&lt;BR /&gt;3. if the user is not in the authorized table, drop it sending a messge about deny access (optionally you can tarck alll the logon, logoff, program used, user and tatus in a table for auditing review)&lt;BR /&gt;&lt;BR /&gt;This work on 9i.&lt;BR /&gt;&lt;BR /&gt;HTH,&lt;BR /&gt;Art</description>
      <pubDate>Wed, 20 Jun 2007 03:28:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/controlling-access-to-sqlplus/m-p/4022761#M746168</guid>
      <dc:creator>Arturo Galbiati</dc:creator>
      <dc:date>2007-06-20T03:28:38Z</dc:date>
    </item>
    <item>
      <title>Re: Controlling access to sqlplus</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/controlling-access-to-sqlplus/m-p/4022762#M746169</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;If your applications don't have user password changing restrictions, change the user password:&lt;BR /&gt;&lt;BR /&gt;alter user &lt;USERNAME&gt; identified by &lt;NEW_PWD&gt;;&lt;BR /&gt;&lt;BR /&gt;Best Regards,&lt;BR /&gt;&lt;BR /&gt;Eric Antunes&lt;BR /&gt;&lt;BR /&gt;&lt;/NEW_PWD&gt;&lt;/USERNAME&gt;</description>
      <pubDate>Wed, 20 Jun 2007 03:50:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/controlling-access-to-sqlplus/m-p/4022762#M746169</guid>
      <dc:creator>Eric Antunes</dc:creator>
      <dc:date>2007-06-20T03:50:56Z</dc:date>
    </item>
    <item>
      <title>Re: Controlling access to sqlplus</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/controlling-access-to-sqlplus/m-p/4022763#M746170</link>
      <description>hi,&lt;BR /&gt;&lt;BR /&gt;In oracle 11g, you will have the Oracle Vault feature. In the meanwhile, the problem you have describe before is because of unauthorised access. Someone has guessed the password of an oracle user and got access to the database.&lt;BR /&gt;&lt;BR /&gt;Access to the database can be made not only through SQLPLUS but lots of other freely available tools. e.g. SQL Developer, Toad trial version, etc.&lt;BR /&gt;&lt;BR /&gt;You should enforce strong passwords.&lt;BR /&gt;&lt;BR /&gt;You should also run diagnosis programs to determine the real cause of the performance drop.&lt;BR /&gt;&lt;BR /&gt;if you need any further guidances, please do let us know.&lt;BR /&gt;&lt;BR /&gt;kind regards&lt;BR /&gt;yogeeraj</description>
      <pubDate>Wed, 20 Jun 2007 04:24:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/controlling-access-to-sqlplus/m-p/4022763#M746170</guid>
      <dc:creator>Yogeeraj_1</dc:creator>
      <dc:date>2007-06-20T04:24:25Z</dc:date>
    </item>
    <item>
      <title>Re: Controlling access to sqlplus</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/controlling-access-to-sqlplus/m-p/4022764#M746171</link>
      <description>Arturo,&lt;BR /&gt;&lt;BR /&gt;Beware that could be easily disguised as I mentioned. Your user might just execute this sequence to fool it.&lt;BR /&gt;&lt;BR /&gt;--~~~~~~~~~~&lt;BR /&gt;$ cd $OH/bin&lt;BR /&gt;$ cp sqlplus myapp&lt;BR /&gt;$ myapp acary&lt;BR /&gt;&lt;BR /&gt;SQL*Plus: Release 10.2.0.1.0 - Production on Wed Jun 20 13:08:59 2007&lt;BR /&gt;&lt;BR /&gt;Copyright (c) 1982, 2006, Oracle.  All Rights Reserved.&lt;BR /&gt;&lt;BR /&gt;Enter password: &lt;BR /&gt;&lt;BR /&gt;Connected to:&lt;BR /&gt;Oracle Database 10g Enterprise Edition Release 10.2.0.1.0 - Production&lt;BR /&gt;&lt;BR /&gt;SQL&amp;gt; r&lt;BR /&gt;  1  select program, module&lt;BR /&gt;  2  from v$session&lt;BR /&gt;  3* where username='ACARY'&lt;BR /&gt;&lt;BR /&gt;PROGRAM         MODULE&lt;BR /&gt;--------------- ---------&lt;BR /&gt;myapp@myhost    SQL*Plus&lt;BR /&gt;&lt;BR /&gt;SQL&amp;gt; &lt;BR /&gt;SQL&amp;gt; exec DBMS_APPLICATION_INFO.SET_MODULE('MYMODULE', NULL);&lt;BR /&gt;&lt;BR /&gt;PL/SQL procedure successfully completed.&lt;BR /&gt;&lt;BR /&gt;SQL&amp;gt; r&lt;BR /&gt;  1  select program, module&lt;BR /&gt;  2  from v$session&lt;BR /&gt;  3* where username='ACARY'&lt;BR /&gt;&lt;BR /&gt;PROGRAM         MODULE&lt;BR /&gt;--------------- ---------&lt;BR /&gt;myapp@raju3     MYMODULE&lt;BR /&gt;&lt;BR /&gt;SQL&amp;gt; &lt;BR /&gt;&lt;BR /&gt;Now your program may not be able to identify the user is logged in using sqlplus (or potentially any other tool).&lt;BR /&gt;--~~~~~~~~~~&lt;BR /&gt;&lt;BR /&gt;Not that I'm revealing a secret, but just making the point that this is not a secure way to control this kind of accesses, and hope is also instructional for others.&lt;BR /&gt;&lt;BR /&gt;BR,&lt;BR /&gt;&lt;BR /&gt;-Ariel&lt;BR /&gt;</description>
      <pubDate>Wed, 20 Jun 2007 12:17:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/controlling-access-to-sqlplus/m-p/4022764#M746171</guid>
      <dc:creator>Ariel Cary</dc:creator>
      <dc:date>2007-06-20T12:17:49Z</dc:date>
    </item>
  </channel>
</rss>

