C Integrating Enterprise User Security with Microsoft Active Directory
C.1 About Direct Integration with Microsoft Active Directory
Oracle Database release 18c, version 18.1 and later supports direct integration with Microsoft Active Directory (MSAD) using the new centrally managed users capability.
Beginning with Oracle Database release 18c, version 18.1, Oracle Database introduces centrally managed users to authenticate and authorize users directly with Microsoft Active Directory. With centrally managed users, users accessing the database can be centrally managed to improve an organization's security posture. An enterprise user (a user in Microsoft Active Directory) can be exclusively mapped to a database account, or many enterprise users (in an Microsoft Active Directory group) can be mapped to a shared account in the database. Microsoft Active Directory groups can also be mapped to a database global role, which provides users with additional privileges and roles above what their login account (exclusive or shared) is granted. With centrally managed users, users can be authenticated with passwords, and Kerberos and PKI certificates.
For organizations beginning new directory services projects that do not require some of the more complex Enterprise User Security features like trusted database links, centrally managed users with Microsoft Active Directory allows you to use their current Microsoft Active Directory service as their centralized user management and centralized database access authorization. For new directory services projects, this may be the preferred option in implementing directory services as this reduces complexity as well as costs of operation in terms of maintenance and development.
Enterprise users can also make use of Oracle Internet Directory, which is a part of the Oracle Identity Management infrastructure. If your organization uses a third party directory like Microsoft Active Directory to store and manage user entries, then you can integrate it with Oracle Internet Directory to manage Enterprise User Security. This may be your preferred option if your organization requires some of the more complex Enterprise User Security features like trusted database links.
See Also:
Oracle Database Security Guide for details about configuring centrally managed users with Microsoft Active Directory.
C.2 Set Up Synchronization Between Active Directory and Oracle Internet Directory
Oracle components make use of Oracle Internet Directory for centralized security administration. Your organization might have a Microsoft Windows domain that uses Microsoft Active Directory for centralized administration. You should set up synchronization between Oracle Internet Directory and Microsoft Active Directory before you configure Enterprise User Security to work with Microsoft Active Directory.
Synchronization profiles are used to synchronize the two directories. The profile contains configuration information required to synchronize the two directories. This includes direction of synchronization, mapping rules and formats, connection details of Microsoft Windows domain and the like. Mapping rules contain domain rules and attribute rules to map a domain and attributes in one directory to the other directory, optionally formatting the attributes.
See Also:
For step-by-step instructions on integrating Oracle Internet Directory with Microsoft Active Directory, refer to the Oracle Identity Management Integration Guide
C.3 Set Up Active Directory to Interoperate with Oracle Client
The following tasks must be performed on the Windows domain controller:
See Also:
Oracle Database Security Guide for a detailed listing of the preceding steps.
C.4 Set Up Oracle Database to Interoperate with Microsoft Active Directory
The following task must be performed on the host computer where Oracle Database is installed:
-
Update the
sqlnet.ora
file in the database with kerberos parameters
See Also:
Oracle Database Security Guide for a detailed description of the preceding step.
C.5 Set Up Oracle Database Client to Interoperate with Microsoft Active Directory
The following steps must be performed on the Oracle kerberos client:
See Also:
Oracle Database Security Guide for a detailed listing of the preceding steps.
C.6 Obtain an Initial Ticket for the Client
Before a client can connect to the database, the client must request for an initial ticket. The initial ticket identifies the client as having the rights to ask for additional service tickets. An initial ticket is requested using the okinit
command.
See Also:
Oracle Database Security Guide for more details on requesting an initial ticket with okinit
.
C.7 Configure Enterprise User Security for Kerberos Authentication
To configure Enterprise User Security for Kerberos Authentication, use the following steps:
See Also:
For detailed information on the preceding steps, refer to "Configuring Enterprise User Security for Kerberos Authentication" .