How to protect the SYS ID?

Hi All,
I have an application that allows a central application administrator - this ID in the application matches to an Oracle ID with no objects, but many rights. Since they need to reset regular user passwords this user gets granted the "ALTER USER" role. Doing some experimentation I found that this user has the rights to change the SYS password now! (and any other SYSDBA user). The documentation does confirm this:
*Security administrators are typically the only users that have this system privilege, as it allows a modification of any user security domain.*
Now, my solution is to remove the ALTER USER privilege and leave the password resets to the DBA (i.e. me), but I was wondering if anyone knows of a solution that will still allow a user to change other database user passwords, but exclude the SYS password?
FYI, this is running 11.1.0.7 on Windows 64-bit. Any ideas would be greatly appreciated.
Thanks,
Martin

Normally, you'd use a stored procedure for this.
A highly privileged user (i.e. a DBA account) would own a procedure that resets user passwords. That procedure would do a bit of validation that the password being reset is a regular application user account, not a DBA. And the procedure would probably do a bit of logging so you can track who reset the password. The highly privileged user would then grant the application administrator EXECUTE access on this stored procedure. The application admin would be able to reset normal user passwords by calling the procedure but would not be able to reset the password for privileged users.
Justin

Similar Messages

  • How to protect the lines in smartforms

    hi gurus
    i want to know how to protect the line in smartforms..
    regards
    baskar

    Check this link.
    http://www.saptechies.com/smartforms-protect-lines-in-main-window/
    if you are using tables, there are two options for protection against line break: – You can protect a line type against page break. – You can protect several table lines against page break for output in the main area.
    Protection against page break for line types – Double-click on your table node and choose the Table tab page. – Switch to the detail view by choosing the Details pushbutton. – Set the Protection against page break checkbox in the table for the relevant line type. Table lines that use this line type are output on one page.
    Protection against page break for several table lines – Expand the main area of your table node in the navigation tree. – Insert a file node for the table lines to be protected in the main area. – If you have already created table lines in the main area, you can put the lines that you want to protect again page break under the file using Drag&Drop. Otherwise, create the table lines as subnodes of the file. – Choose the Output Options tab page of the file node and set the Page Protection option. All table lines that are in the file with the Page Protection option set are output on one page
    Regards,
    Maha

  • How to protect the class files inside jar file.

    Hi Group,
    pls help me.
    my need is i created a executable jar file with certain classes.
    and i'm supposed to send it to my client.
    but if the client needs he can extract the class files from the jar and with the
    help of some decompilers he can convert class file to .java source code and read the whole
    stuff.
    how can i protect my jar file from these.
    is there any security mechanism for that
    pls help me.
    Regards,
    Ranjith.M

    In order to protect my jar file I tried the jar signer technology but it only protects the jar from modification so I need to know how to protect jar file from decoding of the contents inside.

  • How to protect the creation of a db across multiple threads/processes?

    Given a multi-process, multi-threaded application, and one database file to be created, how can I guarantee that only one of the threads in one of the processes successfully creates the database, when ALL of the threads are going to either attempt to create it, or open it (if it already exists) upon startup?
    My current logic for all threads is:
    set open flags to DB_THREAD
    start transaction
    attempt to open the db
    if ENOENT
    abort transaction
    change open flags to DB_CREATE | DB_EXCL | DB_THREAD
    retry
    else if EEXIST
    abort transaction
    change open flags to DB_THREAD
    retry
    else if !ok
    # some other error
    end
    commit transaction
    I'm testing on Linux right now, with plans to move to Windows, AIX, and Solaris. What I'm experiencing on Linux is several of the threads (out of 10 threads I'm testing) will succeed in creating the database. The others will receive either either succeed in opening the first time through, or will receive the EEXIST when they do the open w/ create flags - ultimately, they open the same created db (I'm presuming the last one that's created by one of the other threads). Effectively, the open with DB_CREATE | DB_EXCL is not ensuring that only one DB is created. I was under the impression that opening in a transaction would guarantee this, but it does not, or maybe I'm doing something incorrectly?
    Should DB_CREATE | DB_EXCL and opening in a transaction guarantee that only one thread can create the database? Do I need to use another synchronization method?
    Note: I am running off of a local disk, not over NFS or anything like that.
    I tried taking out my transaction and using DB_AUTO_COMMIT instead, still no go - multiple threads still report they successfully created the DB. Using BDB 4.5.
    Thanks,
    Kevin Burge

    Brian,
    Thanks for the reply. I think I'm doing what you said, unless I'm misunderstanding. I do have all threads try to do the DB_CREATE | DB_EXCL. Are you saying I shouldn't use the DB_EXCL flag?
    The problem I was seeing with 10 threads calling open w/ DB_CREATE | DB_EXCL on the same db:
    * Between 1 and 9 threads would return success from db->open with the creation flags.... but the last one to create "wins".
    * All the other threads would get EEXIST, as expected.
    The threads that "lost", do get a successful return code from "open" with the create flags, but all data written to them is lost. They act normally except for the fact that the have a deleted file-handle that they are writing to. There's no indicator that records written to them are going into the void.
    My test:
    I had 10 threads each trying to create or open a recno db, then append 10 records, for a total of 100 records expected. Ultimately, I would end up with between 20 to 100 records in the db, depending on how many of the threads said they successfully created the db. So, if 5 threads said they created the db successfully, then 40 records would be missing, because 4 of those threads were writing to deleted file handles. If 2 threads said they created the db, then 10 records would be missing....If 8 threads, then 70 records missing, etc.
    In other words, multiple threads creating the db appears to work correctly, because there are no errors. It was the missing records that caught my attention, and prompted my question on this forum.
    For what it's worth, I've worked around the problem by opening a similarly named file via the open() system call, with O_CREAT|O_EXCL, which is guaranteed to be atomic. The first thread that can create this temp file is the only thread that can actually create the db - all others sleep upon open with ENOENT until it's created.
    Thanks,
    Kevin

  • How to protect the source code in lookout

    we are using the lookout 6.5 version for the automation. we want to protect the code from the end user, please confirm the possibility of the same.

    The .lks file is the source file. If you give the .l4p file to end user, and the end user uses the runtime only server, they cannot modify anything. But actually they can modify the process if they have development server.
    Ryan Shi
    National Instruments

  • How to protect the source code?

    hello everyone,
    how can I encrypt the bean program, such that people cannot decompile and get the source code? Any link to useful reading would be very helpful too, thanks in advance!

    Just go through this query posted in the jdc forum:
    Question of the week No.160: How do you protect your code from decompilers?
    http://developer.java.sun.com/developer/qow/archive/160/index.jsp
    Hope this clears your doubts.
    ajit

  • How to protect the phone from attacks?

    Hi there,
    I just found an interesting and dangerous tool:
    http://www.getjar.com/products/15782/MagicBlueHack
    It says you can make free calls and send free SMS just by connecting to any other Bluetooth enabled mobile phone, the other phone even does not need to install this software...
    How can one protect his phone from such attacks besides turning off Bluetooth?

    Exactly. Your best line of defence is common sense.
    Firstly, don't leave bluetooth on unless you need to use it.
    When you do need it, don't leave your phone as discoverable. Leave it as "hidden". You only need it to be discoverable if trying to pair another device with it.
    If a pairing request comes in while the phone is discoverable, ask yourself if you were responsible for it. If in doubt, don't accept the request.
    Was this post helpful? If so, please click on the white "Kudos!" star below. Thank you!

  • How to protect the media file ...?

    hi
    i want to protect my media file
    i used binaryio xtra its works but problem is that when i run
    the director project exe file then during execution the media file
    decoce and user can run the media file on any media player tell me
    what i do?
    plz tell me the solution i want to protect my media files
    from user access on any other player
    i m using wmv files

    > plz tell me what i do
    I already gave you the only option I'm aware of (given that
    you're not
    happy with having files available while your projector runs)

  • How to protect the .class files from decompilers

    Hi all,
    I have developeed an application and I want it to be protected from the decompilers. The problem that I am facing now is that the .class files can be ripped by using the decompiling softwares.
    It will be great if any body cvan bail me out of this.
    Thanks
    kvmp

    Obfuscating your files is your best bet. This has been discussed to death, both here and on every other Java-related discussion site and newsgroup since about 1996; a Google search on "Java obfuscation" should help.
    You can also look here for an overview:
    http://mindprod.com/jglossobfuscator.html#OBFUSCATOR
    Grant

  • How to make the no Wi-Fi enabled

    do you tell me how to protect the Wi-Fi and make it disabled and in the same time enable
    best regards

    If you want to protect the access to your router for other devices than your one, check this article for more details:
    iOS: Recommended settings for Wi-Fi routers and access points

  • How-to protect static content

    Hi !
    I have a site with many files (pictures, XML files, etc)
    How can I protect those content from unauthorized access / sniff ?
    I was thinking in two options
    1) a filter servlet, validating sessions permissions etc
    2) a servlet to write out the files (...)
    Any other suggestion? best practice?
    Regards
    Joe

    Actually yes each server has its own realm implementation but it is all configured and handled by the server and does not affect the portability of the application.
    How to protect the static pages is dependant on how you allow access to your web application.
    If you don't have any security in the web app you then put any files that you don't want accessed in the browser in the WEB-INF folder. Images and other files that are accessible in the browser you put in folders with an index page to prevent users from seeing the directory structure.
    If your application uses server managed security you include you use this security to manage access to the files.
    If you are using application based security then you go with a filter.

  • Protecting the click wheel on Agent 18

    I have had my Nano for several weeks with a zCover case. I want to change and Agent18 looks like a good replacement. My only concern is the click wheel. Does anyone with an Agent18 case would like to share how they protect the click wheel? Pics would be most welcome.
    Hawk

    you can either get an inexpensive clear film protector (like you would use to protect the lcd, or something similar

  • How to get the password of a password protected Excel Sheet using java/jxl

    Hi ,
    how to get the password of a password protected Excel Sheet using java / jxl program.
    plz any one help me .
    Ramesh P
    [email protected]

    If they've implemented the password system correctly there probably isn't a way of getting the password at all.

  • How to password protect the adobe form ?

    Hello,
    I am very new to this livecycle designer.
    Can anyone please tell me how to password protect the adobe form(it can be print or interactive form) ?
    can it be done through scripting ?
    Regards,
    Menaka.H.B

    How to create Password to lock of Acrobat Pro and Adobe Livecycle Designer
    Hi everyone!!!
    I am using Adobe Livecycle Designer ES software, and i created the password on this Form of this software, but it can not lock Acrobat Pro. How to create Password to lock both of Acrobat Pro and Adobe Livecycle Designer? I would like another people just open Acrobat Reader, not other 2 softwares.

  • How to protect JSP source code on the Server Side ?

    I am new on JSP. I Already know about various Web and Desktop technologies but is the first time on JSP. I know ASP for example.
    Well, about .NET platform, it protects my source code on the server, the source code is compiled and on the server, only the compiled file are installed, my source code stay with me...
    About JSP, how it works about ? Is possible to hide my source code too ? What the technique to hide the codes ? I need to prevent access to my source codes...
    Roberto

    roberto.novakosky wrote:
    About .exe files, do you know if a java class is more easy or dificult to do reverse engineering ?Depends on who your enemy is. If it's for example a hacker with a lot of C knowledge but zero of Java knowledge, reverse engineering .exe would be easier than .class. If one was interested, one would always take time to learn how to decompile the one or other. Making files secure is a waste of time. It's always "hackable".
    If there was a proof of concept, no one major software vendor would have had so much problems with piracy and cracks/keygens. Think about it once again. It's simply impossible. Just have a clear EULA and actually make work of it whenever you discovers if someone breaks your EULA.
    I was thinking about, the .JSP can be converted to servlet .java, and converted to .class, this way hide the source code.Once again, one could still decompile it (or reverse engineer, so you call).

Maybe you are looking for

  • Best way to move redo log from one disk group to another in ASM?

    Hi All, Our db is 10.2.0.3 RAC db. And database servers are window 2003 server. We need to move more than 50 redo logs (some are regular and some are standby) which are not redundant from one disk group to another. Say we need to move from disk group

  • Video game trade in not showing up in pending points

    Last week I traded in Call of Duty Ghosts and NBA 2k14 for the xbox 360 they asked for my information and told me to confirm on the debit card machine yet I have not seen it show up in my pending points and transactions on my Best Buy points page. Is

  • E71 lost icons and call register not working

    Hi! Suddenly my Nokia E71 started to work strange: all the icons in the main page disappeared, including the call notification, message received, etc., only the clock, bat and signal icons remain. Also the call register does not work: when I try to g

  • Photoshop Elements 12 - can't get pass the install Shared Technologies

    I've spent hours trying to install Photoshop Elements 12 on my Windows 8.1 64 bit computer. The install process chugs along merrily and then chokes with an unspecified error whilst installing the shared technologies and then rolls back the installati

  • Unauthorized iTunes Library?

    Every time I open iTunes, it comes up with a message saying, "The iTunes library file cannot be saved. You do not have enough access privileges for this operation." I closed out of iTunes once, then opened it up again, and my entire library was delet