Book Image

OCA Oracle Database 11g: Database Administration I: A Real-World Certification Guide

Book Image

OCA Oracle Database 11g: Database Administration I: A Real-World Certification Guide

Overview of this book

Oracle Database Server is the most widely used relational database in the world today. This book gives you the essential skills to master the fundamentals of Oracle database administration and prepares you for Oracle DBA certification."OCA Oracle Database 11g: Database Administration I: A Real-World Certification Guide" prepares you to master the fundamentals of Oracle database administration using an example driven method that is easy to understand. The real world examples will prepare you to face the daily challenges of being a database administrator.Starting with the essentials of why databases are important in today's information technology world and how they work, you are then guided through a full, customized installation of the Oracle software and creating your own personal database. We then examine fundamental concepts of Oracle, including architecture, storage structures, security, performance tuning, networking, and instance management. Finally, we take an in-depth look at some of the most important concepts in the daily life of an Oracle DBA - backup, recovery, and data migration."OCA Oracle Database 11g: Database Administration I: A Real-World Certification Guide" provides you with the skills you need in order to become a successful Oracle DBA, both for certification and real life tasks.
Table of Contents (24 chapters)
OCA Oracle Database 11g: Database Administration I: A Real-World Certification Guide
Credits
Foreword
About the Author
About the Reviewer
www.packtpub.com
Preface
Index

Understanding profiles


Thus far, we've examined user accounts, the types of permission we can assign to them, and the ways in which we can encapsulate permissions into roles. In this section, we'll explore a topic that we saw previously in our section on creating users—database profiles. A profile is a combination of two, somewhat dissimilar, types of user controls. Profiles can be used to enforce user password characteristics as well as control a user's access to certain system resources.

Understanding password limits

Profiles make use of limits. A limit is a given characteristic of a profile. In order to change a profile, we change its limits. Thus, we can change the password characteristics of a profile by changing its limits. Every user is assigned a profile and will take on the password characteristics of the profile to which they've been assigned. A list of common, password-related profile limits is shown in the following list:

  • FAILED_LOGIN_ATTEMPTS: This limit is used to specify the...