Skip Headers
Oracle® Database Enterprise User Administrator's Guide
10g Release 2 (10.2)

Part Number B14269-01
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Index
Index
Go to Master Index
Master Index
Go to Feedback page
Feedback

Go to previous page
Previous
Go to next page
Next
View PDF

List of Figures

1-1 Enterprise User Security and the Oracle Security Architecture
1-2 Example of Enterprise Roles
1-3 Related Entries in a Realm Oracle Context
2-1 Directory Server Login Window
2-2 Enterprise Security Manager User Interface
2-3 Enterprise Security Manager Databases Tabbed Window
2-4 Enterprise Security Manager Console Login Page
2-5 ESM Console URL Window
2-6 Enterprise Security Manager Console User Interface
2-7 Enterprise Security Manager Console Users Subtab
2-8 Enterprise Security Manager Console Group Subtab
2-9 Enterprise Security Manager Console Edit Group Page
2-10 Enterprise Security Manager Console Realm Configuration Tabbed Window
2-11 Opening Page of Oracle Net Configuration Assistant
3-1 Enterprise User Security Configuration Flow Chart
4-1 Enterprise Security Manager: General Tab
4-2 Enterprise Security Manager Console Home Page
4-3 Enterprise Security Manager Console Edit User Window: Basic Information
4-4 Enterprise Security Manager: Add Enterprise Roles Window
4-5 Enterprise Security Manager: Main Window (All Users Tab)
4-6 Enterprise Security Manager: Create Enterprise Domain Window
4-7 Enterprise Security Manager: Databases Tab (Database Membership)
4-8 Enterprise Security Manager: Add Databases Window
4-9 Enterprise Security Manager: Database Schema Mappings Tab
4-10 Enterprise Security Manager: Add Database Schema Mappings Window
4-11 Enterprise Security Manager: Add Accessible Enterprise Domains Dialog Box
4-12 Enterprise Security Manager: Administrators Tab
4-13 Create Proxy Permission Dialog Box
4-14 Tree View of New Proxies in Proxy Permissions
4-15 Proxy Selected in Proxy Permissions
4-16 Selecting an Enterprise User
4-17 Enterprise User with Proxy Permission
4-18 Databases in the Domain
4-19 Database Login Screen
4-20 Local Database Users Available as Proxy Targets
4-21 Users Selected as Proxy Targets
4-22 Enterprise Security Manager: Create Enterprise Role Window
4-23 Enterprise Security Manager: Database Global Roles Tab
4-24 Enterprise Security Manager: Database Authentication Required Window
4-25 Enterprise Security Manager: Add Enterprise Users Window