Skip Headers
Oracle® Database Enterprise User Administrator's Guide
10
g
Release 2 (10.2)
Part Number B14269-01
Home
Book List
Contents
Index
Master Index
Feedback
Previous
Next
View PDF
List of Figures
1-1 Enterprise User Security and the Oracle Security Architecture
1-2 Example of Enterprise Roles
1-3 Related Entries in a Realm Oracle Context
2-1 Directory Server Login Window
2-2 Enterprise Security Manager User Interface
2-3 Enterprise Security Manager Databases Tabbed Window
2-4 Enterprise Security Manager Console Login Page
2-5 ESM Console URL Window
2-6 Enterprise Security Manager Console User Interface
2-7 Enterprise Security Manager Console Users Subtab
2-8 Enterprise Security Manager Console Group Subtab
2-9 Enterprise Security Manager Console Edit Group Page
2-10 Enterprise Security Manager Console Realm Configuration Tabbed Window
2-11 Opening Page of Oracle Net Configuration Assistant
3-1 Enterprise User Security Configuration Flow Chart
4-1 Enterprise Security Manager: General Tab
4-2 Enterprise Security Manager Console Home Page
4-3 Enterprise Security Manager Console Edit User Window: Basic Information
4-4 Enterprise Security Manager: Add Enterprise Roles Window
4-5 Enterprise Security Manager: Main Window (All Users Tab)
4-6 Enterprise Security Manager: Create Enterprise Domain Window
4-7 Enterprise Security Manager: Databases Tab (Database Membership)
4-8 Enterprise Security Manager: Add Databases Window
4-9 Enterprise Security Manager: Database Schema Mappings Tab
4-10 Enterprise Security Manager: Add Database Schema Mappings Window
4-11 Enterprise Security Manager: Add Accessible Enterprise Domains Dialog Box
4-12 Enterprise Security Manager: Administrators Tab
4-13 Create Proxy Permission Dialog Box
4-14 Tree View of New Proxies in Proxy Permissions
4-15 Proxy Selected in Proxy Permissions
4-16 Selecting an Enterprise User
4-17 Enterprise User with Proxy Permission
4-18 Databases in the Domain
4-19 Database Login Screen
4-20 Local Database Users Available as Proxy Targets
4-21 Users Selected as Proxy Targets
4-22 Enterprise Security Manager: Create Enterprise Role Window
4-23 Enterprise Security Manager: Database Global Roles Tab
4-24 Enterprise Security Manager: Database Authentication Required Window
4-25 Enterprise Security Manager: Add Enterprise Users Window