Skip to main content

Security

  • Chapter
  • 620 Accesses

Abstract

When you install your Exadata Database Machine, there are a number of security-related configurations performed. In your configuration worksheet, you specified an Oracle RDBMS software owner and Grid Infrastructure software owner. By default, Oracle ACS typically installs a single Grid Infrastructure and a single, separate Oracle RDBMS Oracle Home on each compute node, each owned by the Linux account specified in the configuration worksheet. The operating system account that owns the Grid Infrastructure binaries can be the same account as the Oracle RDBMS software owner, but, in most cases, organizations elect to use separate accounts.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 John Clarke

About this chapter

Cite this chapter

Clarke, J. (2013). Security. In: Oracle Exadata Recipes. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-4915-3_12

Download citation

Publish with us

Policies and ethics