Abstract
When you install your Exadata Database Machine, there are a number of security-related configurations performed. In your configuration worksheet, you specified an Oracle RDBMS software owner and Grid Infrastructure software owner. By default, Oracle ACS typically installs a single Grid Infrastructure and a single, separate Oracle RDBMS Oracle Home on each compute node, each owned by the Linux account specified in the configuration worksheet. The operating system account that owns the Grid Infrastructure binaries can be the same account as the Oracle RDBMS software owner, but, in most cases, organizations elect to use separate accounts.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2013 John Clarke
About this chapter
Cite this chapter
Clarke, J. (2013). Security. In: Oracle Exadata Recipes. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-4915-3_12
Download citation
DOI: https://doi.org/10.1007/978-1-4302-4915-3_12
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4302-4914-6
Online ISBN: 978-1-4302-4915-3
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books