12c密码加固

发布时间:2020-08-10 17:27:13 作者:roidba
来源:网络 阅读:2725

关于Oracle12c 密码加固金融行业都是有要求的,这里做一个测试记录。

1、创建一个用户
SYS@orcl1> create user roidba identified by roidba;
create user roidba identified by roidba
*
ERROR at line 1:
ORA-28003: password verification for the specified password failed
ORA-20001: Password same as or similar to user  --出现报错,提示密码验证失败。

2、查看profile
SYS@orcl1> select * from dba_profiles;

PROFILE            RESOURCE_NAME                  RESOURCE_TYPE    LIMIT           COMMON
------------------ ------------------------------ ---------------- --------------- ------
DEFAULT            COMPOSITE_LIMIT                KERNEL           UNLIMITED       NO
DEFAULT            SESSIONS_PER_USER              KERNEL           UNLIMITED       NO
DEFAULT            CPU_PER_SESSION                KERNEL           UNLIMITED       NO
DEFAULT            CPU_PER_CALL                   KERNEL           UNLIMITED       NO
DEFAULT            LOGICAL_READS_PER_SESSION      KERNEL           UNLIMITED       NO
DEFAULT            LOGICAL_READS_PER_CALL         KERNEL           UNLIMITED       NO
DEFAULT            IDLE_TIME                      KERNEL           UNLIMITED       NO
DEFAULT            CONNECT_TIME                   KERNEL           UNLIMITED       NO
DEFAULT            PRIVATE_SGA                    KERNEL           UNLIMITED       NO
DEFAULT            FAILED_LOGIN_ATTEMPTS          PASSWORD         10              NO
DEFAULT            PASSWORD_LIFE_TIME             PASSWORD         180             NO
DEFAULT            PASSWORD_REUSE_TIME            PASSWORD         UNLIMITED       NO
DEFAULT            PASSWORD_REUSE_MAX             PASSWORD         UNLIMITED       NO
DEFAULT            PASSWORD_VERIFY_FUNCTION       PASSWORD         VERIFY_FUNCTION NO
DEFAULT            PASSWORD_LOCK_TIME             PASSWORD         1               NO
DEFAULT            PASSWORD_GRACE_TIME            PASSWORD         7               NO
ORA_STIG_PROFILE   COMPOSITE_LIMIT                KERNEL           DEFAULT         NO
ORA_STIG_PROFILE   SESSIONS_PER_USER              KERNEL           DEFAULT         NO
ORA_STIG_PROFILE   CPU_PER_SESSION                KERNEL           DEFAULT         NO
ORA_STIG_PROFILE   CPU_PER_CALL                   KERNEL           DEFAULT         NO
ORA_STIG_PROFILE   LOGICAL_READS_PER_SESSION      KERNEL           DEFAULT         NO
ORA_STIG_PROFILE   LOGICAL_READS_PER_CALL         KERNEL           DEFAULT         NO
ORA_STIG_PROFILE   IDLE_TIME                      KERNEL           15              NO
ORA_STIG_PROFILE   CONNECT_TIME                   KERNEL           DEFAULT         NO
ORA_STIG_PROFILE   PRIVATE_SGA                    KERNEL           DEFAULT         NO
ORA_STIG_PROFILE   FAILED_LOGIN_ATTEMPTS          PASSWORD         3               NO
ORA_STIG_PROFILE   PASSWORD_LIFE_TIME             PASSWORD         60              NO
ORA_STIG_PROFILE   PASSWORD_REUSE_TIME            PASSWORD         365             NO
ORA_STIG_PROFILE   PASSWORD_REUSE_MAX             PASSWORD         10              NO
ORA_STIG_PROFILE   PASSWORD_VERIFY_FUNCTION       PASSWORD         ORA12C_STRONG_V NOERIFY_FUNCTION     --使用了12c密码验证策略

ORA_STIG_PROFILE   PASSWORD_LOCK_TIME             PASSWORD         UNLIMITED       NO
ORA_STIG_PROFILE   PASSWORD_GRACE_TIME            PASSWORD         5               NO

32 rows selected.

SYS@orcl1> 

3、密码验证策略要求

ora12c_strong_verify_function Function Password Requirements
The ora12c_strong_verify_function function fulfills the Department of Defense Database Security Technical Implementation Guide requirements.

This function checks for the following requirements when users create or modify passwords:

The password must contain at least 2 upper case characters, 2 lower case characters, 2 numeric characters, and 2 special characters. These special characters are as follows:
--要求至少2个大写,两个小写,2个数字,2个特殊字符
‘ ~ ! @ # $ % ^ & * ( ) _ - + = { } [ ] \ / < > , . ; ? ' : | (space) 
The password must differ from the previous password by at least 4 characters.

The following internal checks are also applied:

The password contains no fewer than nine characters and does not exceed 30 characters.
The password does not contain the double-quotation character ("). It can be surrounded by double-quotation marks, however.

4、根据要求重新创建一个用户

SYS@orcl1> create user roidba identified by "FXlv12!@";

User created.
SYS@orcl1> grant connect to roidba;

Grant succeeded.

SYS@orcl1> conn roidba/"FXlv12!@"
Connected.
ROIDBA@orcl1>

5、取消密码复杂度验证

SYS@orcl1> ALTER PROFILE DEFAULT LIMIT PASSWORD_VERIFY_FUNCTION NULL;

Profile altered.

SYS@orcl1> alter user roidba identified by roidba;

User altered.

SYS@orcl1> 

6、设置密码复杂度验证操作过程

Enabling Password Complexity Verification
The utlpwdmg.sql script can be customized to enable password complexity verification.

Log in to SQL*Plus with administrative privileges.
For example:

CONNECT SYSTEM
Enter password: password
Run the utlpwdmg.sql script (or your modified version of this script) to create the password complexity functions in the SYS schema.
@$ORACLE_HOME/rdbms/admin/utlpwdmg.sql
Grant any users who must use this function the EXECUTE privilege on it.
For example:

GRANT pmsith EXECUTE ON ora12c_strong_verify_function;
In the default profile or the user profile, set the PASSWORD_VERIFY_FUNCTION setting to either the sample password complexity function in the utlpwdmg.sql script, or to your customized function. Use one of the following methods:
Log in to SQL*Plus with administrator privileges and use the CREATE PROFILE or ALTER PROFILE statement to enable the function. Ensure that you have the EXECUTE privilege on the function.

For example, to update the default profile to use the ora12c_strong_verify_function function:

ALTER PROFILE default LIMIT 
 PASSWORD_VERIFY_FUNCTION ora12c_strong_verify_function;
推荐阅读:
  1. oracle 12c修改账号密码(带特殊字符)
  2. ssh安全加固

免责声明:本站发布的内容(图片、视频和文字)以原创、转载和分享为主,文章观点不代表本网站立场,如果涉及侵权请联系站长邮箱:is@yisu.com进行举报,并提供相关证据,一经查实,将立刻删除涉嫌侵权内容。

12c strong verify

上一篇:MySQL行级锁测试

下一篇:设计模式-策略模式

相关阅读

您好,登录后才能下订单哦!

密码登录
登录注册
其他方式登录
点击 登录注册 即表示同意《亿速云用户服务条款》