3/25
List of Figures
1-1 Oracle Database Real Application Security Components
1-2 Three Dimensions of Data Security
3-1 Real Application Security Architecture
5-1 Real Application Security Data Security Policy Created on the EMPLOYEES Table
5-2 Real Application Security Data Security Policy Created on Master-Detail Related Tables
8-1 Application Session Service in Oracle Fusion Middleware
12-1 Oracle RAS Administration Login Page.
12-2 Oracle RAS Administration Home Page.
12-3 The Role EMP_ROLE that Is to Be Granted to Employees.
12-4 IT Department Employee DAUSTIN Granted EMP_ROLE and IT_ROLE Roles.
12-5 The HR.HRPRIVS Privilege Class to Be Used in the Column Authorization.
12-6 The EMPLOYEES_DS Policy Information
12-7 The Column Authorization
12-8 The IT Department Data Realm Authorization.
12-9 The HR.IT_ACL ACL to Limit IT Employees Access to Employee DAUSTIN.
12-10 Completed HR.Employees_DS Data Security Policy.
12-11 Applying the Policy
12-12 Enabled HR.Employees_DS Data Security Policy
Scripting on this page enhances content navigation, but does not change the content in any way.