CN104766023A - User management method based on ORACLE database - Google Patents

User management method based on ORACLE database Download PDF

Info

Publication number
CN104766023A
CN104766023A CN201510052388.4A CN201510052388A CN104766023A CN 104766023 A CN104766023 A CN 104766023A CN 201510052388 A CN201510052388 A CN 201510052388A CN 104766023 A CN104766023 A CN 104766023A
Authority
CN
China
Prior art keywords
user
user management
management method
method based
database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510052388.4A
Other languages
Chinese (zh)
Other versions
CN104766023B (en
Inventor
陶立伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Quan Wei Software Science And Technology Ltd
Original Assignee
Suzhou Quan Wei Software Science And Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Quan Wei Software Science And Technology Ltd filed Critical Suzhou Quan Wei Software Science And Technology Ltd
Priority to CN201510052388.4A priority Critical patent/CN104766023B/en
Publication of CN104766023A publication Critical patent/CN104766023A/en
Application granted granted Critical
Publication of CN104766023B publication Critical patent/CN104766023B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a user management method based on an ORACLE database, wherein operation permissions of user classification are managed by a user management tool, execution users are assigned by the user management tool, i.e., assigning roles to identities of users, and giving different operation permissions. Additionally, assigning the roles at least comprises assigning the permissions and creating the users. During this period, if a warning occurs, an early warning mechanism is triggered, and an operation log is recorded; if a high-risk operation exists, the user is locked directly. Therefore, the operation types and permissions of different levels of users can be strictly controlled on the basis of the user management. A certain isolation segment can be divided in the database for operations steps by step, accordingly cutting down the influence caused by illegal operations, thereby protecting the integrity and the stability of the production data from the scope of entrance. Meanwhile, for user operations of certain rules, certain early warning mechanisms can be triggered to inform the related person to track and analyze, or even directly lock the high-risk operation user, thereby increasing the safety greatly.

Description

Based on the user management method of ORACLE database
Technical field
The present invention relates to a kind of user management method, particularly relate to a kind of user management method based on ORACLE database.
Background technology
The data of modern enterprise are towards Large Copacity future development; wherein database at the business data of enterprise, business algorithm, to analyze the proportion occupied in deciphering increasing; under the warning constantly breaking into the malignant event such as user data unofficial biography, Enterprise business secret leakage, assault destruction, the management of database and protection become and are even more important.
Meanwhile, internet traditional database user, is often divided into System Management User and program direct calling party two class.The entrance authority that database connects towards program all adopts formula Full-open of mourning in silence, and when program is subject to malicious sabotage, the direct change carrying out database that can be unreserved, produces significant damage to enterprise database.
Summary of the invention
Object of the present invention is exactly to solve the above-mentioned problems in the prior art, provides a kind of user management method based on ORACLE database.
Object of the present invention is achieved through the following technical solutions: by user management tool management users classification and operating right, distributed by user management instrument and perform user, namely role assignments is carried out to the identity of user, give different operating rights, described role assignments at least comprises and distributes authority, creates user, comprises user operation parsing, user management in described operating right.
Described management process is, step one, the application program in connection data storehouse generates the SQL statement of corresponding database by ORM Object Relation Mapping, and database connection pool corresponding to application program obtains user corresponding to database and connect, and SQL is carried out in this connection execution and calls.Step 2, database receives the SQL performed, the synonym title corresponding according to active user's range-based searching, if synonym title does not exist, then the alarm of throw exception " object does not exist ", if synonym exists, then enters step 3.Step 3, data are carried out parsing SQL according to the destination object of synonym acquisition agency and are operated, if not effective operating right, the then alarm of throw exception prompting " invalid operation ", if effective operating right, then enter step 4.Step 4, make an explanation in database to the user at destination object place execution.
In said process, if there is alarm, then trigger early warning mechanism, record Operation Log, if there is high-risk operation, then directly locks user.
The above-mentioned user management method based on ORACLE database, wherein: the described high-risk behavior being operating as destruction database structure and data, is all considered as high-risk operation.
Further, the above-mentioned user management method based on ORACLE database, wherein: described Operation Log content comprises, one or more in the statement of operation, time, account, machine name, access IP.
Further, the above-mentioned user management method based on ORACLE database, wherein: described user management instrument is oracle self-defined package implementation Process bag.
Further, the above-mentioned user management method based on ORACLE database, wherein: described right of distribution is limited to default access, both according to service needed, the Permission Levels of self-defined correspondence, or, carry out the distribution of specifying access object according to user.
Further, the above-mentioned user management method based on ORACLE database, wherein: described establishment user comprises, and sets up the object permission of user, distributing user permission, distributing user.Described establishment user is, calls tool bag, inputs user name, password and authority numbering.Described authority numbering comprises keeper, operator, read-only user.Described keeper, has DDL authority, can create, revise, delete list structure, process bag, and can carry out additions and deletions to data and change and look into.Described operator, has DML authority, can question blank structure, and carries out additions and deletions for data and change and look into operation.Described read-only user, only can question blank structure and data.The object permission of described distributing user is, all objects of certain user are all licensed to another user, or, independent authorization is carried out to some objects of user.
Further, the above-mentioned user management method based on ORACLE database, wherein: described mandate at least comprises increase, delete, revise, search in one or more, each mandate is all create a synonym of bearing the same name to user to carry out proxy access.
Further, the above-mentioned user management method based on ORACLE database, wherein: described user operation resolving is, 1. step, is verified by user and identifies corresponding role, give different role-securities.2. step, by the synonym under corresponding role-security, finds corresponding agent object.3., the operating right of check object, if verification is passed through, then finally performs step, if verification is not passed through, then carries out abnormal prompt.
Again further, the above-mentioned user management method based on ORACLE database, wherein: described user management is, accessing operation for user carries out log recording, and it is reserved to retain expansion, definable user management strategy, when finding the high-risk operation of certain user's occurrence law, pressure can be carried out for this user and regain mandate or locking, and notice relevant supervisor.
The advantage of technical solution of the present invention is mainly reflected in: can from user management; the action type of strict control different brackets user and authority; database can be segmented in certain isolation section and carry out separate operations; cut off the impact that illegal operation causes, protect the complete and stable of production data from entrance scope.Meanwhile, the predefine of procedure operation mode can also have been carried out from the angle implementing to control, and a virtual subregion carries out the data isolation of corresponding operating, only have authorized data to be submitted to formal environments under authorized operation.Moreover, for the user operation of certain rule, certain early warning mechanism can be triggered, notify that corresponding personnel carry out follow-up and analyze, even directly lock high-risk operation user, greatly improve security.Thus, space has been expanded in the technical progress for this area, and implementation result is good.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of the user management method based on ORACLE database.
Embodiment
Based on the user management method of ORACLE database, its special feature is: by user management tool management users classification and operating right.Meanwhile, execution user is distributed by user management instrument.That is, role assignments is carried out to the identity of user, gives different operating rights.Further, in order to realize effective safety management, the role assignments adopted at least comprises and distributes authority, creates user, and comprises user operation parsing, user management in operating right.Moreover consider the versatility of enforcement, user management instrument is oracle self-defined package implementation Process bag.
Specifically, the management process of employing is as follows:
Step one, the application program in connection data storehouse generates the SQL statement of corresponding database by ORM Object Relation Mapping, and database connection pool corresponding to application program obtains user corresponding to database and connect, and SQL is carried out in this connection execution and calls.
Step 2, database receives the SQL performed, the synonym title corresponding according to active user's range-based searching, if synonym title does not exist, then the alarm of throw exception " object does not exist ", if synonym exists, then enters step 3.
Step 3, the destination object (such as list structure) that data obtain agency according to synonym resolves SQL operation, if not effective operating right, the then alarm of throw exception prompting " invalid operation ", if effective operating right, then enters step 4.
Step 4, make an explanation in database to the user at destination object place execution.It is that oracle self mechanism determines that the explanation adopted performs.Specifically, the explanation that the present invention adopts performs and is, searches corresponding database table structure, according to condition filter table data, and then return data.The process of concrete refinement can also inquire about official's technical manual of oracle issue.Be convenient to technician and adjust custom strategies at any time.
In said process, if there is alarm, then trigger early warning mechanism, record Operation Log, if there is high-risk operation, then directly locks user.In the process that reality is implemented, the reason adopting early warning mechanism to illustrate is, for the data modification operation of specifying, if not program standard operation, can realize carrying out pre-alert notification.Such as, member's login password etc. is revised.If there is direct Modify password, and do not provide current password, be then considered as unsafe operation, can record be carried out.
With regard to the present invention one preferably embodiment, the high-risk behavior being operating as destruction database structure and data, is all considered as high-risk operation.Can show as in actual treatment, the operation of the types such as Update Table storehouse user cipher, Update Table lab setting.Further, according to the setting of authority, high-risk operation cannot perform substantially, but needs to retain daily record, and generates pre-alert notification to keeper, sends message, such as, send note by corresponding program.
Further, in order to realize effective operation note, be convenient to safeguard, Operation Log content comprises in the future, one or more in the statement of operation, time, account, machine name, access IP.Certainly, consider the facility of enforcement, program or client are submitted to inside the information of coming and are automatically comprised the information such as statement, time, account.Consider the needs of safety management, adopt right of distribution to be limited to default access, both according to service needed, the Permission Levels of self-defined correspondence, or, carry out the distribution of specifying access object according to user.
Again further, create user and comprise, set up the object permission of user, distributing user permission, distributing user.Specifically, creating user is, calls tool bag, inputs the authority numbering of user name, password and above-mentioned distribution.In order to carry out effective right assignment, the authority numbering of employing comprises, A: keeper, O: operator, G: read-only user.
Specifically, keeper, has DDL(data structure definition) authority, can create, revise, delete list structure, process bag, and additions and deletions can be carried out to data and change and look into.Operator, has DML(data manipulation management) authority, can question blank structure, and additions and deletions are carried out for data change and look into operation.Read-only user, only can question blank structure and data.Further, in order to realize stable rights management, the object permission of distributing user is, all objects of certain user are all licensed to another user.Can also be that independent authorization is carried out to some objects of user.
In conjunction with actual implementation process, authorize at least comprise increase, delete, revise, search in one or more.Further, each mandate is all create a synonym of bearing the same name to user to carry out proxy access.The agency that the present invention adopts, our daily TV remote controller used similar, just can operate televisor by remote controller and carry out the function such as zapping, tuning amount, provides an effective centre controlling unit.
For the ease of identifying the operation of user, the user operation resolving adopted is: first, is verified and identifies corresponding role, give different role-securities by user.Afterwards, by the synonym under corresponding role-security, find corresponding agent object.Finally, the operating right of check object, if verification is passed through, then finally performs, if verification is not passed through, then carries out abnormal prompt.
Further, consider and database can be coordinated to realize effective data tracking to carry out user management, user management involved in the present invention is, the accessing operation for user carries out log recording, and it is reserved to retain (user management) expansion.Further, user management strategy can be defined, when finding the high-risk operation of certain user's occurrence law, pressure can be carried out for this user and regaining mandate or locking, and notice relevant supervisor.
In conjunction with implement software of the present invention, letter can answer and be expressed as following process:
The first step, performs user management kit.
Second step, pre-set user classification and authority.
3rd step, creates sorted users, calls pkg_admin. p_create_user (authority is numbered for user name, password).
4th step, authorized user object, calls pkg_admin. p_grant_user_object (source user, targeted customer), by all for source user Object Authorization to targeted customer.Or call pkg_admin. p_grant_user_object (source user, targeted customer, source object), the appointed object of source user is licensed to targeted customer.
5th step, has implemented, and switches the new user created, checking result of use.
Can be found out by above-mentioned character express; after adopting the present invention; can from user management; the action type of strict control different brackets user and authority; database can be segmented in certain isolation section and carry out separate operations; cut off the impact that illegal operation causes, protect the complete and stable of production data from entrance scope.Meanwhile, the predefine of procedure operation mode can also have been carried out from the angle implementing to control, and a virtual subregion carries out the data isolation of corresponding operating, only have authorized data to be submitted to formal environments under authorized operation.Moreover, for the user operation of certain rule, certain early warning mechanism can be triggered, notify that corresponding personnel carry out follow-up and analyze, even directly lock high-risk operation user, greatly improve security.

Claims (9)

1., based on the user management method of ORACLE database, it is characterized in that:
By user management tool management users classification and operating right, distributed by user management instrument and perform user, namely role assignments is carried out to the identity of user, give different operating rights, described role assignments at least comprises and distributes authority, creates user, comprises user operation parsing, user management in described operating right;
Described management process is,
Step one, the application program in connection data storehouse generates the SQL statement of corresponding database by ORM Object Relation Mapping, and database connection pool corresponding to application program obtains user corresponding to database and connect, and SQL is carried out in this connection execution and calls;
Step 2, database receives the SQL performed, the synonym title corresponding according to active user's range-based searching, if synonym title does not exist, then the alarm of throw exception " object does not exist ", if synonym exists, then enters step 3;
Step 3, data are carried out parsing SQL according to the destination object of synonym acquisition agency and are operated, if not effective operating right, the then alarm of throw exception prompting " invalid operation ", if effective operating right, then enter step 4;
Step 4, make an explanation in database to the user at destination object place execution;
In said process, if there is alarm, then trigger early warning mechanism, record Operation Log, if there is high-risk operation, then directly locks user.
2. the user management method based on ORACLE database according to claim 1, is characterized in that: the described high-risk behavior being operating as destruction database structure and data, is all considered as high-risk operation.
3. the user management method based on ORACLE database according to claim 1, is characterized in that: described Operation Log content comprises, one or more in the statement of operation, time, account, machine name, access IP.
4. the user management method based on ORACLE database according to claim 1, is characterized in that: described user management instrument is oracle self-defined package implementation Process bag.
5. the user management method based on ORACLE database according to claim 1, it is characterized in that: described right of distribution is limited to default access, both according to service needed, the Permission Levels of self-defined correspondence, or, carry out the distribution of specifying access object according to user.
6. the user management method based on ORACLE database according to claim 1, is characterized in that: described establishment user comprises, and sets up the object permission of user, distributing user permission, distributing user,
Described establishment user is, calls tool bag, inputs user name, password and authority numbering,
Described authority numbering comprises keeper, operator, read-only user,
Described keeper, has DDL authority, can create, revise, delete list structure, process bag, and can carry out additions and deletions to data and change and look into,
Described operator, has DML authority, can question blank structure, and carries out additions and deletions for data and change and look into operation,
Described read-only user, only can question blank structure and data,
The object permission of described distributing user is, all objects of certain user are all licensed to another user, or, independent authorization is carried out to some objects of user.
7. the user management method based on ORACLE database according to claim 1, it is characterized in that: described mandate at least comprises increase, delete, revise, search in one or more, each mandate is all create a synonym of bearing the same name to user to carry out proxy access.
8. the user management method based on ORACLE database according to claim 1, is characterized in that: described user operation resolving is,
1. step, is verified by user and identifies corresponding role, give different role-securities,
2. step, by the synonym under corresponding role-security, finds corresponding agent object,
3., the operating right of check object, if verification is passed through, then finally performs step, if verification is not passed through, then carries out abnormal prompt.
9. the user management method based on ORACLE database according to claim 1, it is characterized in that: described user management is, accessing operation for user carries out log recording, and it is reserved to retain expansion, definable user management strategy, when finding the high-risk operation of certain user's occurrence law, pressure can be carried out for this user and regaining mandate or locking, and notice relevant supervisor.
CN201510052388.4A 2015-02-02 2015-02-02 User management method based on ORACLE databases Expired - Fee Related CN104766023B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510052388.4A CN104766023B (en) 2015-02-02 2015-02-02 User management method based on ORACLE databases

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510052388.4A CN104766023B (en) 2015-02-02 2015-02-02 User management method based on ORACLE databases

Publications (2)

Publication Number Publication Date
CN104766023A true CN104766023A (en) 2015-07-08
CN104766023B CN104766023B (en) 2017-09-19

Family

ID=53647842

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510052388.4A Expired - Fee Related CN104766023B (en) 2015-02-02 2015-02-02 User management method based on ORACLE databases

Country Status (1)

Country Link
CN (1) CN104766023B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105844142A (en) * 2016-03-16 2016-08-10 上海新炬网络信息技术有限公司 Safe centralized management and control method of database account
CN107229644A (en) * 2016-03-25 2017-10-03 阿里巴巴集团控股有限公司 Searching method and device
CN107273758A (en) * 2017-05-03 2017-10-20 上海上讯信息技术股份有限公司 A kind of data bank access method and equipment
CN107944840A (en) * 2017-12-25 2018-04-20 新疆机汇网络科技有限公司 Data processing method and device for service management
CN109409042A (en) * 2018-08-23 2019-03-01 顺丰科技有限公司 A kind of user right distribution abnormality detection system, method, equipment and storage medium
CN109766686A (en) * 2018-04-25 2019-05-17 新华三大数据技术有限公司 Rights management
CN110188089A (en) * 2019-05-31 2019-08-30 杭州安恒信息技术股份有限公司 A kind of database O&M management-control method and device
CN110929278A (en) * 2019-11-21 2020-03-27 浪潮云信息技术有限公司 Ansible-based cloud database authority management system and method
CN111400681A (en) * 2020-04-07 2020-07-10 杭州指令集智能科技有限公司 Data permission processing method, device and equipment
CN111460500A (en) * 2020-03-31 2020-07-28 贵州电网有限责任公司 Authority management method of network resources
CN115206320A (en) * 2022-07-15 2022-10-18 湖南创星科技股份有限公司 Graph database operation method and system based on voice recognition

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1967560A (en) * 2006-11-09 2007-05-23 华为技术有限公司 Controlling method of business operations competence and generating method of relational database
CN101515931A (en) * 2009-03-24 2009-08-26 北京理工大学 Method for enhancing the database security based on agent way
CN102508898A (en) * 2011-11-04 2012-06-20 浪潮(北京)电子信息产业有限公司 Data access method and database system based on cloud computing
US20120185500A1 (en) * 2011-01-13 2012-07-19 International Business Machines Corporation Data storage and management system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1967560A (en) * 2006-11-09 2007-05-23 华为技术有限公司 Controlling method of business operations competence and generating method of relational database
CN101515931A (en) * 2009-03-24 2009-08-26 北京理工大学 Method for enhancing the database security based on agent way
US20120185500A1 (en) * 2011-01-13 2012-07-19 International Business Machines Corporation Data storage and management system
CN102508898A (en) * 2011-11-04 2012-06-20 浪潮(北京)电子信息产业有限公司 Data access method and database system based on cloud computing

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105844142B (en) * 2016-03-16 2019-04-05 上海新炬网络技术有限公司 Management-control method in a kind of database account number safe collection
CN105844142A (en) * 2016-03-16 2016-08-10 上海新炬网络信息技术有限公司 Safe centralized management and control method of database account
CN107229644A (en) * 2016-03-25 2017-10-03 阿里巴巴集团控股有限公司 Searching method and device
CN107273758A (en) * 2017-05-03 2017-10-20 上海上讯信息技术股份有限公司 A kind of data bank access method and equipment
CN107944840A (en) * 2017-12-25 2018-04-20 新疆机汇网络科技有限公司 Data processing method and device for service management
CN109766686A (en) * 2018-04-25 2019-05-17 新华三大数据技术有限公司 Rights management
CN109409042A (en) * 2018-08-23 2019-03-01 顺丰科技有限公司 A kind of user right distribution abnormality detection system, method, equipment and storage medium
CN109409042B (en) * 2018-08-23 2021-04-20 顺丰科技有限公司 User authority distribution abnormity detection system, method, equipment and storage medium
CN110188089A (en) * 2019-05-31 2019-08-30 杭州安恒信息技术股份有限公司 A kind of database O&M management-control method and device
CN110929278A (en) * 2019-11-21 2020-03-27 浪潮云信息技术有限公司 Ansible-based cloud database authority management system and method
CN111460500A (en) * 2020-03-31 2020-07-28 贵州电网有限责任公司 Authority management method of network resources
CN111460500B (en) * 2020-03-31 2023-12-01 贵州电网有限责任公司 Authority management method of network resource
CN111400681A (en) * 2020-04-07 2020-07-10 杭州指令集智能科技有限公司 Data permission processing method, device and equipment
CN111400681B (en) * 2020-04-07 2023-09-12 杭州指令集智能科技有限公司 Data authority processing method, device and equipment
CN115206320A (en) * 2022-07-15 2022-10-18 湖南创星科技股份有限公司 Graph database operation method and system based on voice recognition

Also Published As

Publication number Publication date
CN104766023B (en) 2017-09-19

Similar Documents

Publication Publication Date Title
CN104766023A (en) User management method based on ORACLE database
CN109995796B (en) Industrial control system terminal safety protection method
CN109976239B (en) Industrial control system terminal safety protection system
CN104166812B (en) Database safety access control method based on independent authorization
CN103490895B (en) A kind of industrial control identity authentication applying the close algorithm of state and device
US9635029B2 (en) Role-based access control permissions
CN103441926B (en) Security gateway system of numerically-controllmachine machine tool network
CN110968825A (en) WEB page fine-grained authority control method
US20070299881A1 (en) System and method for protecting selected fields in database files
CN103246849A (en) Safe running method based on ROST under Windows
CN102722667A (en) Database security protection system and method based on virtual databases and virtual patches
CN114157457A (en) Authority application and monitoring method for network data information security
Marali et al. Cyber security threats in industrial control systems and protection
CN107147665B (en) Application method of the beam-based alignment model in industrial 4.0 systems
CN117370953A (en) ERP system access control method and platform
CN116707980A (en) Immune security defense method based on zero trust
CN105447408A (en) Data protection method and apparatus
Braband What's Security Level got to do with Safety Integrity Level?
KR101025029B1 (en) Implementation method for integration database security system using electronic authentication
CN101860436A (en) Technology for accurately controlling system user data authority
CN104732160A (en) Control method for preventing database information from being leaked internally
CN115484108A (en) Distributed internet database anti-intrusion security system
US11822646B2 (en) Generating an automated security analysis for an installation
CN105262770A (en) Method for managing account password
Kadebu et al. A security requirements perspective towards a secured nosql database environment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170919

Termination date: 20210202

CF01 Termination of patent right due to non-payment of annual fee