GM, Did some research on Oracle databases sometime ago. Was looking into Database security.
v-one.com
Excerpt-- Strong authentication assured the organization that only legitimate agents accessed the database. Mutual authentication authenticated the agent to the server, as well as the server to the agent, and two factor authentication required something the agent had (a token), as well as something the agent knew (a password).
Excerpt--
Customer Case Study: U.S. Defense Agency
Customer Profile
A U.S. Defense Agency is charged with providing security investigations for classified government and military operations, Acting in partnership, the agency supports both government and its primary contractors, and provides security advice and assistance to over 11,000 cleared contractor facilities. The primary role of the agency is to provide investigative services, collecting sensitive background information used to issue security clearances for federal, state, local, and contractor employees.
By law, the agency is obligated to protect the confidentiality of personnel information collected, which is housed in an Oracle Developer/2000 database. Thousands of agents work for the organization, and travel around the world collecting personnel clearance information. All require real-time access to the Oracle database.
__________________________________________________________________
Yogi |