How can create secure environment with different types of IT administrators?

Asked By 0 points N/A Posted on -
qa-featured

In my job environment, anyone in need of domain access in an administrative capacity is assigned to the admin's group domain and the access he/she wanted is granted. I have decided to dump such practices and I have decided to remove all those inappropriately accessing the domain under the admin group from that group.

To be certain, I have users who need permission and access to post web pages in to that web servers and with the use of windows authentication, they should smoothly authenticate to SQL and not use SQL users server, etc.

Please suggest how I can implement this and create proper and secure environment with different types of IT administrators.

Any help is appreciated.

SHARE
Answered By 0 points N/A #181289

How can create secure environment with different types of IT administrators?

qa-featured

Auditing is the monitoring and recording of selected user database actions. It can be based on individual actions, such as the type of SQL statement executed, or on combinations of factors that can include user name, application, time, and so on. Security policies can trigger auditing when specified elements in an Oracle database are accessed or altered, including the contents within a specified object.

Total process:

Related Questions