12c密碼加固

關於Oracle12c 密碼加固金融行業都是有要求的,這裏做一個測試記錄。

1、創建一個用戶
SYS@orcl1> create user roidba identified by roidba;
create user roidba identified by roidba
*
ERROR at line 1:
ORA-28003: password verification for the specified password failed
ORA-20001: Password same as or similar to user --出現報錯,提示密碼驗證失敗。

2、查看profile
SYS@orcl1> select * from dba_profiles;

PROFILE RESOURCE_NAME RESOURCE_TYPE LIMIT COMMON


DEFAULT COMPOSITE_LIMIT KERNEL UNLIMITED NO
DEFAULT SESSIONS_PER_USER KERNEL UNLIMITED NO
DEFAULT CPU_PER_SESSION KERNEL UNLIMITED NO
DEFAULT CPU_PER_CALL KERNEL UNLIMITED NO
DEFAULT LOGICAL_READS_PER_SESSION KERNEL UNLIMITED NO
DEFAULT LOGICAL_READS_PER_CALL KERNEL UNLIMITED NO
DEFAULT IDLE_TIME KERNEL UNLIMITED NO
DEFAULT CONNECT_TIME KERNEL UNLIMITED NO
DEFAULT PRIVATE_SGA KERNEL UNLIMITED NO
DEFAULT FAILED_LOGIN_ATTEMPTS PASSWORD 10 NO
DEFAULT PASSWORD_LIFE_TIME PASSWORD 180 NO
DEFAULT PASSWORD_REUSE_TIME PASSWORD UNLIMITED NO
DEFAULT PASSWORD_REUSE_MAX PASSWORD UNLIMITED NO
DEFAULT PASSWORD_VERIFY_FUNCTION PASSWORD VERIFY_FUNCTION NO
DEFAULT PASSWORD_LOCK_TIME PASSWORD 1 NO
DEFAULT PASSWORD_GRACE_TIME PASSWORD 7 NO
ORA_STIG_PROFILE COMPOSITE_LIMIT KERNEL DEFAULT NO
ORA_STIG_PROFILE SESSIONS_PER_USER KERNEL DEFAULT NO
ORA_STIG_PROFILE CPU_PER_SESSION KERNEL DEFAULT NO
ORA_STIG_PROFILE CPU_PER_CALL KERNEL DEFAULT NO
ORA_STIG_PROFILE LOGICAL_READS_PER_SESSION KERNEL DEFAULT NO
ORA_STIG_PROFILE LOGICAL_READS_PER_CALL KERNEL DEFAULT NO
ORA_STIG_PROFILE IDLE_TIME KERNEL 15 NO
ORA_STIG_PROFILE CONNECT_TIME KERNEL DEFAULT NO
ORA_STIG_PROFILE PRIVATE_SGA KERNEL DEFAULT NO
ORA_STIG_PROFILE FAILED_LOGIN_ATTEMPTS PASSWORD 3 NO
ORA_STIG_PROFILE PASSWORD_LIFE_TIME PASSWORD 60 NO
ORA_STIG_PROFILE PASSWORD_REUSE_TIME PASSWORD 365 NO
ORA_STIG_PROFILE PASSWORD_REUSE_MAX PASSWORD 10 NO
ORA_STIG_PROFILE PASSWORD_VERIFY_FUNCTION PASSWORD ORA12C_STRONG_V NOERIFY_FUNCTION --使用了12c密碼驗證策略

ORA_STIG_PROFILE PASSWORD_LOCK_TIME PASSWORD UNLIMITED NO
ORA_STIG_PROFILE PASSWORD_GRACE_TIME PASSWORD 5 NO

32 rows selected.

SYS@orcl1>

3、密碼驗證策略要求

ora12c_strong_verify_function Function Password Requirements
The ora12c_strong_verify_function function fulfills the Department of Defense Database Security Technical Implementation Guide requirements.

This function checks for the following requirements when users create or modify passwords:

The password must contain at least 2 upper case characters, 2 lower case characters, 2 numeric characters, and 2 special characters. These special characters are as follows:
--要求至少2個大寫,兩個小寫,2個數字,2個特殊字符
‘ ~ ! @ # $ % ^ & * ( ) _ - + = { } [ ] \ / < > , . ; ? ' : | (space)
The password must differ from the previous password by at least 4 characters.

The following internal checks are also applied:

The password contains no fewer than nine characters and does not exceed 30 characters.
The password does not contain the double-quotation character ("). It can be surrounded by double-quotation marks, however.

4、根據要求重新創建一個用戶

SYS@orcl1> create user roidba identified by "FXlv12!@";

User created.
SYS@orcl1> grant connect to roidba;

Grant succeeded.

SYS@orcl1> conn roidba/"FXlv12!@"
Connected.
ROIDBA@orcl1>

5、取消密碼複雜度驗證

SYS@orcl1> ALTER PROFILE DEFAULT LIMIT PASSWORD_VERIFY_FUNCTION NULL;

Profile altered.

SYS@orcl1> alter user roidba identified by roidba;

User altered.

SYS@orcl1>

6、設置密碼複雜度驗證操作過程

Enabling Password Complexity Verification
The utlpwdmg.sql script can be customized to enable password complexity verification.

Log in to SQL*Plus with administrative privileges.
For example:

CONNECT SYSTEM
Enter password: password
Run the utlpwdmg.sql script (or your modified version of this script) to create the password complexity functions in the SYS schema.br/>@$ORACLE_HOME/rdbms/admin/utlpwdmg.sql
Grant any users who must use this function the EXECUTE privilege on it.
For example:

GRANT pmsith EXECUTE ON ora12c_strong_verify_function;
In the default profile or the user profile, set the PASSWORD_VERIFY_FUNCTION setting to either the sample password complexity function in the utlpwdmg.sql script, or to your customized function. Use one of the following methods:
Log in to SQL*Plus with administrator privileges and use the CREATE PROFILE or ALTER PROFILE statement to enable the function. Ensure that you have the EXECUTE privilege on the function.

For example, to update the default profile to use the ora12c_strong_verify_function function:

ALTER PROFILE default LIMIT
PASSWORD_VERIFY_FUNCTION ora12c_strong_verify_function;

發表評論
所有評論
還沒有人評論,想成為第一個評論的人麼? 請在上方評論欄輸入並且點擊發布.
相關文章