docs.oracle.com Open in urlscan Pro
2a02:26f0:3100:3af::af5  Public Scan

URL: https://docs.oracle.com/cd/E91266_01/EMSEC/GUID-94606699-9116-4644-A407-2A5FDE8A76D0.htm
Submission: On March 13 via api from DE — Scanned from DE

Form analysis 2 forms found in the DOM

GET //docs.oracle.com/apps/search/search.jsp

<form action="//docs.oracle.com/apps/search/search.jsp" method="get"><input id="searchField" type="text" name="word"><label for="searchField"
    style="position: absolute; left: -10000px; top: auto; width: 1px; height: 1px; overflow: hidden;">Search</label> <input type="submit" id="SEARCHBUTTON" value="Search"><br><input type="hidden" name="product" id="searchpro" value="e91266-01"><input
    type="hidden" name="book" id="searchbook" value="EMSEC"></form>

POST

<form method="post" style="margin-top: 1rem;">
  <div style="margin-top: 0px; margin-right: 0px;"><a class="closebutton">×</a><input type="hidden" id="path" name="path" value="https://docs.oracle.com/cd/E91266_01/EMSEC/GUID-94606699-9116-4644-A407-2A5FDE8A76D0.htm"><input type="hidden"
      name="topictitle" id="topictitle" value="User Requiring Access to SQL Tuning Advisor">
    <p style="margin-bottom: 0px;"><label for="userCommentsTitle" style="color: rgb(102, 102, 102);">Subject</label> <input type="text" name="title" id="userCommentsTitle" size="40"></p><textarea id="userCommentsBody" rows="5" cols="50"
      name="comment_text"></textarea>
    <p style="margin: 0px 0px 1ex;"><label style="color: rgb(102, 102, 102); height: 2px; text-indent: -5900px;">From</label> &nbsp; &nbsp; <span style="display: none;"><input type="radio" name="submitter" value="" id="postPublic"><label
          for="postPublic"></label> <br></span><input type="radio" name="submitter" value="" id="postAnonymous" checked=""> <label for="postAnonymous">Anonymous</label><span style="display: inline;"> (or
        <a href="http://www.oracle.com/webapps/redirect/signon?nexturl=https://docs.oracle.com/cd/E91266_01/EMSEC/GUID-94606699-9116-4644-A407-2A5FDE8A76D0.htm">Sign In</a>)</span><input type="submit" value="Submit" class="submit" id="submitajax"
        style="margin-right: 0px; float: right; display: block;"></p><br>
    <p style="color: rgb(51, 51, 51); margin-top: 0px; margin-bottom: 0.75rem;">Comments, corrections, and suggestions are forwarded to authors every week. By submitting, you confirm you agree to the
      <a href="http://docs.oracle.com/cd/E23003_01/html/en/comment_disclaimer.htm" style="font-size: 12px;">terms and conditions</a>. Use the <a href="https://community.oracle.com/" style="font-size: 12px;">OTN forums</a> for product questions. For
      support or consulting, file a service request through <a href="https://support.oracle.com/" style="font-size: 12px;">My Oracle Support</a>.</p>
  </div>
</form>

Text Content

Go to main content
 * Sign In

Home / Oracle Enterprise Manager Cloud Control Online Documentation Library,
Release 13.2
Enterprise Manager Cloud Control Security Guide

Page 16 of 20
Search


Table of Contents

 * Oracle Enterprise Manager Cloud Control Security Guide
   * Preface
   * Security Overview
     * Security Threats
     * Security Principles
       * Separation of Duties and Principle of Least Privilege
       * Encryption
       * Monitoring for Suspicious Activity (Auditing)
       * Non-repudiation
   * Security Features
     * Configuring Authentication
       * Supported Authentication Schemes
       * Creating a New Administrator
       * Deleting an Administrator
       * Enterprise User Security Based Authentication
       * Oracle Internet Directory (OID)
       * Microsoft Active Directory Based Authentication
       * External Authorization using External Roles
       * Mapping LDAP User Attributes to Enterprise Manager User Attributes
       * Changing User Display Names in Enterprise Manager
       * Configuring Other LDAP/SSO Providers
       * Configuring Enterprise User Security based Authentication
       * Restoring to the Default Authentication Method
     * Configuring Privileges and Role Authorization
       * Understanding Users, Privileges, and Roles
       * Privileges and Roles
       * Managing Privileges with Privilege Propagating Groups
     * Configuring Secure Communication
       * About Secure Communication
       * Enabling Security for the Oracle Management Service
       * Securing the Oracle Management Agent
       * Managing Agent Registration Passwords
       * Restricting HTTP Access to the Management Service
       * Enabling Security for the Management Repository Database
       * Custom Configurations
       * Secure Communication Setup Tools
       * Configuring Third Party Certificates
     * Configuring and Using Target Credentials
       * Credential Subsystem
     * Configuring and Using Cryptograhic Keys
       * Configuring the emkey
       * emctl Commands
       * Install and Upgrade Scenarios
     * Configuring and Managing Audit
       * Auditing Credentials
       * Default Audit Actions
       * Configuring the Enterprise Manager Audit System
       * Configuring the Audit Data Export Service
       * Updating the Audit Settings
       * Searching the Audit Data
       * List of Operations Audited
       * Auditing the Infrastructure
     * Additional Security Considerations
       * Changing the SYSMAN and MGMT_VIEW Passwords
       * Responding to Browser-Specific Security Certificate Alerts
   * Keeping Enterprise Manager Secure
     * Guidelines for Secure Infrastructure and Installations
       * Secure the Infrastructure and Operating System
       * Securing the Oracle Management Repository
       * Securing the Oracle Management Agent
       * Secure Communication
       * Security Console
     * Guidelines for SSL Communication
       * Ensure TLSv1.2 Protocol is Enabled
       * Leave Communication in Secure-Lock Mode
       * Modify Cipher Configuration if Required
       * Best Practices for Securing Communication
     * Guidelines for Authentication
       * Enable External Authentication
     * Guidelines for Authorization
       * Best Practices for Privilege and Role Management
       * Use Principle of Least Privileges for Defining Roles/Privileges
       * Use Privilege Propagation Groups
     * Guidelines for Auditing
       * Best Practices for Auditing
     * Guidelines for Managing Target Credentials
       * Best Practices for Credentials
   * Security Best Practices for Database Management in Enterprise Manager
     * Flexible Database Access Control
       * Database Management Roles and Responsibilities
       * Application DBA Access
       * Application Developer Access
       * Database Monitoring User Access
       * Database Administrator Access
       * Privilege Groups
     * Secured Communication (TCPS) Access to Databases
       * Configuring TCPS
       * Configuring Third Party CA Certificates for Communication With Target
         Databases
     * Account Management
   * Troubleshooting
     * Troubleshooting Authentication Issues in Enterprise Manager
       * Enabling the WebLogic Debug Flag
       * Debugging errors in ldap_trace.logATN file
       * Invalid Credentials
       * Timeout in LDAP Server'
       * Errors Outside ldap_trace.logATN'
   * References
   * Out-of-Box Roles
   * User Access to Database Targets without SYSDBA Privileges
     * Creating an Administrator
     * Users Requiring Access to the Database Performance Page
     * User Requiring Accessing AWR/ADDM
     * User Requiring Access to SQL Access Advisor
     * User Requiring Access to SQL Tuning Advisor
   * Privileges
   * Audit Operations
   * Configuring TLSv1.2 for Communication with the Enterprise Manager
     Repository
   * Index

Feedback
×

Subject

From    
Anonymous (or Sign In)


Comments, corrections, and suggestions are forwarded to authors every week. By
submitting, you confirm you agree to the terms and conditions. Use the OTN
forums for product questions. For support or consulting, file a service request
through My Oracle Support.

Thank you for your feedback!
Download
×
PDF - best for offline viewing and printing

Categories

 * Home
 * Master Glossary

16/20


A.2.5 USER REQUIRING ACCESS TO SQL TUNING ADVISOR

 1. On the DB Target host, log in as sysdba and create a <sqltune_admin> user
    and grant appropriate privileges:
    
    SQL> create user <sqltune_admin> identified by <password>; SQL> grant select any dictionary to <sqltune_admin>; SQL> grant create session to <sqltune_admin>; SQL> grant oem_advisor to <sqltune_admin>;  
    

 2. Log in to the Cloud Control console as <gc_user> user, which is JANEMURRY in
    our example:
    
    TARGETS > DATABASE > ORADB > Related Links: Advisor Central > SQL Tuning
    AdvisorEnter login and password for <sqltune_admin> user.

 3. You may now perform SQL Tuning tasks. For example, click on TOP ACTIVITY >
    Run ASH reports.

Previous Page
Page 16 of 20
Next Page
 * * English

 * About Oracle
 * Contact Us
 * Legal Notices
 * Terms of Use
 * Your Privacy Rights | Cookie-Einstellungen | Ad Choices
 * 

Copyright © 2011, 2017, Oracle and/or its affiliates. All rights reserved.

Scripting on this page enhances content navigation, but does not change the
content in any way.