Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Curso de Administracin de Base de Datos (ORACLE)

ANEXO II

PROFILES

2011

Curso de Administracin de Base de Datos (ORACLE)

2011

Posibles valores para la creacin de un profile

Kernel Resources
COMPOSITE_LIMIT

CONNECT_TIME

CPU_PER_CALL

CPU_PER_SESSION

IDLE_TIME

LOGICAL_READS_PER_CALL

Maximum weighted sum of:


CPU_PER_SESSION, CONNECT_TIME,
LOGICAL_READS_PER_SESSION, and
PRIVATE_SGA. If this limit is
exceeded, Oracle aborts the session
and returns an error.
composite_limit <value | UNLIMITED
| DEFAULT>
ALTER PROFILE developer LIMIT
composite_limit 5000000;
Allowable connect time per session
in minutes
connect_time <value | UNLIMITED |
DEFAULT>
ALTER PROFILE developer LIMIT
connect_time 600;
Maximum CPU time per call (100ths
of a second)
cpu_per_call <value | UNLIMITED |
DEFAULT>
ALTER PROFILE developer LIMIT
cpu_per_call 3000;
Maximum CPU time per session
(100ths of a second)
cpu_per_session <value | UNLIMITED
| DEFAULT>
ALTER PROFILE developer LIMIT
cpu_per_session UNLIMITED;
Allowed idle time before user is
disconnected (minutes)
idle_time <value | UNLIMITED |
DEFAULT>
ALTER PROFILE developer LIMIT
idle_time 20;
Maximum number of database blocks
read per call

Curso de Administracin de Base de Datos (ORACLE)

LOGICAL_READS_PER_SESSI
ON

PRIVATE_SGA

2011

logical_reads_per_call <value |
UNLIMITED | DEFAULT>
ALTER PROFILE developer LIMIT
logical_reads_per_call 1000;
Maximum number of database blocks
read per session
logical_reads_per_session <value |
UNLIMITED | DEFAULT>
ALTER PROFILE developer LIMIT
logical_reads_per_session
UNLIMITED;
Maximum integer bytes of private
space in the SGA
(useful for systems using multithreaded server MTS)
private_sga <value | UNLIMITED |
DEFAULT>

SESSIONS_PER_USER

Only valid with TP-monitor


ALTER PROFILE developer LIMIT
private_sga 15K;
Number of concurrent multiple
sessions allowed per user
sessions_per_user <value |
UNLIMITED | DEFAULT>
ALTER PROFILE developer LIMIT
sessions_per_user 1;

Password Resources
FAILED_LOGIN_ATTEMPTS

The number of failed attempts to


log in to the user account before
the account is locked
failed_login_attempts <value |
UNLIMITED | DEFAULT>
ALTER PROFILE developer LIMIT
failed_login_attempts 3;

PASSWORD_GRACE_TIME

-- to count failed log in attempts:


SELECT name, lcount
FROM user$
WHERE lcount <> 0;
The number of days after the grace
period begins during which a
warning is issued and login is

Curso de Administracin de Base de Datos (ORACLE)

2011

allowed. If the password is not


changed during the grace period,
the password expires

PASSWORD_LIFE_TIME

PASSWORD_LOCK_TIME

PASSWORD_REUSE_MAX

PASSWORD_REUSE_TIME

password_gracetime <value |
UNLIMITED | DEFAULT>
ALTER PROFILE developer LIMIT
password_grace_time 10;
The number of days the same
password can be used for
authentication
password_life_time <value |
UNLIMITED | DEFAULT>
ALTER PROFILE developer LIMIT
password_life_time 60;
the number of days an account will
be locked after the specified
number of consecutive failed login
attempts defined by
FAILED_LOGIN_ATTEMPTS
password_lock_time <value |
UNLIMITED | DEFAULT>
ALTER PROFILE developer LIMIT
password_lock_time 30;
The number of times a password must
be changed before it can be reused
password_reuse_max <value |
UNLIMITED | DEFAULT>
ALTER PROFILE developer LIMIT
password_reuse_max 0;
The number of days between reuses
of a password
password_reuse_time <value |
UNLIMITED | DEFAULT>
ALTER PROFILE developer LIMIT
password_reuse_time 0;

Password Verification
Sample script for creating a
password verify function
PASSWORD_VERIFY_FUNCTI
ON

{ORACLE_HOME}/rdbms/admin/utlpwdmg.
sql
Verify passwords for length,
content, and complexity
password_verify_function

Curso de Administracin de Base de Datos (ORACLE)

Changing passwords with a


password verify function

2011

<function_name | NULL | DEFAULT>


ALTER PROFILE developer LIMIT
password_verify_function
uw_pwd_verification;
The function requires the old and
new passwords so password changes
can not be done with ALTER USER.
Password changes should be
performed with the SQL*Plus
PASSWORD command or through a
stored procedure that requires the
correct inputs.

You might also like