Security hardening of a database is an elaborate task requiring a detailed review of the environment. Read more on our Oracle Database Server Security Checklist
User Proxy Authentication Identified by values allow you to connect to a Schema without password. Obviously you cannot circumvent Oracle Database Security.
The Proxy authentication mechanism allows a user to login as their own user but land into a different schema without knowing the password for that user. For example the USER_B may want to create an object in the SCHEMA_A or want to use the privileges/roles of the SCHEMA_A user. You can now connect through your […]