Accenture MDR Quick Start Guide for Oracle® Database
This quick start guide will help Accenture MDR customers configure Oracle® Database to allow log collection from the Log collection Platform (LCP).
The document includes the following topics:
Supported Versions
A list of supported versions is available in the Accenture MDR Supported Products List document (Accenture_MDR_Supported_Products_List.xlsx) which can be found in Accenture MDR Portal - https://mss.accenture.com/PortalNextGen/Reports/Documents
NOTE: From version 21c, the Traditional Auditing will be deprecated and only Unified auditing will be supported. Traditional Auditing and XML Auditing are supported till version 19c. From version 21c Unified auditing will be supported.
Port Requirements
Table 1-1: Port requirements for LCP communication.
Source | Destination | Port | Description |
LCP | Oracle | 1521 (TCP) | Default port |
Configuring Oracle Database
Oracle has deprecated Traditional and XML auditing from Version 21c. AMXDR also stopped supporting Traditional and XML Auditing. The below steps are only for existing customers. It is also advisable to convince existing customer to Enable Unified Auditing. How to enable Unified auditing steps are added below. For new Customers Onboard Device with Unified Auditing Enabled. To support Unified Auditing via Syslog please follow guide: https://mdrkb.atlassian.net/wiki/x/AYBNEg
To Create a read-only database user for Oracle
Collectors that use a database sensor require that you create a read-only database user account so that the collector can query for events.
You can set up Oracle database users in the following ways:
By using Oracle 10g or 11g Enterprise Manager
By using Oracle 12C Enterprise Manager
By using SQLPlus
To create a read-only database user account using Oracle 10g or 11g Enterprise Manager
Login to the Oracle Database as a user with permissions to create roles and users with Enterprise Manager.
On the Database Instance page, click the Administration tab.
Under Users & Privileges, click Roles.
On the Roles page, click Create.
On the Create Role page, in the Name field, type a new role name. For example, ReadOnlyRole.
Click System Privileges, and then click Edit List.
In the Available System Privileges list, select the privilege named SELECT.
Do one of the following steps:
If Oracle Auditing is configured to use the Database Audit Trail, select the DBA_AUDIT_TRAIL view.
If Oracle Auditing is configured to use the XML Audit Trail, select the V_$XML_AUDIT_TRAIL view.
9. Click Move so that the privileges appear in the Selected System Privileges list.
10.Click OK and then click OK again to create the role.
11.Click the link Database Instance:database_name.
12.On the Administration tab, under Users & Privileges, click Users.
13.click Create.
14.On the Create User page, perform the following tasks in the order given:
a. In the Name field, type a username. For example, READONLYUSER.
b. In the Profile field, leave the value as DEFAULT.
c. In the Authentication field, leave the value as PASSWORD.
d. In the Enter Password and Confirm Password fields, type a password and confirm it.
e. In the Default Tablespace field, type a default table space for the user. For example, USERS.
f. In the Temporary Tablespace field, type a temporary table space for the user. For example, TEMP.
g. Click Roles.
h. On the Roles page, click Edit List.
i. In the Available Role list, select the role that you created in step4.
j. Click Move so that the role appears in the Selected Roles list.
k. Click OK and then click OK again to create the user with read-only access to the database tables.
To create a read-only database user account using Oracle 12c Enterprise Manager
Login to the Oracle database as a user with permissions to create roles and users with Enterprise Manager.
On the Database Instance page, click the Security tab.
Under Security, click Roles.
On the Roles page, click Create.
On the Create Role page, in the Name field, type a new role name. For example, ReadOnlyRole.
Click System Privileges and then click Edit List.
In the Available System Privileges list, select the privilege named SELECT.
Do one of the following steps:
If Oracle Auditing is configured to use the Database Audit Trail, select DBA view.
If Oracle Auditing is configured to use the XML Audit Trail, select Audit_Viewer view.
9.Click Move so that the privileges appear in the Selected System Privileges list.
10.Click OK and then click OK again to create the role.
11.Click the link Database Instance:database_name.
12.On the Security tab, under Users & Privileges, click Users.
13.Click Create.
14.On the Create User page, perform the following tasks in the order given:
a. In the Name field, type a user name. For example, READONLYUSER.
b. In the Profile field, leave the value as DEFAULT.
c. In the Authentication field, leave the value as PASSWORD.
d. In the Enter Password and Confirm Password fields, type a password and confirm it.
e. In the Default Tablespace field, type a default table space for the user. For example, USERS.
f. In the Temporary Tablespace field, type a temporary table space for the user. For example, TEMP.
g. Click Roles.
h. On the Roles page, click Edit List.
i. In the Available Role list, select the role that you created in step4.
j. Click Move so that the role appears in the Selected Roles list.
k. Click OK and then click OK again to create the user with read-only access to the database tables.
For Oracle 12c Enterprise Manager, the username should start with c##parameter, for example c##read_only_user.
To create a read-only Oracle Database user account using SQLPlus
To start SQLPlus without logging in to a database, at the command prompt, type the following: sqlplus /nolog;
To connect as a system database administrator, at the SQLPlus prompt, type the following command: connect sys/password@SID as sysdba;
To create a read-only user, at the SQLPlus prompt, type the following commands:
create user <read_only_user> identified by <password>;
grant connect to <read_only_user>;
4. Do one of the following steps:
If Oracle Auditing is configured to use Database Audit Trail, type the following command:
grant select on DBA_AUDIT_TRAIL to <read_only_user>;
If Oracle Auditing is configured to use XML Audit Trail, type the following command:
grant select on V_$XML_AUDIT_TRAIL to <read_only_user>;
5. To grant select privileges for the database user, type the following commands:
grant select on sys.aud$ to <read_only_user>;
grant select on sys.system_privilege_map to <read_only_user>;
grant select on sys.stmt_audit_option_map to <read_only_user>;
grant select on sys.audit_actions to <read_only_user>;
6. Type the following commands:
grant create session to <read_only_user>;
grant <read_only_user> to read;
If DBA_AUDIT_TRAIL is enabled, use following command:
grant dba to read_only_user;
If XML_Audit_trail is enabled, use the following command:
grant audit_ viewer to read_only_user;
Users need to have execute permission on sys.utl_inaddr. To grant select privileges for the database user, type the following SQLPlus command: grant execute on sys.utl_inaddr to <read_only_user>
To create a read-only Oracle database user by using SQLPlus for 21c:
To start SQLPlus without logging in to a database, at a command prompt, type the following:
sqlplus /nolog;
To connect as a system database administrator, at the SQLPlus prompt, type the following command:
connect sys/password@SID as sysdba;
To create a read-only user, at the SQLPlus prompt, type the following commands:
create user read_only_user identified by password;
grant connect to read_only_user;
To grant select privileges for the database user, type the following commands:
grant select on AUDSYS.AUD$UNIFIED to read_only_user;
grant select on sys.audit_actions to read_only_user;
Type the following commands:
grant create session to read_only_user;
To enable auditing in an Oracle Database
For Oracle Database to work with the collector, you must complete the following procedures in the order shown:
Enable auditing in the Oracle Database. See “To enable auditing in the Oracle 10g, 11g, or 12c database”
Enable auditing in the Oracle Database. See “To Enable unified auditing in the Oracle 21c”
Configure auditing for a database user account. See “To configure auditing for an Oracle 10g, 11g, or 12c database user account”
Please consult your Oracle Database administrator before you proceed with any Oracle-related procedures.
To enable auditing in the Oracle 10g, 11g, 12c and 19c database
On the Oracle computer, start SQLPlus without connecting to a database by typing the following command
sqlplus /nolog;
2. To connect to the database as a system administrator, at the SQL prompt, type the following command
connect username/password@SID as sysdba;
Do one of the following steps:
To configure Oracle Auditing to use Database audit trail, at the command prompt type the following command
ALTER SYSTEM SET audit_trail=db,extended scope=SPFILE;
To configure Oracle Auditing to use XML audit trail, at the command prompt type the following command
ALTER SYSTEM SET audit_trail=xml,extended scope=SPFILE;
4. To shut down the database, type the following command:
SHUTDOWN immediate
Note: Please consult a Oracle Database administrator before executing the above command. For Windows, restart Oracle services.
5. To restart the database, type the following command: startup
6. For Oracle 10g database, set up the audit events using the examples in the following website: http://www.oracle-base.com/articles/10g/Auditing_10gR2.php
7. For Oracle 11g database, set up the audit events using the examples in the following website: http://docs.oracle.com/cd/E11882_01/server.112/e10575/tdpsg_auditing.htm
8. For Oracle 12c database, set up the audit events using the examples in the following website: http://docs.oracle.com/database/121/DBSEG/audit_config.htm
To Enable unified auditing in the Oracle 21c
To enable unified auditing:
Log in to SQL*Plus as user
SYS
with theSYSDBA
administrative privilege.sqlplus sys as sysdba Enter password: password
Run the following query to find out if your database has been migrated to use unified auditing. Enter
Unified Auditing
in the case shown here.SELECT VALUE FROM V$OPTION WHERE PARAMETER = 'Unified Auditing';
If the output for the
VALUE
column isFALSE
, then complete the remaining steps in this section to migrate to unified auditing. If the output isTRUE
, then unified auditing is enabled by-default.Stop the database.
For single-instance installations, enter the following commands from SQL*Plus:
SHUTDOWN IMMEDIATE EXIT
For Windows systems, stop the Oracle service:
net stop OracleService%ORACLE_SID%
For Oracle Real Application Clusters (Oracle RAC) installations, shut down each database instance as follows:
srvctl stop database -db db_name
Stop the listener. (Stopping the listener is not necessary for Oracle RAC and Grid Infrastructure listeners.)
lsnrctl stop listener_name
You can find the name of the listener by running the
lsnrctl status
command. The name is indicated by theAlias
setting.Go to the
$ORACLE_HOME/rdbms/lib
directory.Enable the unified auditing executable.
UNIX: Run the following command:
make -f ins_rdbms.mk uniaud_on ioracle ORACLE_HOME=$ORACLE_HOME
Windows: Rename the
%ORACLE_HOME%/bin/orauniaud12.dll.option
file to%ORACLE_HOME%/bin/orauniaud12.dll
.
Restart the listener.
lsnrctl start listener_name
Restart the database. Log in to SQL*Plus and then enter the
STARTUP
command as follows:sqlplus sys as sysoper Enter password: password SQL> STARTUP
For Windows systems, start the Oracle service again.
net start OracleService%ORACLE_SID%
For Oracle RAC installations, from a command line, restart the database as follows:
srvctl setenv database -db orcl
When using Windows, you can restart Oracle.
Restart by typing the following command: startup
For the Oracle 10g database, set up the audit events using the examples at the following Web site: http://www.oracle-base.com/articles/10g/Auditing_10gR2.php
For the Oracle 11g database, set up the audit events using the examples at the following Web site: http://download.oracle.com/docs/cd/E11882_01/network.112/e16543/ auditing.htm#BCGIDBFI
Disable Traditional Auditing and Enable Unified Auditing in Oracle DB.
To Disable Traditional Auditing
This process can be followed from 11c till 20c
Log in to the server as the oracle user.
Run the following commands:
> sqlplus / as sysdba SQL> alter system set audit_sys_operations=FALSE scope=spfile; SQL> alter system set audit_trail=NONE scope=spfile;
Restart the Oracle database.
To Enable Unified Auditing
This process is only to follow when the Traditional Auditing was enabled from 11c to 20c. From 21c Onwards Unified auditing is enabled by default.
Log in to SQL*Plus as user
SYS
with theSYSDBA
administrative privilege.sqlplus sys as sysdba Enter password: password
Run the following query to find out if your database has been migrated to use unified auditing. Enter
Unified Auditing
in the case shown here.SELECT VALUE FROM V$OPTION WHERE PARAMETER = 'Unified Auditing';
If the output for the
VALUE
column isFALSE
, then complete the remaining steps in this section to migrate to unified auditing. If the output isTRUE
, then unified auditing is enabled by-default.Stop the database.
For single-instance installations, enter the following commands from SQL*Plus:
SHUTDOWN IMMEDIATE EXIT
For Windows systems, stop the Oracle service:
net stop OracleService%ORACLE_SID%
For Oracle Real Application Clusters (Oracle RAC) installations, shut down each database instance as follows:
srvctl stop database -db db_name
Stop the listener. (Stopping the listener is not necessary for Oracle RAC and Grid Infrastructure listeners.)
lsnrctl stop listener_name
You can find the name of the listener by running the
lsnrctl status
command. The name is indicated by theAlias
setting.Go to the
$ORACLE_HOME/rdbms/lib
directory.Enable the unified auditing executable.
UNIX: Run the following command:
make -f ins_rdbms.mk uniaud_on ioracle ORACLE_HOME=$ORACLE_HOME
Windows: Rename the
%ORACLE_HOME%/bin/orauniaud12.dll.option
file to%ORACLE_HOME%/bin/orauniaud12.dll
.
Restart the listener.
lsnrctl start listener_name
Restart the database. Log in to SQL*Plus and then enter the
STARTUP
command as follows:sqlplus sys as sysoper Enter password: password SQL> STARTUP
For Windows systems, start the Oracle service again.
net start OracleService%ORACLE_SID%
For Oracle RAC installations, from a command line, restart the database as follows:
srvctl setenv database -db orcl
When using Windows, you can restart Oracle.
Restart by typing the following command: startup
For the Oracle 10g database, set up the audit events using the examples at the following Web site: http://www.oracle-base.com/articles/10g/Auditing_10gR2.php
For the Oracle 11g database, set up the audit events using the examples at the following Web site: http://download.oracle.com/docs/cd/E11882_01/network.112/e16543/
auditing.htm#BCGIDBFI
To configure auditing for an Oracle 10g, 11g, or 12c database user account
Oracle Auditing is highly customizable and the design of an auditing policy may vary depending on your needs. The following procedure is one example of Oracle Auditing.
At a command prompt, start SQLPlus without connecting to a database by typing the following command
sqlplus /nolog;
2. To connect to the database as an administrator, at the SQL prompt, type the following command:
CONNECT user_name/password@SID as SYSDBA;
3. To configure auditing for the database user, at the SQL prompt, type the following commands:
AUDIT ALL BY <user_name> BY ACCESS;
AUDIT SELECT TABLE, CREATE TABLE, UPDATE TABLE, INSERT TABLE, DELETE TABLE BY <user_name> BY ACCESS;
AUDIT EXECUTE PROCEDURE BY <user_name> BY ACCESS;
Adding support for Unified Auditing From version 11c
If the DB version is 21c and above then Traditional Auditing will be deprecated and Unified logging will be enabled.
We need to copy the
config.xml
file to collector folder.Log into LCP
Stop Event Translator service:
systemctl event-translator.service stop
Go to collector Folder.
cd /opt/lcp/collectors/oracledb/
Rename the
config.xml
withmv config.xml config.xml.bak.
Go to utils folder.
cd utils/
Under Utils folder there will be a folder named
Unified_Auditing_21c
.Copy the file and paste it to collector directory. With given command:
cp config.xml /opt/lcp/collectors/oracledb/config.xml
Provide the proper permission and ownership to new
config.xml
.chmod 664 config.xml chown sesuser:ses config.xml
Start the event-translator service.
Supported versions
Managed Security Services monitors the Oracle Database versions that are listed in the Supported Products List document only. For the latest supported versions, visit Symantec Managed Security Services portal, and view the Symantec_MSS_Supported_Products_List_CUSTOMER.xlsx document.
Creating a read-only database user for Oracle
Collectors that use a database sensor require that you create a read-only database user account so that the collector can query for events.
See "Installing collectors that use a database sensor"
You can set up Oracle database users in the following ways:
By using Oracle 10g or 11g Enterprise Manager See "To create a read-only database user account by using Oracle 10g or 11g Enterprise Manager"
By using Oracle 12c Enterprise Manager See "To create a read-only database user account by using Oracle 12c Enterprise Manager"
By using SQLPlus See "To create a read-only Oracle database user by using SQLPlus" See "To create a read-only Oracle database user by using SQLPlus"
To create a read-only database user account by using Oracle 10g or 11g Enterprise Manager
Log in to the Oracle database as a user that has permissions to create roles and users with Enterprise Manager.
On the Database Instance page, click the Administration tab.
Under the Users & Privileges heading, click Roles.
On the Roles page, click Create.
On the Create Role page, in the Name field, type a new role name. For example, ReadOnlyRole.
Click System Privileges, and then click Edit List.
In the Available System Privileges list, select the privilege named SELECT.
Do one of the following steps:
If Oracle Auditing is configured to use the Database Audit Trail, select the DBA_AUDIT_TRAIL view.
If Oracle Auditing is configured to use the XML Audit Trail, select the V_$XML_AUDIT_TRAIL view.
Click Move so that the privileges appear in the Selected System Privileges list.
Click OK, and then click OK again to create the role.
Click the link Database Instance:database_name.
On the Administration tab, under Users & Privileges, click Users.
Click Create.
On the Create User page, perform the following tasks in the order given:
In the Name field, type a user name. For example, READONLYUSER.
In the Profile field, leave the value as DEFAULT.
In the Authentication field, leave the value as PASSWORD.
In the Enter Password and Confirm Password fields, type a password and confirm it.
In the Default Tablespace field, type a default table space for the user. For example, USERS.
In the Temporary Tablespace field, type a temporary table space for the user. For example, TEMP.
Click Roles.
On the Roles page, click Edit List.
In the Available Role list, select the role that you created in step 1.
Click Move so that the role appears in the Selected Roles list.
Click OK, and then click OK again, to create the user with read-only access to the database tables.
To create a read-only database user account by using Oracle 12c Enterprise Manager
Log in to the Oracle database as a user that has permissions to create roles and users with Enterprise Manager.
On the Database Instance page, click the Security tab.
Under the Security heading, click Roles.
On the Roles page, click Create.
On the Create Role page, in the Name field, type a new role name. For example, ReadOnlyRole.
Click System Privileges, and then click Edit List.
In the Available System Privileges list, select the privilege named SELECT.
Do one of the following steps:
If Oracle Auditing is configured to use the Database Audit Trail, select the DBA view.
If Oracle Auditing is configured to use the XML Audit Trail, select the Audit_Viewer view.
Click Move so that the privileges appear in the Selected System Privileges list.
Click OK, and then click OK again to create the role.
Click the link Database Instance:database_name.
On the Security tab, under Users & Privileges, click Users.
Click Create.
On the Create User page, perform the following tasks in the order given:
In the Name field, type a user name. For example, READONLYUSER.
In the Profile field, leave the value as DEFAULT.
In the Authentication field, leave the value as PASSWORD.
In the Enter Password and Confirm Password fields, type a password and confirm it.
In the Default Tablespace field, type a default table space for the user. For example, USERS.
In the Temporary Tablespace field, type a temporary table space for the user. For example, TEMP.
Click Roles.
On the Roles page, click Edit List.
In the Available Role list, select the role that you created in step 1.
Click Move so that the role appears in the Selected Roles list.
Click OK, and then click OK again, to create the user with read-only access to the database tables.
For Oracle 12c Enterprise Manager the username should start with c## parameter, for example c##read_only_user.
To create a read-only Oracle database user by using SQLPlus
To start SQLPlus without logging in to a database, at a command prompt, type the following: sqlplus /nolog;
To connect as a system database administrator, at the SQLPlus prompt, type the following command: connect sys/password@SID as sysdba;
To create a read-only user, at the SQLPlus prompt, type the following commands: create user read_only_user identified by password; grant connect to read_only_user;
Do one of the following steps:
If Oracle Auditing is configured to use the Database Audit Trail, type the following command: grant select on DBA_AUDIT_TRAIL to read_only_role;
If Oracle Auditing is configured to use the XML Audit Trail, type the following command: grant select on V_$XML_AUDIT_TRAIL to read_only_user;
To grant select privileges for the database user, type the following commands: grant select on sys.aud$ to read_only_user; grant select on sys.system_privilege_map to read_only_user; grant select on sys.stmt_audit_option_map to read_only_user; grant select on sys.audit_actions to read_only_user;
Type the following commands: grant create session to read_only_user; grant read_only_user to read;
If readonly user did not belong to PUBLIC role or execute permisson on sys.utl_inaddr was revoked for PUBLIC, users need to have execute permission on sys.utl_inaddr. To grant select privileges for the database user, type the following SQLPlus commands: grant execute on sys.utl_inaddr to USER_RO; where USER_RO is read only user created for the collector.
To configure the ACL for Oracle to connect to the Database,
To Enable auditing in an Oracle database
In order for Oracle Database to work with the collector, you must complete the following procedures in the order shown:
Enable auditing in the Oracle database See "To enable auditing in the Oracle 10g database" See "To enable auditing in the Oracle 10g or 11g database" See "To enable auditing in the Oracle 10g, 11g, or 12c database"
Configure auditing for a database user account See "To configure auditing for an Oracle 10g, 11g, or 12c database user account"
Please consult your Oracle database administrator before you proceed with any Oracle-related procedures.
See "Installing collectors that use a database sensor"
To enable auditing in the Oracle 10g, 11g, or 12c database
On the Oracle computer, start SQLPlus without connecting to a database. Type the following command: sqlplus /nolog;
Connect to the database as a system database administrator. At the SQL prompt, type the following command: connect username/password@SID as sysdba;
Do one of the following steps:
To configure Oracle Auditing to use the Database audit trail , at the command prompt, type the following command: ALTER SYSTEM SET audit_trail=db,extended scope=SPFILE;
To configure Oracle Auditing to use the XML audit trail , at the command prompt, type the following command: ALTER SYSTEM SET audit_trail=xml,extended scope=SPFILE;
Shut down the database. Type the following command: SHUTDOWN immediate. When you use Windows, you can restart Oracle.
Restart by typing the following command: startup
For the Oracle 10g database, set up the audit events using the examples at the following Web site : http://www.oracle-base.com/articles/10g/Auditing_10gR2.php
For the Oracle 11g database, set up the audit events using the examples at the following Web site: http://docs.oracle.com/cd/E11882_01/server.112/e10575/tdpsg_auditing.htm
For the Oracle 12c database, set up the audit events using the examples at the following Web site: http://docs.oracle.com/database/121/DBSEG/audit_config.htm
To configure auditing for an Oracle 10g, 11g, or 12c database user account
At a command prompt, start SQLPlus without connecting to a database by typing the following command: sqlplus /nolog;
Connect to the database as a system database administrator. At the SQL prompt, type the following command: CONNECT user_name/password@SID as SYSDBA;
Configure auditing for the database user. At the SQL prompt, type the following commands: AUDIT ALL BY user_name BY ACCESS; AUDIT SELECT TABLE, CREATE TABLE, UPDATE TABLE, INSERT TABLE, DELETE TABLE BY user_name BY ACCESS; AUDIT EXECUTE PROCEDURE BY user_name BY ACCESS;
Sample event log of Oracle® Database device
An event example is as follows:
QUERYID|XMLAUDIT|TIMESTAMP|1256222734937|
ENTRYID|1|SESSIONID|0|STATEMENTID|0|OS_USERNAME|
DMIVA-CCS\Administrator|USERNAME|/|TERMINAL|DMIVA-CCS|
USERHOST|SCOM\DMIVA-CCS|OBJ_NAME|null|OWNER|null|
OS_PRIVILEGE|SYSDBA|OBJ_PRIVILEGE|null|ACTION_NAME|
UNKNOWN|ACTION|0|GRANTEE|null|RETURNCODE|0|PRIV_USED|0|
CLIENT_ID|null|ECONTEXT_ID|null|PROXY_SESSIONID|0|
GLOBAL_UID|null|INSTANCE_NUMBER|0|OS_PROCESS|3728:1528|
TRANSACTIONID|null|SCN|0|SES_ACTIONS|null|DST_IP
|169.254.13.3|DST_HOST|DMIVA-CCS|COMMENT_TEXT|null
|SQL_TEXT|CONNECT|SQL_BIND|null
Creating New Request for Monitoring
Once the device is configured as outlined in the steps above and all network pre-requisites have been made, you are now ready to onboard it for MDR monitoring. To complete this process, submit a New Request via the MDR Portal at https://mss.accenture.com/. This new request should contain the following information:
Reporting LCP Hostname/IP Address:
Database Hostname/IP Address and Database port:
User Name (Read-only):
Password:
If you have any questions about this process, please contact your Onboarding Engineer or Service Manager.
LCP Configuration Parameters
Table 1-1: The Oracle Database event collector (DB - 3465) properties to be configured by MDR are shown in the table.
Property | Default Value | Description |
Database URL | jdbc:oracle:thin:@<host IP>:<port>:<SID> OR jdbc:oracle:thin:@//<IP/HOST>:<port>/<Service_Name> | Example: jdbc:oracle:thin:@1.2.3.4:1521:orcl OR Ex : jdbc:oracle:thin:@//1.1.1.1:1521/orcl [where 1.1.1.1 -> Host IP , 1521 -> DB Connection Port and orcl -> Service Name] NOTE : We are now supporting the connection string with service_name to connect to DB . Both connection strings [<SID> and <service_name>] will work irrespective of DB versions. |
UserName | Custom Value | The username for the database account mentioned in the Pre-Installation Questionnaire (PIQ). |
Password | Custom Value | The password for the database account mentioned in the PIQ |
Related content
Legal Notice
Copyright © 2021 Accenture. All rights reserved.
Accenture, the Accenture Logo, and DeepSight Intelligence are trademarks or registered trademarks of Accenture in the U.S. and other countries. Other names may be trademarks of their respective owners.
The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Accenture and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. ACCENTURE SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq. "Commercial Computer Software and Commercial Computer Software Documentation," as applicable, and any successor regulations, whether delivered by Accenture as on premises or hosted services. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.