The secure access to data is a very important issue that any organization should implement and not neglect. In an environment of “Oracle Exadata Database Machine ” is well known that you have multiple servers, each dedicated to instances of database ( Database Servers) and others dedicated to information storage (Storage Servers) , for example, a “Half Rack” has 4 database servers and 7 storage servers , this leads to the questions: What database servers can access which storage servers ? What Clusters ASM can access which disks ? Well, that’s the goal of this article, delve a little deeper into the broad way that every Oracle DBA must travel data and thus get to know how security is implemented within “Oracle Exadata Database Machine ” .

Read More