The secure access to data is a very important issue that any organization should implement and not neglect. In an environment of “Oracle Exadata Database Machine ” is well known that you have multiple servers, each dedicated to instances of database ( Database Servers) and others dedicated to information storage (Storage Servers) , for example, a “Half Rack” has 4 database servers and 7 storage servers , this leads to the questions: What database servers can access which storage servers ? What Clusters ASM can access which disks ? Well, that’s the goal of this article, delve a little deeper into the broad way that every Oracle DBA must travel data and thus get to know how security is implemented within “Oracle Exadata Database Machine ” .
Oracle Exadata Database Machine : ASM level security and Base Data (Part 1)
About the Author: yvravikumar
Ravikumar has nearly two decades of experience in the industry and has spent most of his career in architecting, designing, implementing and maintaining enterprise and world class database solutions. He is a well known Oracle technology expert and is an Oracle Certified Master (OCM) & Oracle ACE. His in-depth knowledge and hands on experience in Databases, Operating systems and enterprise applications has helped leading organizations successfully implement and run efficient and well-designed data centric technology. He continuously trains, mentors and motivates budding DBA’s. He is an expert trainer and a consultant on latest database technologies. He is a co-founder of OraWorld and is a regular speaker at OTN Yathra and an active member of AIOUG. For More Details: Oracle ACE Oracle Certified Master (OCM) Co-Founder Of Oraworld-team