There are
several options to create users on Autonomous Database. You can use Oracle Database Actions Database Users card or
use client-side tools that connect to the database to create database
users.
About User Passwords on Autonomous Database Autonomous Database requires strong passwords; the password you specify for a user must meet the minimum default password complexity rules.
Manage the Administrator Account on Autonomous Database The administrator user for Autonomous Database is ADMIN, and this administrator account has several system privileges granted to be able to manage users and other areas of the database.
Click the top left next to Oracle Database Actions.
This shows the Database Actions
menu, including
Development,
Data Studio,
Administration,
Downloads,
Monitoring, and
Related Services.
Under Administration click
Database Users.
On the Database Users page, in the All Users area click
+ Create User.
To create a new user, enter a user name, a password,
and enter the password again to confirm the
password. Also select any options you want to
enable for the user: Graph,
OML, or Web
Access.
The administrator needs to provide the credentials
wallet to the new user for client-side access. See Connect to Autonomous Database
for more information on client-side access credentials.
Note
Autonomous Database requires strong passwords; the
password you specify must meet the default password
complexity rules. See About User Passwords on Autonomous Database for more information.
The administrator needs to provide
the credentials wallet to the user
new_user. See Connect to Autonomous Database
for more information on client credentials.
Note
Autonomous Database requires strong passwords; the
password you specify must meet the default password
complexity rules. See About User Passwords on Autonomous Database for more information.
Autonomous Database requires strong passwords; the
password you specify for a user must meet the minimum default password complexity
rules.
Autonomous Database sets minimum
standards for passwords, and the default profile sets parameters to limit the number of
failed login attempts.
The password must be between 12 and 30 characters long and must
include at least one uppercase letter, one lowercase letter, and one numeric
character.
Note, the password limit is shown as 60 characters in some help
tooltip popups. Limit passwords to a maximum of 30 characters.
The password cannot contain the username.
The password cannot be one of the last four passwords used for the
same username.
The password cannot contain the double quote (") character.
The password must not be the same password that is set less than 24
hours ago.
To change the password complexity rules and password parameter values you
can alter the default profile or create a new profile and assign it to users. See Manage User Profiles with Autonomous Database for more information.
The following are the Autonomous Database default profile password parameter values:
Password Parameter
Description
Value
FAILED_LOGIN_ATTEMPTS
The maximum times a user can try to log in and fail before locking
the account. This limit applies for regular database user accounts.
10
PASSWORD_GRACE_TIME
The number of days after the grace period begins during
which a warning is issued and login is allowed.
30
PASSWORD_LIFE_TIME
The number of days the same password can be used for
authentication.
360
PASSWORD_LOCK_TIME
The number of days an account will be locked after the
specified number of consecutive failed login attempts.
1
PASSWORD_REUSE_MAX
The number of password changes required before the
current password can be reused.
4
PASSWORD_REUSE_TIME
The number of days before which a password cannot be
reused.
Manage the Administrator Account on Autonomous Database 🔗
The
administrator user for Autonomous Database is
ADMIN, and this administrator account has several system privileges granted to be
able to manage users and other areas of the database.
You can change the administrator user (ADMIN)
password and when locked, unlock the administrator user account on Autonomous Database. When you use
the APIs to create an Autonomous Database or to reset the ADMIN password, you can optionally use an Oracle Cloud Infrastructure Vault secret to store the password.
Perform the following prerequisite steps as necessary:
Open the Oracle Cloud
Infrastructure Console by clicking the next to Oracle Cloud.
From the Oracle
Cloud Infrastructure left navigation menu click
Oracle Database and then,
depending on your workload click one of: Autonomous Data
Warehouse,
Autonomous JSON Database, or Autonomous Transaction
Processing.
On the Autonomous Databases page
select an Autonomous Database from the links under the Display
name column.
Use the following steps to unlock the ADMIN account by updating the ADMIN password:
On the Details page, from the More actions drop-down list, select Administrator password.
On the Administrator password enter the new password and confirm.
Click Change.
This operation unlocks the ADMIN
account if it was locked.
Use Oracle Cloud Infrastructure Vault Secret for ADMIN Password
🔗
When you create or clone an Autonomous Database instance or when you reset the
ADMIN password, you can use an Oracle Cloud
Infrastructure vault secret to specify the ADMIN password.
Autonomous Database allows you to use the APIs to
provide a protected vault secret as the ADMIN password, with secure access to the vault
secret granted through Oracle Cloud
Infrastructure IAM policies.
Note
Using an Oracle Cloud
Infrastructure vault secret for the ADMIN password is only supported with the APIs.
Oracle Cloud Infrastructure Vault secrets are credentials that you use with Oracle Cloud
Infrastructure services. Storing secrets in a vault provides greater security than you might
achieve storing them elsewhere, such as in code or in configuration files. By
calling database APIs you can use secrets from the Vault Service to set the ADMIN
password. The vault secret password option is available when you create or clone an
Autonomous Database instance, or when you
set or reset the ADMIN password.
You create secrets using the Oracle Cloud
Infrastructure Console, CLI, or API.
Notes for using a vault secret to set or reset the ADMIN password:
In order for Autonomous Database to reach the secret in a vault, the following conditions
must apply:
The secret must be in current or
previous state.
If you specify a secret version in the API call, the specified
secret version is used. If you do not specify a secret version,
the call uses the latest secret version.
You must have the proper user group policy that
allows READ access to the specific secret in a
given compartment. For example:
Allow userGroup1 to read secret-bundles in compartment training
The password stored in the secret must conform to Autonomous Database password
requirements.