Oracle's Enterprise User Security (EUS) enables you to store user identities in LDAP-compliant directory service for Oracle Database authentication.
Enterprise User Security enables you to centrally manage database users across the enterprise. Enterprise users are created in LDAP-compliant directory service, and can be assigned roles and privileges across various enterprise databases registered with the directory.
Users connect to Oracle Database by providing credentials that are stored in Oracle Unified Directory. The database executes LDAP search operations to query user specific authentication and authorization information.
Here are steps to troubleshoot EUS when the "Invalid username/password; login denied" is reported to DB users by EUS:
First, this error is reported in 2 cases:
- the DB is not able to find a LDAP user that corresponds to the provided name on the DB side,
- the user password is invalid.
Assuming the password is correct, follow the procedure below to identify the root cause:#1 Check EUS configuration
The database reads its configuration from the entry cn=common,cn=products,cn=oraclecontext,$BASEDN:
location of users and groups is configured in the attributes
orclcommonusersearchbase and orclusercommongroupsearchbase. They are
referred to as users and groups containers.
username supplied to sqlplus must correspond to the value of
orclcommonnicknameattribute in the user entry. For instance, if I
connect to sqlplus using sqlplus joe/password, and
orclcommonnicknameattribute=uid, then the database will look for an
entry containing the attribute uid=joe.
user entry DN must start with orclcommonnamingattribute. For instance,
if orclcommonnamingattribute=cn, the user entry must be
You can read the configuration using the following command:
$ OracleUnifiedDirectory/bin/ldapsearch -h $LDAPSERVER -p $PORT -b cn=common,cn=products,cn=oraclecontext,$BASEDN "(objectclass=*)" orclcommonusersearchbase orclcommongroupsearchbase orclcommonnicknameattribute orclcommonnamingattribute
#2 Check the User Entry
You must ensure that there is an LDAP entry in the user container that matches the username supplied by SQL+. Target LDAP entry must be an instance of inetorgperson and contain the attribute defined in orclcommonnicknameattribute:
$ OracleUnifiedDirectory/bin/ldapsearch -h $LDAPSERVER -p $PORT -D $DN -w $PWD -b ou=people,$BASEDN "(uid=joe)"
#3 Check the User-schema mappings
If the user entry exists and can be read by the database entry, the problem can be that there is no user-schema mapping. EUS maps the LDAP user entry to a database schema following a mapping rule that is defined in Enterprise Manager console. The mapping associates either a user DN to a schema or all users of a subtree to a schema. It can be defined at the domain level or at the database level.
#4 Check the global schema associated with the user
If there is a user-schema mapping, ensure that the schema has the CONNECT privilege.
The global schema was defined using the following commands:
SQL> CREATE USER global_ident_schema_user IDENTIFIED GLOBALLY;
SQL> GRANT CONNECT TO global_ident_schema_user;