Databases Reference
In-Depth Information
12-3. Configuring ASM-Scoped Security
Problem
You wish to restrict access to Exadata grid disks to specific Oracle ASM instances or Grid Infrastructure clusters.
Solution
In this recipe, you will learn how to configure ASM-scoped security on Exadata to allow or restrict ASM instances
to and from access specific Exadata grid disks. Figure 12-1 shows an example of ASM-scoped security in which
the Oracle cluster on the first two compute nodes for the QA database is restricted to three Exadata cells and the
production cluster on the other two compute nodes is restricted to four Exadata cells.
Figure 12-1. ASM-scoped security on Exadata
1.
Query the db_unique_name from one of your Oracle ASM instances:
[grid@cm01dbm01 ~]$ sqlplus /nolog
SQL*Plus: Release 11.2.0.3.0 Production on Sat Oct 13 01:14:16 2012
Copyright (c) 1982, 2011, Oracle. All rights reserved.
SQL> conn / as sysasm
Connected.
SQL> show parameter unique
NAME TYPE VALUE
------------------------------------ ----------- ------------------------------
db_unique_name string +ASM
SQL>
 
Search WWH ::




Custom Search