FILE This argument sets the name of the password file being created. Caution: It is critically important to the security of your system that you protect your password file and the environment variables that identify the location of the password file. Any user with access to these could potentially compromise the security of the connection.
Caution: When you exceed the allocated number of password entries, you must create a new password file. To avoid this necessity, allocate a number of entries that is larger than you think you will ever need. This option is useful if you are administering multiple databases or an Oracle RAC database.
An error message is issued if you attempt to do so. Delete the existing password file. Follow the instructions in "Adding Users to a Password File".
All rights reserved. Book List. Master Index. Contact Us. Use one of the following options to create a password file for the auxiliary instance on the destination host:. The following example creates a password file in the RMAN copies the source database password file to the destination host and overwrites any existing password file for the auxiliary instance.
SID identifies the database instance. Viewing and Hiding the Password File Use this procedure to make the password file visible or invisible from different locations. Using Command Prompt. Using Windows Explorer. Select Properties. Click OK. To view or hide an invisible password file:. If you supply only filename, the file is written to the current directory. The contents are encrypted and are unreadable. This argument is mandatory. The filenames allowed for the password file are OS-specific.
Some operating systems require the password file to adhere to a specific format and be located in a specific directory.
0コメント