{"id":7424,"date":"2020-09-02T14:55:48","date_gmt":"2020-09-02T12:55:48","guid":{"rendered":"https:\/\/www.oradba.ch\/?p=7424"},"modified":"2020-09-02T15:01:32","modified_gmt":"2020-09-02T13:01:32","slug":"trivadis-lab-simple-vagrant-setup-of-windows-ad-server","status":"publish","type":"post","link":"https:\/\/www.oradba.ch\/wordpress\/2020\/09\/trivadis-lab-simple-vagrant-setup-of-windows-ad-server\/","title":{"rendered":"Trivadis LAB: Simple Vagrant Setup of Windows AD Server"},"content":{"rendered":"\n<p>One of my biggest problems when I started to look into Kerberos Authentication, Oracle Centrally Managed Users as well Oracle Enterprise User Security was the availability of an Active Directory to setup test cases. It is usually not the core business of an Oracle DBA to configure an Active Directory server. \ud83d\ude42 Using the productive AD is generally not a good choice either. One day I set up a Virtualbox VM with Windows 2016 and Active Directory. Great, but the VM went the way that many test VMs go and got screwed up. Set up a VM from scratch is cumbersome and time consuming. In particular when you would have to do it regular. Just doing backup and snapshot does work, but does not help to share the VMs with colleagues. Besides that the disk space on my notebook is limited. Then I did started to look into Vagrant. Then I did started to look into Vagrant. Not only for Oracle Database VMs but also for my Active Directory server. I have successfully used this environment in the past for several lectures and trainings at SOUG, DOAG and AOUG.<\/p>\n\n\n\n<p>The aim of this blog post is to introduce the Trivadis LAB environment. In particular, the vagrant based setup of the Windows Server for Active Directory. I will discuss some basic steps to create such a VM, but also a few configuration details so that you can use it in your own engineering project. I myself use the Windows VM together with DB VMs (<em><a href=\"https:\/\/github.com\/oehrlis\/trivadislabs.com\" target=\"_blank\" rel=\"noopener noreferrer\">oehrlis\/trivadislabs.com<\/a><\/em>) but also with my Docker based engineering environment (<em><a href=\"https:\/\/github.com\/oehrlis\/doe\" target=\"_blank\" rel=\"noopener noreferrer\">oehrlis\/doe<\/a><\/em>). So lets get ready to rumble&#8230;<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Trivadis LAB Environment<\/h1>\n\n\n\n<p>As you can see in the following figure, the entire Trivadis LAB environment contains VMs for Oracle databases and Oracle Unified Directory in addition to the VM for Active Directory. However, these are not included in this blog post. We just focus on Windows.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.oradba.ch\/wordpress\/wp-content\/uploads\/LabEnvironment-2.png?w=625&#038;ssl=1\" alt=\"LabEnvironment\" title=\"LabEnvironment.png\"\/><figcaption>Trivadis LAB Environment<\/figcaption><\/figure>\n\n\n\n<p>To allow a more or less practical use of the directory, a simple structure was created for the fictitious company <em>Trivadis LAB<\/em>. The following graphic shows the organisation chart including departments and employees for <em>Trivadis LAB<\/em>. All the users listed can be used as test users. The login name corresponds to the last name in lower case. The password for all users is set to a default password (see configuration files)<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.oradba.ch\/wordpress\/wp-content\/uploads\/Trivadislabs_Company.png?w=625&#038;ssl=1\" alt=\"Trivadislabs Company\" title=\"Trivadislabs_Company.png\"\/><figcaption>Organisation Chart Trivadis LAB<\/figcaption><\/figure>\n\n\n\n<p>The fictitious company has the following departments: <\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><thead><tr><th>id<\/th><th><strong>DEPARTMENT<\/strong><\/th><th><strong>DISTINGUISHED NAME (DN)<\/strong><\/th><\/tr><\/thead><tbody><tr><td>10<\/td><td>Senior Management<\/td><td><em>ou=Senior Management,ou=People,dc=trivadislabs,dc=com<\/em><\/td><\/tr><tr><td>20<\/td><td>Accounting<\/td><td><em>ou=Accounting,ou=People,dc=trivadislabs,dc=com<\/em><\/td><\/tr><tr><td>30<\/td><td>Research<\/td><td><em>ou=Research,ou=People,dc=trivadislabs,dc=com<\/em><\/td><\/tr><tr><td>40<\/td><td>Sales<\/td><td><em>ou=Sales,ou=People,dc=trivadislabs,dc=com<\/em><\/td><\/tr><tr><td>50<\/td><td>Operations<\/td><td><em>ou=Operations,ou=People,dc=trivadislabs,dc=com<\/em><\/td><\/tr><tr><td>60<\/td><td>Information Technology<\/td><td><em>ou=Information Technology,ou=People,dc=trivadislabs,dc=com<\/em><\/td><\/tr><tr><td>70<\/td><td>Human Resources<\/td><td><em>ou=Human Resources,ou=People,dc=trivadislabs,dc=com<\/em><\/td><\/tr><\/tbody><\/table><figcaption>Trivadis LAB Departments<\/figcaption><\/figure>\n\n\n\n<p>The following groups were defined: <\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><thead><tr><th><strong>GROUP<\/strong><\/th><th>DISTINGUISHED NAME (DN)<\/th><th><strong>DESCRIPTION<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Trivadis LAB APP Admins<\/td><td><em>ou=Trivadis LAB APP Admins,ou=Groups,dc=trivadislabs,dc=com<\/em><\/td><td>Application administrators<\/td><\/tr><tr><td>Trivadis LAB DB Admins<\/td><td><em>ou=Trivadis LAB DB Admins,ou=Groups,dc=trivadislabs,dc=com<\/em><\/td><td>DB Admins from the IT department<\/td><\/tr><tr><td>Trivadis LAB Developers<\/td><td><em>ou=Trivadis LAB Developers,ou=Groups,dc=trivadislabs,dc=com<\/em><\/td><td>Developers from the research department<\/td><\/tr><tr><td>Trivadis LAB Management<\/td><td><em>ou=Trivadis LAB Management,ou=Groups,dc=trivadislabs,dc=com<\/em><\/td><td>Management and managers<\/td><\/tr><tr><td>Trivadis LAB System Admins<\/td><td><em>ou=Trivadis LAB System Admins,ou=Groups,dc=trivadislabs,dc=com<\/em><\/td><td>System Admins from the IT department<\/td><\/tr><tr><td>Trivadis LAB Users<\/td><td><em>ou=Trivadis LAB Users,ou=Groups,dc=trivadislabs,dc=com<\/em><\/td><td>All Users<\/td><\/tr><tr><td>Trivadis LAB HR<\/td><td><em>ou=Trivadis LAB HR,ou=Groups,dc=trivadislabs,dc=com<\/em><\/td><td>Human Resources<\/td><\/tr><\/tbody><\/table><figcaption>Trivadis LAB Groups<\/figcaption><\/figure>\n\n\n\n<h1 class=\"wp-block-heading\">Prerequisites<\/h1>\n\n\n\n<p>The vagrant projects in <a rel=\"noopener noreferrer\" href=\"https:\/\/github.com\/oehrlis\/trivadislabs.com\" target=\"_blank\">oehrlis\/trivadislabs.com<\/a> do require Vagrant and Window Server Virtualbox.<\/p>\n\n\n<ol>\n<li>Install <a href=\"https:\/\/www.virtualbox.org\/wiki\/Downloads\" target=\"_blank\" rel=\"noopener noreferrer\">Oracle VM VirtualBox<\/a><\/li>\n<li>Install <a href=\"https:\/\/vagrantup.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Vagrant<\/a><\/li>\n<\/ol>\n\n\n<p>The first time you provision a Windows Server VM, the basis Vagrant Box is loaded from the Vagrant Cloud, which may take a while. If preferred, you can download this VM in advance with Vagrant. Enclosed the example for Windows Server 2019 <\/p>\n\n\n\n<pre class=\"wp-block-code\"><code class=\"\">vagrant box add StefanScherer\/windows_2019 --provider virtualbox<\/code><\/pre>\n\n\n\n<h1 class=\"wp-block-heading\">Setup<\/h1>\n\n\n\n<p>Setup of the Vagrant VM is straight forward. You have to decide if you would like to setup a Windows Server 2019 (<em>win2019ad<\/em>) or Windows Server 2016 (<em><a rel=\"noreferrer noopener\" href=\"https:\/\/github.com\/oehrlis\/trivadislabs.com\/tree\/master\/win2016ad\" target=\"_blank\">win2019ad<\/a><\/em>). The steps below are for Windows Server 2019.<\/p>\n\n\n<ol>\n<li>Clone this repository <em>git clone https:\/\/github.com\/oehrlis\/trivadislabs.com<\/em><\/li>\n<li>Adjust configuration in <em>trivadislabs.com\/<\/em><em>common\/config\/vagrant.yml<\/em><\/li>\n<li>Change into the <em>trivadislabs.com\/win2019ad<\/em> directory<\/li>\n<li>Run <em>vagrant up<\/em>\n<ol>\n<li>The first time you run this it will provision everything and may take a while (20-40min). Ensure you have a good internet connection as the scripts will download a couple of tools via <a href=\"https:\/\/chocolatey.org\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Chocolatey<\/em><\/a>.<\/li>\n<li>The installation can be customised, if desired (see below).<\/li>\n<\/ol>\n<\/li>\n<li>Connect to the VM using <em>vagrant rdp<\/em> as <em>vagrant<\/em> or <em>administrator<\/em> user. Default password is either store in <a href=\"https:\/\/github.com\/oehrlis\/trivadislabs.com\/blob\/master\/common\/config\/vagrant.yml\" target=\"_blank\" rel=\"noopener noreferrer\">vagrant.yml<\/a> or <a href=\"https:\/\/github.com\/oehrlis\/trivadislabs.com\/blob\/master\/common\/config\/default_pwd_windows.txt\" target=\"_blank\" rel=\"noopener noreferrer\">default_pwd_windows.txt<\/a>.<\/li>\n<li>If necessary, run the Windows Update manually.<\/li>\n<li>You can shut down the VM via the usual <em>vagrant halt<\/em> and then start it up again via <em>vagrant up<\/em><\/li>\n<\/ol>\n\n\n<p>Enclosed an excerpt from the <em>vagrant up<\/em> command:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code class=\"\">user@host:~\/trivadislabs.com\/win2019ad\/ [ic19300] time vagrant up\nBringing machine 'win2019ad' up with 'virtualbox' provider...\n==> win2019ad: Importing base box 'StefanScherer\/windows_2019'...\n==> win2019ad: Matching MAC address for NAT networking...\n==> win2019ad: Checking if box 'StefanScherer\/windows_2019' version '2020.07.17' is up to date...\n==> win2019ad: Setting the name of the VM: win2019ad.trivadislabs.com\n==> win2019ad: Clearing any previously set network interfaces...\n==> win2019ad: Preparing network interfaces based on configuration...\n    \n...\n\n    win2019ad: This Computer SID is S-1-5-21-1473420208-2468469534-\n    win2019ad: =========================================================\n    win2019ad:  Successfully finish setup AD VM \n    win2019ad:   Host      : win2019ad\n    win2019ad:   Domain    : trivadislabs.com\n    win2019ad: =========================================================\n\nreal\t34m7.109s\nuser\t1m4.814s\nsys\t0m32.222s<\/code><\/pre>\n\n\n\n<h1 class=\"wp-block-heading\">Configuration<\/h1>\n\n\n\n<p>The <em>Vagrantfile<\/em> is preconfigured for the Trivadis LAB domain. I.e. host name, domain name, user etc. are predefined. Generally there is no need to adjust the Vagrant file itself. To ensure that all VMs in Trivadis LAB always work with the same configurations, a central YAML file is used for Vagrant. The file is locate in common\/config\/vagrant.yml. For the Window VM you find the following configuration:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code lang=\"yaml\" class=\"language-yaml\"># Configuration valid for all VM's\ncommon:\n  default_password: LAB01schulung\n  domain_name: trivadislabs.com\n  company_name: Trivadis LAB\n  gateway: 10.0.0.1\n  dns: 10.0.0.4\n  public_dns1: 8.8.8.8\n  public_dns2: 4.4.4.4\n\n# Configuration valid for Windows 2019 AD server\nwin2019ad:\n  box: StefanScherer\/windows_2019\n  vm_name: win2019ad\n  domain_mode: WinThreshold\n  people_ou_name: People\n  groups_ou_name: Groups\n  mem_size: 2048\n  cpus: 1\n  public_ip: 10.0.0.4<\/code><\/pre>\n\n\n\n<p>A short explanation of the settings and possibilities:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>common<\/strong> YAML common section<\/li><li><strong>win2019ad<\/strong> YAML section for Windows Server 2019<\/li><li><strong>default_password<\/strong> Password used to initialise the AD Server. It is recommended to change this as soon as possible. Default is <em>LAB01schulung<\/em><\/li><li><strong>domain_name<\/strong> Network domain name for the environment. Depending on this, the directory tree in AD and the AD domain itself is named. Default value is <em>trivadislabs.com<\/em><\/li><li><strong>company_name<\/strong> Company Name for the Trivadis LAB. This is used to name the AD groups.<\/li><li><strong>network configuration<\/strong> for gateway (10.0.0.1), dns (10.0.0.4), public_dns1 (8.8.8.8), public_dns2 (4.4.4.4)<\/li><li><strong>box<\/strong> the base Vagrant box used to setup the VM<\/li><li><strong>vm_name<\/strong> Name of the VM win2019ad<\/li><li><strong>domain_mode<\/strong> Active Directory domain mode <\/li><li><strong>people_ou_name<\/strong> Active Directory OU for the users<\/li><li><strong>groups_ou_name<\/strong> Active Directory OU for the groups<\/li><li><strong>mem_size<\/strong> Memory size for the VM<\/li><li><strong>cpus<\/strong> Number of CPUs for the VM<\/li><li><strong>public_ip<\/strong> Public IP address of the VM<\/li><\/ul>\n\n\n\n<p>The different scripts use the settings for initialising the AD server. So it is possible to change the AD domain, host domain name etc. <\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Access<\/h1>\n\n\n\n<p>There are several option to access the VM. You either can directly start the Console on Virtualbox. If you run the VM in headless mode you will either run <em>vagrant rdp<\/em> or use Microsoft Remote Desktop directly. Running <em>vagrant rdp<\/em> finally starts only Microsoft Remote Desktop as well.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.oradba.ch\/wordpress\/wp-content\/uploads\/rdp_win2019ad.png?resize=362%2C416&#038;ssl=1\" alt=\"\" class=\"wp-image-7433\" width=\"362\" height=\"416\" srcset=\"https:\/\/i0.wp.com\/www.oradba.ch\/wordpress\/wp-content\/uploads\/rdp_win2019ad.png?resize=890%2C1024&amp;ssl=1 890w, https:\/\/i0.wp.com\/www.oradba.ch\/wordpress\/wp-content\/uploads\/rdp_win2019ad.png?resize=261%2C300&amp;ssl=1 261w, https:\/\/i0.wp.com\/www.oradba.ch\/wordpress\/wp-content\/uploads\/rdp_win2019ad.png?resize=768%2C883&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.oradba.ch\/wordpress\/wp-content\/uploads\/rdp_win2019ad.png?resize=624%2C718&amp;ssl=1 624w, https:\/\/i0.wp.com\/www.oradba.ch\/wordpress\/wp-content\/uploads\/rdp_win2019ad.png?w=946&amp;ssl=1 946w\" sizes=\"auto, (max-width: 362px) 100vw, 362px\" \/><figcaption>Remote Desktop Configuration for win2019ad<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"625\" height=\"400\" src=\"https:\/\/i0.wp.com\/www.oradba.ch\/wordpress\/wp-content\/uploads\/rdp_win2019ad-1.png?resize=625%2C400&#038;ssl=1\" alt=\"\" class=\"wp-image-7434\" srcset=\"https:\/\/i0.wp.com\/www.oradba.ch\/wordpress\/wp-content\/uploads\/rdp_win2019ad-1.png?resize=1024%2C656&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.oradba.ch\/wordpress\/wp-content\/uploads\/rdp_win2019ad-1.png?resize=300%2C192&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.oradba.ch\/wordpress\/wp-content\/uploads\/rdp_win2019ad-1.png?resize=768%2C492&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.oradba.ch\/wordpress\/wp-content\/uploads\/rdp_win2019ad-1.png?resize=1536%2C984&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.oradba.ch\/wordpress\/wp-content\/uploads\/rdp_win2019ad-1.png?resize=2048%2C1312&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.oradba.ch\/wordpress\/wp-content\/uploads\/rdp_win2019ad-1.png?resize=624%2C400&amp;ssl=1 624w, https:\/\/i0.wp.com\/www.oradba.ch\/wordpress\/wp-content\/uploads\/rdp_win2019ad-1.png?w=1250&amp;ssl=1 1250w, https:\/\/i0.wp.com\/www.oradba.ch\/wordpress\/wp-content\/uploads\/rdp_win2019ad-1.png?w=1875&amp;ssl=1 1875w\" sizes=\"auto, (max-width: 625px) 100vw, 625px\" \/><figcaption>Microsoft Remote Desktop Session on win2019ad<\/figcaption><\/figure>\n\n\n\n<p>From here the environment is ready for all kinds of engineering. Depending on what you want to do, you may need some customisation, e.g. creating service users, generating keytab files, installing the Oracle password filter etc.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Behind the scenes<\/h1>\n\n\n\n<p>Setting up ad Active Directory server cannot be done in one swing. You need several steps and server reboot. Therefore the configuration is divided into different PowerShell scripts. The following list gives an overview of the different scripts. They are executed in the listed sequence. After the script <a rel=\"noreferrer noopener\" href=\"https:\/\/github.com\/oehrlis\/trivadislabs.com\/blob\/master\/common\/scripts\/22_install_chocolatey.ps1\" target=\"_blank\">22_install_chocolatey.ps1<\/a> and <a rel=\"noreferrer noopener\" href=\"https:\/\/github.com\/oehrlis\/trivadislabs.com\/blob\/master\/common\/scripts\/27_config_cmu.ps1\" target=\"_blank\">27_config_cmu.ps1<\/a> the VM is restarted by Vagrant.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a rel=\"noreferrer noopener\" href=\"https:\/\/github.com\/oehrlis\/trivadislabs.com\/blob\/master\/common\/scripts\/21_install_ad.ps1\" target=\"_blank\">21_install_ad.ps1<\/a> PowerShell script to install Active Directory server role<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/github.com\/oehrlis\/trivadislabs.com\/blob\/master\/common\/scripts\/22_install_chocolatey.ps1\" target=\"_blank\">22_install_chocolatey.ps1<\/a> PowerShell script to install Chocolatey package manager<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/github.com\/oehrlis\/trivadislabs.com\/blob\/master\/common\/scripts\/23_config_ad.ps1\" target=\"_blank\">23_config_ad.ps1<\/a> PowerShell script to configure Active Directory<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/github.com\/oehrlis\/trivadislabs.com\/blob\/master\/common\/scripts\/11_config_dns.ps1\" target=\"_blank\">24_config_dns.ps1<\/a> PowerShell script to configure DNS server<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/github.com\/oehrlis\/trivadislabs.com\/blob\/master\/common\/scripts\/25_config_ca.ps1\" target=\"_blank\">25_config_ca.ps1<\/a> PowerShell script to configure Certification Autority<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/github.com\/oehrlis\/trivadislabs.com\/blob\/master\/common\/scripts\/26_install_tools.ps1\" target=\"_blank\">26_install_tools.ps1<\/a> PowerShell script to install tools via chocolatey package<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/github.com\/oehrlis\/trivadislabs.com\/blob\/master\/common\/scripts\/27_config_cmu.ps1\" target=\"_blank\">27_config_cmu.ps1<\/a> PowerShell script to configure CMU on Active Directory<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/github.com\/oehrlis\/trivadislabs.com\/blob\/master\/common\/scripts\/28_config_misc.ps1\" target=\"_blank\">28_config_misc.ps1<\/a> PowerShell script to configure NAT zone records for AD domain<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/github.com\/oehrlis\/trivadislabs.com\/blob\/master\/common\/scripts\/29_sum_up_ad.ps1\" target=\"_blank\">29_sum_up_ad.ps1<\/a> PowerShell script to display a summary of Active Directory Domain and install Windows updates<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/github.com\/oehrlis\/trivadislabs.com\/blob\/master\/common\/scripts\/reset_ad_users.ps1\" target=\"_blank\">reset_ad_users.ps1<\/a> PowerShell script to reset all domain user password. This script is not executed automatically.<\/li><\/ul>\n\n\n\n<h1 class=\"wp-block-heading\">Conclusion<\/h1>\n\n\n\n<p>It took some effort to prepare the environment. Nevertheless, the effort was worth it. I was quite happy to have a Test AD at hand in some projects. Testing Oracle Enterprise User Security, Oracle Centrally Manage Users or Kerberos is not possible without an Active Directory server. In particular if you like to test the Oracle Passwort Filter for Active Directory. But this will be an other blog post.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of my biggest problems when I started to look into Kerberos Authentication, Oracle Centrally Managed Users as well Oracle Enterprise User Security was the availability of an Active Directory to setup test cases. It is usually not the core business of an Oracle DBA to configure an Active Directory server. \ud83d\ude42 Using the productive [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[154,175,142,11],"tags":[202,18,111,203,204,201],"class_list":["post-7424","post","type-post","status-publish","format-standard","hentry","category-enterprise-user-security","category-howto","category-oud","category-security","tag-active-directory","tag-trivadiscontent","tag-tvdsecexpert","tag-vagrant","tag-virtualbox","tag-windows"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p1aErb-1VK","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":2674,"url":"https:\/\/www.oradba.ch\/wordpress\/2018\/07\/doag-2018-sig-security-oracle-unified-directory-on-docker\/","url_meta":{"origin":7424,"position":0},"title":"DOAG 2018 SIG Security &#8211; Oracle Unified Directory on Docker","author":"Stefan","date":"4. July 2018","format":false,"excerpt":"A couple of days ago I did had the opportunity to give a presentation on Oracle Unified Directory on Docker at the DOAG SIG Security day in Stuttgart. It was a great opportunity to discuss how OUD engineering can be simplified using Docker. As proof how easy this can be,\u2026","rel":"","context":"In &quot;DOAG&quot;","block_context":{"text":"DOAG","link":"https:\/\/www.oradba.ch\/wordpress\/category\/doag\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.oradba.ch\/wordpress\/wp-content\/uploads\/IMG_1575-300x225.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":3140,"url":"https:\/\/www.oradba.ch\/wordpress\/2019\/07\/oracle-cpu-psu-advisory-july-2019\/","url_meta":{"origin":7424,"position":1},"title":"Oracle CPU \/ PSU Advisory July 2019","author":"Stefan","date":"17. July 2019","format":false,"excerpt":"Recently, just in the middle of the summer holidays, Oracle has released the third Critical Patch Advisory for its products. It seems there's a lot of work going on in Redwood Shore. Oracle has fixed about 319 security vulnerabilities across their products. The Oracle database is relatively prominently represented with\u2026","rel":"","context":"In &quot;11gR2&quot;","block_context":{"text":"11gR2","link":"https:\/\/www.oradba.ch\/wordpress\/category\/oracle-database\/11gr2\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2642,"url":"https:\/\/www.oradba.ch\/wordpress\/2018\/06\/oracle-18c-new-security-features\/","url_meta":{"origin":7424,"position":2},"title":"Oracle 18c new Security Features","author":"Stefan","date":"14. June 2018","format":false,"excerpt":"Today I had the opportunity to give a presentation on Oracle 18c new Security Features at the SOUG day in Baden. It was a great opportunity to discuss the security enhancements in the latest Oracle database release. This release introduces some new security features that simplify the secure operation of\u2026","rel":"","context":"In &quot;18c&quot;","block_context":{"text":"18c","link":"https:\/\/www.oradba.ch\/wordpress\/category\/oracle-database\/18c\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.oradba.ch\/wordpress\/wp-content\/uploads\/IMG_1555-300x225.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":2344,"url":"https:\/\/www.oradba.ch\/wordpress\/2017\/08\/oracle-unified-directory-12-released\/","url_meta":{"origin":7424,"position":3},"title":"Oracle Unified Directory 12 Released","author":"Stefan","date":"31. August 2017","format":false,"excerpt":"Finally end of working day. But while reading some newsletter and mails on my way home, I realised that there will be some work at home. After a long wait, Oracle has finally released Oracle Unified Directory 12c :-) A overview of the new features: Improved performance and scalability Support\u2026","rel":"","context":"In &quot;Oracle Unified Directory&quot;","block_context":{"text":"Oracle Unified Directory","link":"https:\/\/www.oradba.ch\/wordpress\/category\/oud\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2382,"url":"https:\/\/www.oradba.ch\/wordpress\/2017\/09\/articles-in-doag-red-stack-magazin\/","url_meta":{"origin":7424,"position":4},"title":"Articles in DOAG Red Stack Magazin","author":"Stefan","date":"27. September 2017","format":false,"excerpt":"A while ago I wrote two articles for the DOAG Red Stack Magazin. In the meantime both articles have been published. For this reason I use the opportunity to make the PDF versions of the articles available on oradba.ch. The articles are written in German and available as Trivadis version\u2026","rel":"","context":"In &quot;12cR2&quot;","block_context":{"text":"12cR2","link":"https:\/\/www.oradba.ch\/wordpress\/category\/oracle-database\/12cr2\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2689,"url":"https:\/\/www.oradba.ch\/wordpress\/2019\/02\/doag-red-stack-magazin-oracle-unified-directory-in-docker\/","url_meta":{"origin":7424,"position":5},"title":"DOAG Red Stack Magazin &#8211; Oracle Unified Directory in Docker","author":"Stefan","date":"18. February 2019","format":false,"excerpt":"Mid June I wrote an article for the DOAG Red Stack magazin about my work on Oracle Unified Directory in Docker. Just about the same time I did my DOAG SIG Security presentation on the same topic. In the meantime the article has been published in the latest release of\u2026","rel":"","context":"In &quot;DOAG&quot;","block_context":{"text":"DOAG","link":"https:\/\/www.oradba.ch\/wordpress\/category\/doag\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/posts\/7424","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/comments?post=7424"}],"version-history":[{"count":10,"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/posts\/7424\/revisions"}],"predecessor-version":[{"id":7438,"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/posts\/7424\/revisions\/7438"}],"wp:attachment":[{"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/media?parent=7424"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/categories?post=7424"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/tags?post=7424"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}