Solved

liscence audit oracle

Posted on 2013-12-23
2
477 Views
Last Modified: 2014-01-02
Can you give any pointers on how you would approach a software liscence audit of oracle RDBMS? And what would constitute a liscence breach/violation, how to enumerate liscence keys etc?
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 77

Accepted Solution

by:
slightwv (䄆 Netminder) earned 500 total points
ID: 39736110
I'm not aware of any tools that will perform a license verification scan of your systems.

Oracle doesn't require a license key to download/install/use.  It is more or less the honor system and the threat of them knocking on your door asking to review your systems.

When you purchase Oracle you should have received at least one CSI (I think it stands for Customer Service Identifier but don't quote me on that one).  This will allow you to see what that license covers.  Then it is up to the DBAs/Compliance folks to make sure you are licensed.

Not all databases your shop may have will fall under CSI licensing.  For example:  A developer can have a stand-alone database and be covered under Oracle's Education/Development license so this database doesn't count under your CSI.
0

Featured Post

Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Shell script to create broker configuration file using current broker Configuration, solely for purpose of backup on Linux. Script may need to be modified depending on OS-installation. Please deploy and verify the script in a test environment.
A company’s centralized system that manages user data, security, and distributed resources is often a focus of criminal attention. Active Directory (AD) is no exception. In truth, it’s even more likely to be targeted due to the number of companies …
This video shows how to copy a database user from one database to another user DBMS_METADATA.  It also shows how to copy a user's permissions and discusses password hash differences between Oracle 10g and 11g.
This video shows setup options and the basic steps and syntax for duplicating (cloning) a database from one instance to another. Examples are given for duplicating to the same machine and to different machines

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question