Oracle Database B10772-01 Instrukcja Użytkownika Strona 1

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Oprogramowanie bazy danych Oracle Database B10772-01. Oracle Database B10772-01 User's Manual Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
Przeglądanie stron 0
Oracle
Database
Advanced Security Administrator's Guide
10g Release 1 (10.1)
Part No. B10772-01
December 2003
Przeglądanie stron 0
1 2 3 4 5 6 ... 517 518

Podsumowanie treści

Strona 1 - Database

OracleDatabaseAdvanced Security Administrator's Guide10g Release 1 (10.1)Part No. B10772-01December 2003

Strona 2

xOpening an Existing Wallet... 8-13Closing a Walle

Strona 3

Duties of an Enterprise User Security Administrator/DBA2-38 Oracle Database Advanced Security Administrator's Guide

Strona 4

Part II Network Data Encryption and IntegrityThis part describes how to configure data encryption and integrity for your existingOracle network, and fo

Strona 6

Configuring Network Data Encryption and Integrity for Oracle Servers and Clients 3-13Configuring Network Data Encryption andIntegrity for Oracle Server

Strona 7

Oracle Advanced Security Encryption3-2 Oracle Database Advanced Security Administrator's GuideAbout EncryptionThe purpose of a secure cryptosyste

Strona 8

Oracle Advanced Security Data IntegrityConfiguring Network Data Encryption and Integrity for Oracle Servers and Clients 3-3of message security, but wit

Strona 9

Diffie-Hellman Based Key Management3-4 Oracle Database Advanced Security Administrator's Guide Data modification attackThis type of attack occurs

Strona 10 - Advanced Security

How To Configure Data Encryption and IntegrityConfiguring Network Data Encryption and Integrity for Oracle Servers and Clients 3-5Oracle Advanced Secur

Strona 11

How To Configure Data Encryption and Integrity3-6 Oracle Database Advanced Security Administrator's GuideAbout Activating Encryption and Integrit

Strona 12

How To Configure Data Encryption and IntegrityConfiguring Network Data Encryption and Integrity for Oracle Servers and Clients 3-7 REQUESTED REQUIRED

Strona 13 - B Authentication Parameters

xiTask 1: Create New Principals and Accounts... 10-5Task 2: Install the Key of t

Strona 14 - E orapki Utility

How To Configure Data Encryption and Integrity3-8 Oracle Database Advanced Security Administrator's GuideIn this scenario, this side of the conne

Strona 15

How To Configure Data Encryption and IntegrityConfiguring Network Data Encryption and Integrity for Oracle Servers and Clients 3-9the sqlnet.crypto_see

Strona 16 - Glossary

How To Configure Data Encryption and Integrity3-10 Oracle Database Advanced Security Administrator's GuideFigure 3–1 Oracle Advanced Security Enc

Strona 17

How To Configure Data Encryption and IntegrityConfiguring Network Data Encryption and Integrity for Oracle Servers and Clients 3-118. Repeat this proce

Strona 18 - List of Figures

How To Configure Data Encryption and Integrity3-12 Oracle Database Advanced Security Administrator's Guide1.Navigate to the Oracle Advanced Secur

Strona 19

How To Configure Data Encryption and IntegrityConfiguring Network Data Encryption and Integrity for Oracle Servers and Clients 3-136. Choose File >

Strona 20

How To Configure Data Encryption and Integrity3-14 Oracle Database Advanced Security Administrator's Guide

Strona 21 - List of Tables

Configuring Network Data Encryption and Integrity for Thin JDBC Clients 4-14Configuring Network Data Encryption andIntegrity for Thin JDBC ClientsThis

Strona 22

About the Java Implementation4-2 Oracle Database Advanced Security Administrator's GuideMicrosystems defined the JDBC standard and Oracle Corporat

Strona 23 - Send Us Your Comments

About the Java ImplementationConfiguring Network Data Encryption and Integrity for Thin JDBC Clients 4-3Oracle Advanced Security continues to encrypt a

Strona 24

xiiConsiderations for Choosing Authentication Types between Clients, Databases, andDirectories for Enterprise User Security...

Strona 25 - ■ Audience

Configuration Parameters4-4 Oracle Database Advanced Security Administrator's Guidethe code. The process leaves the original program structure in

Strona 26 - Organization

Configuration ParametersConfiguring Network Data Encryption and Integrity for Thin JDBC Clients 4-5Client Encryption Selected List: ORACLE.NET.ENCRYPTI

Strona 27

Configuration Parameters4-6 Oracle Database Advanced Security Administrator's GuideClient Integrity Selected List: ORACLE.NET.CRYPTO_CHEKSUM_TYPE

Strona 28

Part III Oracle Advanced Security StrongAuthenticationThis part describes how to configure strong authentication methods for yourexisting Oracle networ

Strona 30

Configuring RADIUS Authentication 5-15Configuring RADIUS AuthenticationThis chapter describes how to configure an Oracle Database server for use withRAD

Strona 31 - Conventions

RADIUS Overview5-2 Oracle Database Advanced Security Administrator's Guidechange the authentication method without modifying either the Oracle cl

Strona 32 - Conventions in Code Examples

RADIUS Authentication ModesConfiguring RADIUS Authentication 5-3A RADIUS server vendor is often the authentication server vendor as well, in whichcase

Strona 33

RADIUS Authentication Modes5-4 Oracle Database Advanced Security Administrator's GuideFigure 5–2 Synchronous Authentication Sequence1.A user logs

Strona 34

RADIUS Authentication ModesConfiguring RADIUS Authentication 5-5Example: Synchronous Authentication with SecurID Token CardsWith SecurID authentication

Strona 35

xiiiBrowsing Users in the Directory... 13-12Administering Ent

Strona 36 - Documentation Accessibility

RADIUS Authentication Modes5-6 Oracle Database Advanced Security Administrator's GuideFigure 5–3 Asynchronous Authentication Sequence1.A user see

Strona 37

RADIUS Authentication ModesConfiguring RADIUS Authentication 5-72. The Oracle database server, acting as the RADIUS client, passes the data fromthe Ora

Strona 38

Enabling RADIUS Authentication, Authorization, and Accounting5-8 Oracle Database Advanced Security Administrator's GuideThe Oracle client sends t

Strona 39

Enabling RADIUS Authentication, Authorization, and AccountingConfiguring RADIUS Authentication 5-9 Task 9: Configure Mapping RolesTask 1: Install RADIU

Strona 40 - ■ Tool Changes

Enabling RADIUS Authentication, Authorization, and Accounting5-10 Oracle Database Advanced Security Administrator's GuideFigure 5–4 Oracle Advanc

Strona 41

Enabling RADIUS Authentication, Authorization, and AccountingConfiguring RADIUS Authentication 5-11Create the RADIUS Secret Key File on the Oracle Data

Strona 42

Enabling RADIUS Authentication, Authorization, and Accounting5-12 Oracle Database Advanced Security Administrator's GuideFigure 5–5 Oracle Advanc

Strona 43

Enabling RADIUS Authentication, Authorization, and AccountingConfiguring RADIUS Authentication 5-13OS_AUTHENT_PREFIX=""Step 3: Configure Addi

Strona 44

Enabling RADIUS Authentication, Authorization, and Accounting5-14 Oracle Database Advanced Security Administrator's Guide5.Choose File > Save

Strona 45

Enabling RADIUS Authentication, Authorization, and AccountingConfiguring RADIUS Authentication 5-15To configure challenge-response:1. If you are using J

Strona 46 - ■ Common Security Threats

xivC Integrating Authentication Devices Using RADIUSAbout the RADIUS Challenge-Response User Interface...

Strona 47 - Common Security Threats

Enabling RADIUS Authentication, Authorization, and Accounting5-16 Oracle Database Advanced Security Administrator's Guide6.In the Interface Class

Strona 48 - Password-Related Threats

Enabling RADIUS Authentication, Authorization, and AccountingConfiguring RADIUS Authentication 5-17Task 3: Create a User and Grant AccessTo grant user

Strona 49 - Data Encryption

Enabling RADIUS Authentication, Authorization, and Accounting5-18 Oracle Database Advanced Security Administrator's Guide3.Add externally identifi

Strona 50

Enabling RADIUS Authentication, Authorization, and AccountingConfiguring RADIUS Authentication 5-19Ensure that RADIUS groups which map to Oracle roles

Strona 51 - Data Integrity

Enabling RADIUS Authentication, Authorization, and Accounting5-20 Oracle Database Advanced Security Administrator's GuideTask 6: Add the RADIUS C

Strona 52 - Strong Authentication

Enabling RADIUS Authentication, Authorization, and AccountingConfiguring RADIUS Authentication 5-21Task 9: Configure Mapping RolesIf the RADIUS server s

Strona 53

Using RADIUS to Log In to a Database5-22 Oracle Database Advanced Security Administrator's GuideUsing RADIUS to Log In to a DatabaseIf you are us

Strona 54 - ■ Entrust/PKI

RSA ACE/Server Configuration ChecklistConfiguring RADIUS Authentication 5-23See Also: RSA ACE/Server documentation for specificinformation about trouble

Strona 55 - ■ DCE Communication/Security

RSA ACE/Server Configuration Checklist5-24 Oracle Database Advanced Security Administrator's Guide

Strona 56

Configuring Kerberos Authentication 6-16Configuring Kerberos AuthenticationThis chapter describes how to configure Oracle Advanced Security for OracleDa

Strona 57 - Enterprise User Management

xvorapki wallet create... E-13orapki

Strona 58

Enabling Kerberos Authentication6-2 Oracle Database Advanced Security Administrator's GuideEnabling Kerberos AuthenticationTo enable Kerberos aut

Strona 59

Enabling Kerberos AuthenticationConfiguring Kerberos Authentication 6-3For example, if kservice is oracle, the fully qualified name of the system onwhic

Strona 60

Enabling Kerberos Authentication6-4 Oracle Database Advanced Security Administrator's Guide1.Enter the following to extract the service table:kad

Strona 61

Enabling Kerberos AuthenticationConfiguring Kerberos Authentication 6-5Task 5: Install Oracle Net Services and Oracle Advanced SecurityInstall Oracle N

Strona 62

Enabling Kerberos Authentication6-6 Oracle Database Advanced Security Administrator's GuideFigure 6–1 Oracle Advanced Security Authentication Win

Strona 63 - Overview

Enabling Kerberos AuthenticationConfiguring Kerberos Authentication 6-7Figure 6–2 Oracle Advanced Security Other Params Window (Kerberos)7.From the Aut

Strona 64 - Oracle Net Manager

Enabling Kerberos Authentication6-8 Oracle Database Advanced Security Administrator's GuideThe sqlnet.ora file is updated with the following entri

Strona 65

Enabling Kerberos AuthenticationConfiguring Kerberos Authentication 6-9Parameter: SQLNET.KERBEROS5_CLOCKSKEW=number_of_seconds_accepted_as_network_dela

Strona 66 - ■ SSL Property Sheet

Enabling Kerberos Authentication6-10 Oracle Database Advanced Security Administrator's GuideTask 8: Create a Kerberos UserTo create Oracle users

Strona 67

Utilities for the Kerberos Authentication AdapterConfiguring Kerberos Authentication 6-11Task 10: Get an Initial Ticket for the Kerberos/Oracle UserBef

Strona 68 - Oracle Wallet Manager

xviPrerequisites for Performing Migration... G-8Required Database

Strona 69

Utilities for the Kerberos Authentication Adapter6-12 Oracle Database Advanced Security Administrator's GuideDisplaying Credentials with the okli

Strona 70

Configuring Interoperability with a Windows 2000 Domain Controller KDCConfiguring Kerberos Authentication 6-13% oklist -f27-Jul-1999 21:57:51 28-Jul-

Strona 71

Configuring Interoperability with a Windows 2000 Domain Controller KDC6-14 Oracle Database Advanced Security Administrator's Guide Task 2: Config

Strona 72

Configuring Interoperability with a Windows 2000 Domain Controller KDCConfiguring Kerberos Authentication 6-15Step 2: Specifying Oracle Configuration P

Strona 73

Configuring Interoperability with a Windows 2000 Domain Controller KDC6-16 Oracle Database Advanced Security Administrator's GuideFor example, if

Strona 74

Configuring Interoperability with a Windows 2000 Domain Controller KDCConfiguring Kerberos Authentication 6-17Task 3: Configuring an Oracle Database to

Strona 75

Troubleshooting6-18 Oracle Database Advanced Security Administrator's GuideTroubleshootingThis section lists some common configuration problems an

Strona 76

Configuring Secure Sockets Layer Authentication 7-17Configuring Secure Sockets LayerAuthenticationThis chapter describes how to configure and use the Se

Strona 77

SSL and TLS in an Oracle Environment7-2 Oracle Database Advanced Security Administrator's GuideSSL and TLS in an Oracle EnvironmentSecure Sockets

Strona 78

SSL and TLS in an Oracle EnvironmentConfiguring Secure Sockets Layer Authentication 7-3About Using SSLOracle Advanced Security supports authentication

Strona 80

SSL and TLS in an Oracle Environment7-4 Oracle Database Advanced Security Administrator's GuideHow SSL Works in an Oracle Environment: The SSL Ha

Strona 81

Public Key Infrastructure in an Oracle EnvironmentConfiguring Secure Sockets Layer Authentication 7-5Public Key Infrastructure in an Oracle Environment

Strona 82

Public Key Infrastructure in an Oracle Environment7-6 Oracle Database Advanced Security Administrator's GuidePublic Key Infrastructure Components

Strona 83

Public Key Infrastructure in an Oracle EnvironmentConfiguring Secure Sockets Layer Authentication 7-7A certificate contains the entity's name, publ

Strona 84

Public Key Infrastructure in an Oracle Environment7-8 Oracle Database Advanced Security Administrator's GuideWalletsA wallet is a container that

Strona 85

Public Key Infrastructure in an Oracle EnvironmentConfiguring Secure Sockets Layer Authentication 7-9Note: Currently only nCipher devices are certified

Strona 86

SSL Combined with Other Authentication Methods7-10 Oracle Database Advanced Security Administrator's GuideSSL Combined with Other Authentication

Strona 87

SSL Combined with Other Authentication MethodsConfiguring Secure Sockets Layer Authentication 7-11Figure 7–1 SSL in Relation to Other Authentication Me

Strona 88

SSL and Firewalls7-12 Oracle Database Advanced Security Administrator's GuideSSL and FirewallsOracle Advanced Security supports two types of firew

Strona 89 - ■ Edit history for the group

SSL and FirewallsConfiguring Secure Sockets Layer Authentication 7-13Note: Although Oracle Connection Manager can be used to avoidopening up multiple S

Strona 90

xviiiList of Figures1–1 Encryption ...

Strona 91

SSL Usage Issues7-14 Oracle Database Advanced Security Administrator's GuideSSL Usage IssuesConsider the following issues when using SSL: SSL us

Strona 92

Enabling SSLConfiguring Secure Sockets Layer Authentication 7-15Enabling SSLTo enable SSL: Task 1: Install Oracle Advanced Security and Related Produc

Strona 93

Enabling SSL7-16 Oracle Database Advanced Security Administrator's GuideManager. The wallet should contain a certificate with a status of "Re

Strona 94

Enabling SSLConfiguring Secure Sockets Layer Authentication 7-17The sqlnet.ora and listener.ora files are updated with the followingentries:wallet_locat

Strona 95 - User Migration Utility

Enabling SSL7-18 Oracle Database Advanced Security Administrator's Guide Prioritize cipher suites starting with the strongest and moving to the

Strona 96

Enabling SSLConfiguring Secure Sockets Layer Authentication 7-19To specify cipher suites for the server:1. Navigate to the SSL tab of the Oracle Advanc

Strona 97

Enabling SSL7-20 Oracle Database Advanced Security Administrator's GuideFigure 7–3 Oracle Advanced Security SSL Window (Server)4. Use the up and

Strona 98

Enabling SSLConfiguring Secure Sockets Layer Authentication 7-21To set the SSL version for the server:1. Navigate to the SSL tab of the Oracle Advanced

Strona 99

Enabling SSL7-22 Oracle Database Advanced Security Administrator's GuideFigure 7–4 Oracle Advanced Security SSL Window (Server)2.Uncheck Require

Strona 100

Enabling SSLConfiguring Secure Sockets Layer Authentication 7-23To set the SQLNET.AUTHENTICATION_SERVICES parameter on the server:Add TCP/IP with SSL (

Strona 101

xix11–3 Related Entries in a Realm Oracle Context... 11-1612–1 Enterprise User Securi

Strona 102

Enabling SSL7-24 Oracle Database Advanced Security Administrator's GuideStep 1: Confirm Client Wallet CreationBefore proceeding with the next ste

Strona 103

Enabling SSLConfiguring Secure Sockets Layer Authentication 7-25(SECURITY=(SSL_SERVER_CERT_DN="cn=finance,cn=OracleContext,c=us,o=acme"))The

Strona 104 - Triple-DES Support

Enabling SSL7-26 Oracle Database Advanced Security Administrator's Guide1.Navigate to the Oracle Advanced Security profile. (See "Navigating

Strona 105 - DES40 Algorithm

Enabling SSLConfiguring Secure Sockets Layer Authentication 7-27 No (default): SSL checks for a match between the DN and the service name,but does not

Strona 106 - See Also:

Enabling SSL7-28 Oracle Database Advanced Security Administrator's GuideStep 4: Set the Client SSL Cipher Suites (Optional)A cipher suite is a se

Strona 107 - Authentication Key Fold-in

Enabling SSLConfiguring Secure Sockets Layer Authentication 7-29To specify client cipher suites:1. Navigate to the SSL tab of the Oracle Advanced Secur

Strona 108 - ■ ACCEPTED

Enabling SSL7-30 Oracle Database Advanced Security Administrator's Guide4.Use the up and down arrows to prioritize the cipher suites.5. Choose Fi

Strona 109 - REQUIRED

Troubleshooting SSLConfiguring Secure Sockets Layer Authentication 7-31Oracle Advanced Security. For example, use this parameter if you want the server

Strona 110

Troubleshooting SSL7-32 Oracle Database Advanced Security Administrator's Guide Ensure that the correct wallet location is specified in the sqlne

Strona 111

Troubleshooting SSLConfiguring Secure Sockets Layer Authentication 7-33Action: Check the following: Ensure that the correct wallet location is specifie

Strona 112 - ■ REQUIRED

Oracle Database Advanced Security Administrator's Guide, 10g Release 1 (10.1)Part No. B10772-01Copyright © 1996, 2003 Oracle Corporation. All ri

Strona 114

Troubleshooting SSL7-34 Oracle Database Advanced Security Administrator's Guide A certificate authority for one of the certificates in the chain i

Strona 115

Certificate Validation with Certificate Revocation ListsConfiguring Secure Sockets Layer Authentication 7-35does not give the complete chain and you do

Strona 116

Certificate Validation with Certificate Revocation Lists7-36 Oracle Database Advanced Security Administrator's GuideHow CRL Checking WorksCertific

Strona 117 - About the Java Implementation

Certificate Validation with Certificate Revocation ListsConfiguring Secure Sockets Layer Authentication 7-37Configuring Certificate Validation with Certi

Strona 118 - Securing Thin JDBC

Certificate Validation with Certificate Revocation Lists7-38 Oracle Database Advanced Security Administrator's GuideFigure 7–7 Oracle Advanced Se

Strona 119 - Obfuscation

Certificate Validation with Certificate Revocation ListsConfiguring Secure Sockets Layer Authentication 7-393.(Optional) If CRLs are stored on your loc

Strona 120 - Configuration Parameters

Certificate Validation with Certificate Revocation Lists7-40 Oracle Database Advanced Security Administrator's Guide5.Choose File > Save Netwo

Strona 121 - Configuration Parameters

Certificate Validation with Certificate Revocation ListsConfiguring Secure Sockets Layer Authentication 7-41You can also use LDAP command-line tools to

Strona 122

Certificate Validation with Certificate Revocation Lists7-42 Oracle Database Advanced Security Administrator's Guideissuer's name. Then when

Strona 123 - Part III

Certificate Validation with Certificate Revocation ListsConfiguring Secure Sockets Layer Authentication 7-43permission to add CRLs to the CRL subtree,

Strona 124

xxiList of Tables1–1 Authentication Methods and System Requirements ... 1-172–1 Oracle Wallet Manage

Strona 125 - RADIUS Overview

Certificate Validation with Certificate Revocation Lists7-44 Oracle Database Advanced Security Administrator's Guidefollowing at the command line

Strona 126

Certificate Validation with Certificate Revocation ListsConfiguring Secure Sockets Layer Authentication 7-45[-summary]where issuer_name is the name of

Strona 127 - RADIUS Authentication Modes

Certificate Validation with Certificate Revocation Lists7-46 Oracle Database Advanced Security Administrator's GuideOracle Net Tracing File Error

Strona 128

Certificate Validation with Certificate Revocation ListsConfiguring Secure Sockets Layer Authentication 7-472. If necessary, use the orapki utility to

Strona 129

Configuring Your System to Use Hardware Security Modules7-48 Oracle Database Advanced Security Administrator's GuideConfiguring Your System to Use

Strona 130

Configuring Your System to Use Hardware Security ModulesConfiguring Secure Sockets Layer Authentication 7-49Configuring Your System to Use nCipher Hardw

Strona 131

Configuring Your System to Use Hardware Security Modules7-50 Oracle Database Advanced Security Administrator's Guide (UNIX) /opt/nfast (Windows

Strona 132

Configuring Your System to Use Hardware Security ModulesConfiguring Secure Sockets Layer Authentication 7-51Error Messages Associated with Using Hardwa

Strona 133

Configuring Your System to Use Hardware Security Modules7-52 Oracle Database Advanced Security Administrator's GuideNote: The nCipher log file is

Strona 134

Using Oracle Wallet Manager 8-18Using Oracle Wallet ManagerSecurity administrators use Oracle Wallet ManagerOracle Wallet Manager tomanage public key

Strona 135

xxii11–3 Enterprise User Security: Supported Authentication Types for Connections betweenClients, Databases, and Directories ...

Strona 136

Oracle Wallet Manager Overview8-2 Oracle Database Advanced Security Administrator's GuideOracle Wallet Manager OverviewOracle Wallet Manager is a

Strona 137 - ■ Configure Challenge-Response

Oracle Wallet Manager OverviewUsing Oracle Wallet Manager 8-3Strong Wallet EncryptionOracle Wallet Manager stores private keys associated with X.509 c

Strona 138

Oracle Wallet Manager Overview8-4 Oracle Database Advanced Security Administrator's Guidecryptography standards called Public-Key Cryptography St

Strona 139

Oracle Wallet Manager OverviewUsing Oracle Wallet Manager 8-5legal usage combinations). There must be a one-to-one mapping between certificaterequests

Strona 140

Oracle Wallet Manager Overview8-6 Oracle Database Advanced Security Administrator's GuideYou should obtain certificates from the certificate author

Strona 141

Starting Oracle Wallet ManagerUsing Oracle Wallet Manager 8-7LDAP Directory SupportOracle Wallet Manager can upload wallets to and retrieve them from

Strona 142

How To Create a Complete Wallet: Process Overview8-8 Oracle Database Advanced Security Administrator's GuideHow To Create a Complete Wallet: Proc

Strona 143

Managing WalletsUsing Oracle Wallet Manager 8-9client wallets. It is only optional for products that take the wallet password atthe time of startup.Af

Strona 144

Managing Wallets8-10 Oracle Database Advanced Security Administrator's GuidePasswords must contain at least eight characters that consist of alph

Strona 145

Managing WalletsUsing Oracle Wallet Manager 8-115. Click OK to continue. If the entered password does not conform to the requiredguidelines, then the

Strona 146

xxiiiSend Us Your CommentsOracle Database Advanced Security Administrator's Guide, 10g Release 1 (10.1)Part No. B10772-01Oracle Corporation welc

Strona 147

Managing Wallets8-12 Oracle Database Advanced Security Administrator's Guide6.In the PKCS11 library filename field, enter the path to the directory

Strona 148

Managing WalletsUsing Oracle Wallet Manager 8-13Opening an Existing WalletOpen a wallet that already exists in the file system directory as follows:1.

Strona 149 - ■ Troubleshooting

Managing Wallets8-14 Oracle Database Advanced Security Administrator's GuideFor other operating systems, see the Oracle documentation for that sp

Strona 150 - Task 1: Install Kerberos

Managing WalletsUsing Oracle Wallet Manager 8-151. Choose Operations > Export Wallet... The Export Wallet dialog box appears.2. Enter the destinat

Strona 151

Managing Wallets8-16 Oracle Database Advanced Security Administrator's Guide If no certificates have SSL key usage: When prompted, enter the user

Strona 152

Managing WalletsUsing Oracle Wallet Manager 8-17If Oracle Wallet Manager cannot open the target wallet using the walletpassword, then check to make su

Strona 153

Managing Wallets8-18 Oracle Database Advanced Security Administrator's Guide (UNIX) ORACLE_HOME/admin/ORACLE_SID (Windows) ORACLE_BASE\ORACLE_H

Strona 154

Managing WalletsUsing Oracle Wallet Manager 8-19To change the password for the current open wallet:1. Choose Wallet > Change Password. The Change W

Strona 155 - ■ Clock Skew

Managing Certificates8-20 Oracle Database Advanced Security Administrator's Guide1.Choose Wallet from the menu bar.2. Uncheck Auto Login. A messa

Strona 156

Managing CertificatesUsing Oracle Wallet Manager 8-21 Importing the User Certificate into the Wallet Removing a User Certificate from a Wallet Removi

Strona 158

Managing Certificates8-22 Oracle Database Advanced Security Administrator's GuideTable 8–6 lists the available key sizes and the relative securit

Strona 159

Managing CertificatesUsing Oracle Wallet Manager 8-23certificates, including the user's certificate and all of the supporting CA and subCAcertificat

Strona 160

Managing Certificates8-24 Oracle Database Advanced Security Administrator's GuideManager main panel, and the status of the corresponding entry in

Strona 161

Managing CertificatesUsing Oracle Wallet Manager 8-25Exporting a User Certificate RequestTo save the certificate request in a file system directory, exp

Strona 162 - Domain Controller KDC

Managing Certificates8-26 Oracle Database Advanced Security Administrator's Guide3.Choose Paste the Certificate, and click OK. Another Import Trus

Strona 163 - Oracle Client

Managing CertificatesUsing Oracle Wallet Manager 8-27A dialog panel warns you that your user certificate will no longer beverifiable by its recipients i

Strona 164

Managing Certificates8-28 Oracle Database Advanced Security Administrator's Guide

Strona 165 - Controller KDC

Configuring Multiple Authentication Methods and Disabling Oracle Advanced Security 9-19Configuring Multiple AuthenticationMethods and Disabling Oracle

Strona 166 - Troubleshooting

Disabling Oracle Advanced Security Authentication9-2 Oracle Database Advanced Security Administrator's GuideFor example:% sqlplus scott/tiger@emp

Strona 167 - Authentication

Disabling Oracle Advanced Security AuthenticationConfiguring Multiple Authentication Methods and Disabling Oracle Advanced Security 9-3Figure 9–1 Oracl

Strona 168 - ■ About Using SSL

xxvPrefaceWelcome to the Oracle Database Advanced Security Administrator's Guide for the10g Release 1 (10.1) of Oracle Advanced Security.Oracle A

Strona 169 - About Using SSL

Configuring Multiple Authentication Methods9-4 Oracle Database Advanced Security Administrator's GuideConfiguring Multiple Authentication MethodsM

Strona 170

Configuring Oracle Database for External AuthenticationConfiguring Multiple Authentication Methods and Disabling Oracle Advanced Security 9-5Configuring

Strona 171 - About Public Key Cryptography

Configuring Oracle Database for External Authentication9-6 Oracle Database Advanced Security Administrator's GuideIf REMOTE_OS_AUTHENT is set to

Strona 172 - Certificates

Configuring Oracle Database for External AuthenticationConfiguring Multiple Authentication Methods and Disabling Oracle Advanced Security 9-7See Also:

Strona 173 - Certificate Revocation Lists

Configuring Oracle Database for External Authentication9-8 Oracle Database Advanced Security Administrator's Guide

Strona 174 - Hardware security modules

Configuring Oracle DCE Integration 10-110Configuring Oracle DCE IntegrationOracle DCE Integration enables Oracle applications and tools to access Oracl

Strona 175

Introduction to Oracle DCE Integration10-2 Oracle Database Advanced Security Administrator's GuideIntroduction to Oracle DCE IntegrationThe Distr

Strona 176

Introduction to Oracle DCE IntegrationConfiguring Oracle DCE Integration 10-3DCE Communication/SecurityThis component has three principal features:Auth

Strona 177

Introduction to Oracle DCE Integration10-4 Oracle Database Advanced Security Administrator's GuideThe DCE CDS offers a distributed, replicated re

Strona 178 - SSL and Firewalls

Configuring DCE for Oracle DCE IntegrationConfiguring Oracle DCE Integration 10-5 Only one listener address that uses the DCE protocol is permitted fo

Strona 179

xxviAudienceThe Oracle Database Advanced Security Administrator's Guide is intended forusers and systems professionals involved with the implemen

Strona 180 - SSL Usage Issues

Configuring DCE for Oracle DCE Integration10-6 Oracle Database Advanced Security Administrator's GuideTask 2: Install the Key of the Server into

Strona 181 - Enabling SSL

Configuring DCE for Oracle DCE IntegrationConfiguring Oracle DCE Integration 10-7cdscp> create dir /.:/subsys/oraclecdscp> create dir /.:/subsys/

Strona 182 - Important:

Configuring Oracle Database and Oracle Net Services for Oracle DCE Integration10-8 Oracle Database Advanced Security Administrator's GuideConfigur

Strona 183

Configuring Oracle Database and Oracle Net Services for Oracle DCE IntegrationConfiguring Oracle DCE Integration 10-9You can specify a service as follo

Strona 184

Configuring Oracle Database and Oracle Net Services for Oracle DCE Integration10-10 Oracle Database Advanced Security Administrator's Guide2.For

Strona 185 - (Figure 7–3):

Configuring Oracle Database and Oracle Net Services for Oracle DCE IntegrationConfiguring Oracle DCE Integration 10-111. Verify that these lines are in

Strona 186

Configuring Oracle Database and Oracle Net Services for Oracle DCE Integration10-12 Oracle Database Advanced Security Administrator's GuideIf con

Strona 187

Configuring Oracle Database and Oracle Net Services for Oracle DCE IntegrationConfiguring Oracle DCE Integration 10-133. Ensure that the DCE groups tha

Strona 188

Configuring Oracle Database and Oracle Net Services for Oracle DCE Integration10-14 Oracle Database Advanced Security Administrator's GuideLocal

Strona 189

Configuring Oracle Database and Oracle Net Services for Oracle DCE IntegrationConfiguring Oracle DCE Integration 10-15Task 4: Configure DCE for SYSDBA a

Strona 190 - TCP/IP with SSL on the Client

xxviiPart III, "Oracle Advanced Security Strong Authentication"Chapter 5, "Configuring RADIUS Authentication"This chapter describes

Strona 191

Configuring Oracle Database and Oracle Net Services for Oracle DCE Integration10-16 Oracle Database Advanced Security Administrator's Guide

Strona 192

Configuring Oracle Database and Oracle Net Services for Oracle DCE IntegrationConfiguring Oracle DCE Integration 10-17 protocol.ora sqlnet.oraTypical

Strona 193

Configuring Oracle Database and Oracle Net Services for Oracle DCE Integration10-18 Oracle Database Advanced Security Administrator's Guidegreate

Strona 194

Configuring Oracle Database and Oracle Net Services for Oracle DCE IntegrationConfiguring Oracle DCE Integration 10-19Task 6: Configure Clients to Use D

Strona 195

Configuring Oracle Database and Oracle Net Services for Oracle DCE Integration10-20 Oracle Database Advanced Security Administrator's GuideFor ex

Strona 196

Configuring Oracle Database and Oracle Net Services for Oracle DCE IntegrationConfiguring Oracle DCE Integration 10-212. Restart CDS on the system.The

Strona 197 - Troubleshooting SSL

Configuring Oracle Database and Oracle Net Services for Oracle DCE Integration10-22 Oracle Database Advanced Security Administrator's GuideStep 4

Strona 198

Connecting to an Oracle Database Server in the DCE EnvironmentConfiguring Oracle DCE Integration 10-23For a client or server to use DCE CDS Naming, the

Strona 199

Connecting to an Oracle Database Server in the DCE Environment10-24 Oracle Database Advanced Security Administrator's Guide3.Verify that the serv

Strona 200

Connecting Clients Outside DCE to Oracle Servers in DCEConfiguring Oracle DCE Integration 10-25For example:% sqlplus /@ORADCEConnecting to an Oracle Da

Strona 201 - What CRLs Should You Use?

xxviiiparameters, and how clients outside of DCE can access Oracle databases usinganother protocol such as TCP/IP.Part IV, "Enterprise User Secur

Strona 202 - How CRL Checking Works

Connecting Clients Outside DCE to Oracle Servers in DCE10-26 Oracle Database Advanced Security Administrator's Guide The listener.ora File The

Strona 203

Connecting Clients Outside DCE to Oracle Servers in DCEConfiguring Oracle DCE Integration 10-27 (SID_NAME=ORASID) (ORACLE_HOME=/usr/prod/or

Strona 204 - Checking Selected

Connecting Clients Outside DCE to Oracle Servers in DCE10-28 Oracle Database Advanced Security Administrator's GuideTo access the DB1 database, a

Strona 205

Part IV Enterprise User SecurityThis part describes Oracle Database directory and security integration functionality,which enables single sign-on in a

Strona 207 - Displaying orapki Help

Getting Started with Enterprise User Security 11-111Getting Started with Enterprise UserSecurityEnterprise User Security, a critical component of Orac

Strona 208

Introduction to Enterprise User Security11-2 Oracle Database Advanced Security Administrator's GuideIntroduction to Enterprise User SecurityThis

Strona 209

Introduction to Enterprise User SecurityGetting Started with Enterprise User Security 11-3Enterprise User Security: The Big PictureEnterprise User Sec

Strona 210

Introduction to Enterprise User Security11-4 Oracle Database Advanced Security Administrator's GuideFigure 11–1 Enterprise User Security and the

Strona 211

Introduction to Enterprise User SecurityGetting Started with Enterprise User Security 11-5Single password authentication lets users authenticate to mu

Strona 212 - 3. CRL DP

xxixAppendix D, "Oracle Advanced Security FIPS 140-1 Settings"This appendix describes the sqlnet.ora configuration parameters required tocomp

Strona 213

Introduction to Enterprise User Security11-6 Oracle Database Advanced Security Administrator's GuideAbout Identity Management Realms An identity

Strona 214 - Security

Introduction to Enterprise User SecurityGetting Started with Enterprise User Security 11-7name (DN). When enterprise users log on to a database, the d

Strona 215

Introduction to Enterprise User Security11-8 Oracle Database Advanced Security Administrator's GuideAbout Enterprise User SchemasEnterprise users

Strona 216 - ■ (Windows) C:\nfast

Introduction to Enterprise User SecurityGetting Started with Enterprise User Security 11-9How Enterprise Users Access Database Resources with Database

Strona 217

Introduction to Enterprise User Security11-10 Oracle Database Advanced Security Administrator's GuideTable 11–1 Enterprise User Security Authenti

Strona 218 - /log/logfile

Introduction to Enterprise User SecurityGetting Started with Enterprise User Security 11-11About Enterprise User Security Directory EntriesIn a direct

Strona 219 - Using Oracle Wallet Manager

Introduction to Enterprise User Security11-12 Oracle Database Advanced Security Administrator's GuideThe entries described in the following secti

Strona 220 - Wallet Password Management

Introduction to Enterprise User SecurityGetting Started with Enterprise User Security 11-13Figure 11–2 Example of Enterprise RolesAcme Widgets(Enterpr

Strona 221 - Backward Compatibility

Introduction to Enterprise User Security11-14 Oracle Database Advanced Security Administrator's GuideAn enterprise role can be assigned to one or

Strona 222 - Multiple Certificate Support

Introduction to Enterprise User SecurityGetting Started with Enterprise User Security 11-15Database Server EntriesA database server entry (represented

Strona 223

responsible for the performance of the Kerberos software, does not provide technical support for thesoftware, and shall not be liable for any damages

Strona 224

xxxPrinted documentation is available for sale in the Oracle Store athttp://oraclestore.oracle.com/To download free release notes, installation docume

Strona 225 - LDAP Directory Support

Introduction to Enterprise User Security11-16 Oracle Database Advanced Security Administrator's GuideFigure 11–3 Related Entries in a Realm Oracl

Strona 226

Introduction to Enterprise User SecurityGetting Started with Enterprise User Security 11-17Administrative GroupsAn identity management realm contains

Strona 227 - Managing Wallets

Introduction to Enterprise User Security11-18 Oracle Database Advanced Security Administrator's GuideTable 11–2 Administrative Groups in a Realm

Strona 228 - Creating a New Wallet

About Using Shared Schemas for Enterprise User SecurityGetting Started with Enterprise User Security 11-19About Using Shared Schemas for Enterprise Us

Strona 229

About Using Shared Schemas for Enterprise User Security11-20 Oracle Database Advanced Security Administrator's Guide Each enterprise user can be

Strona 230

About Using Shared Schemas for Enterprise User SecurityGetting Started with Enterprise User Security 11-21multiple enterprise users (shared schema). T

Strona 231 - Importing Third-Party Wallets

About Using Shared Schemas for Enterprise User Security11-22 Oracle Database Advanced Security Administrator's GuideFor example, suppose that Har

Strona 232

About Using Current User Database Links for Enterprise User SecurityGetting Started with Enterprise User Security 11-23About Using Current User Databa

Strona 233

About Using Current User Database Links for Enterprise User Security11-24 Oracle Database Advanced Security Administrator's GuideSSL to authentic

Strona 234

Enterprise User Security Deployment ConsiderationsGetting Started with Enterprise User Security 11-25Enterprise User Security Deployment Consideration

Strona 235 - Saving in System Default

xxxi Applied Cryptography, Second Edition: Protocols, Algorithms, and Source Code inC by Bruce Schneier. New York: John Wiley & Sons, 1996. SSL

Strona 236 - Changing the Password

Enterprise User Security Deployment Considerations11-26 Oracle Database Advanced Security Administrator's GuideSecurity of Password-Authenticated

Strona 237 - Using Auto Login

Enterprise User Security Deployment ConsiderationsGetting Started with Enterprise User Security 11-27Protecting Database Password VerifiersThe OracleP

Strona 238 - Managing Certificates

Enterprise User Security Deployment Considerations11-28 Oracle Database Advanced Security Administrator's GuideConsiderations for Choosing Authen

Strona 239 - Adding a Certificate Request

Enterprise User Security Configuration Tasks and Troubleshooting 12-112Enterprise User Security ConfigurationTasks and TroubleshootingThis chapter desc

Strona 240 - Managing Certificates

Enterprise User Security Configuration Overview12-2 Oracle Database Advanced Security Administrator's GuideRegardless of the authentication metho

Strona 241

Enterprise User Security Configuration OverviewEnterprise User Security Configuration Tasks and Troubleshooting 12-3Figure 12–1 Enterprise User Securit

Strona 242 - Exporting a User Certificate

Enterprise User Security Configuration Roadmap12-4 Oracle Database Advanced Security Administrator's GuideFor brevity, some product names and fea

Strona 243 - Managing Trusted Certificates

Preparing the Directory for Enterprise User SecurityEnterprise User Security Configuration Tasks and Troubleshooting 12-5– "Configuring Enterprise

Strona 244

Preparing the Directory for Enterprise User Security12-6 Oracle Database Advanced Security Administrator's GuideTask 3: Identity administrative u

Strona 245

Preparing the Directory for Enterprise User SecurityEnterprise User Security Configuration Tasks and Troubleshooting 12-7Task 5: (Optional) Configure yo

Strona 246

xxxiiConventions in Code ExamplesCode examples illustrate SQL, PL/SQL, SQL*Plus, or other command-linestatements. They are displayed in a monospace (fi

Strona 247

Preparing the Directory for Enterprise User Security12-8 Oracle Database Advanced Security Administrator's GuideTask 6: Register the database in

Strona 248 - % sqlplus scott/tiger@emp

Preparing the Directory for Enterprise User SecurityEnterprise User Security Configuration Tasks and Troubleshooting 12-9 After creating the wallet, D

Strona 249

Preparing the Directory for Enterprise User Security12-10 Oracle Database Advanced Security Administrator's Guide4.Choose Finish if you are only

Strona 250

Configuring Enterprise User Security Objects in the Database and the DirectoryEnterprise User Security Configuration Tasks and Troubleshooting 12-11Aft

Strona 251

Configuring Enterprise User Security Objects in the Database and the Directory12-12 Oracle Database Advanced Security Administrator's GuideTo con

Strona 252

Configuring Enterprise User Security Objects in the Database and the DirectoryEnterprise User Security Configuration Tasks and Troubleshooting 12-13Alt

Strona 253

Configuring Enterprise User Security Objects in the Database and the Directory12-14 Oracle Database Advanced Security Administrator's GuideTask 3

Strona 254

Configuring Enterprise User Security Objects in the Database and the DirectoryEnterprise User Security Configuration Tasks and Troubleshooting 12-154.

Strona 255

Configuring Enterprise User Security for Password Authentication12-16 Oracle Database Advanced Security Administrator's GuideFor more information

Strona 256 - System Requirements

Configuring Enterprise User Security for Password AuthenticationEnterprise User Security Configuration Tasks and Troubleshooting 12-17 Task 1: (Option

Strona 257 - DCE Communication/Security

xxxiiiConvention Meaning Example[ ] Brackets enclose one or more optionalitems. Do not enter the brackets.DECIMAL (digits [ , precision ]){ } Braces e

Strona 258 - Release Limitations

Configuring Enterprise User Security for Kerberos Authentication12-18 Oracle Database Advanced Security Administrator's GuideTask 3: Connect as a

Strona 259

Configuring Enterprise User Security for Kerberos AuthenticationEnterprise User Security Configuration Tasks and Troubleshooting 12-19 You have prepar

Strona 260

Configuring Enterprise User Security for Kerberos Authentication12-20 Oracle Database Advanced Security Administrator's GuideKerberos Principal N

Strona 261

Configuring Enterprise User Security for SSL AuthenticationEnterprise User Security Configuration Tasks and Troubleshooting 12-21If the KDC is part of

Strona 262 - Integration

Configuring Enterprise User Security for SSL Authentication12-22 Oracle Database Advanced Security Administrator's Guide– Database certificate DN

Strona 263 - Task 1: Configure the Server

Configuring Enterprise User Security for SSL AuthenticationEnterprise User Security Configuration Tasks and Troubleshooting 12-233. Click Apply.For mor

Strona 264

Configuring Enterprise User Security for SSL Authentication12-24 Oracle Database Advanced Security Administrator's Guideclient cannot have a wall

Strona 265

Enabling Current User Database LinksEnterprise User Security Configuration Tasks and Troubleshooting 12-25To view the database DN so you can request a

Strona 266

Troubleshooting Enterprise User Security12-26 Oracle Database Advanced Security Administrator's GuideTroubleshooting Enterprise User SecurityThis

Strona 267

Troubleshooting Enterprise User SecurityEnterprise User Security Configuration Tasks and Troubleshooting 12-275. Use Database Configuration Assistant to

Strona 268

xxxivConventions for Windows Operating SystemsThe following table describes conventions for Windows operating systems andprovides examples of their us

Strona 269

Troubleshooting Enterprise User Security12-28 Oracle Database Advanced Security Administrator's GuideORA-28272: Domain policy does not allow pass

Strona 270 - Task 5: Configure the Client

Troubleshooting Enterprise User SecurityEnterprise User Security Configuration Tasks and Troubleshooting 12-293. Use Enterprise Security Manager to che

Strona 271 - DCE.PROTECTION

Troubleshooting Enterprise User Security12-30 Oracle Database Advanced Security Administrator's GuideCause: Indicates a problem with the connecti

Strona 272 - DCE.LOCAL_CELL_USERNAMES

Troubleshooting Enterprise User SecurityEnterprise User Security Configuration Tasks and Troubleshooting 12-312. Check that there is a value for the at

Strona 273

Troubleshooting Enterprise User Security12-32 Oracle Database Advanced Security Administrator's Guide2.If these values are incorrect, reset the d

Strona 274

Troubleshooting Enterprise User SecurityEnterprise User Security Configuration Tasks and Troubleshooting 12-334. Check that the LDAP_DIRECTORY_ACCESS p

Strona 275

Troubleshooting Enterprise User Security12-34 Oracle Database Advanced Security Administrator's Guide1.Check that the global role has been create

Strona 276

Troubleshooting Enterprise User SecurityEnterprise User Security Configuration Tasks and Troubleshooting 12-35Use the following syntax to view the DN t

Strona 277 - Starting the Listener

Troubleshooting Enterprise User Security12-36 Oracle Database Advanced Security Administrator's Guide1.Use Enterprise Security Manager to check t

Strona 278

Troubleshooting Enterprise User SecurityEnterprise User Security Configuration Tasks and Troubleshooting 12-37– If the database connects to the directo

Strona 279 - Sample Parameter Files

xxxvSpecial characters The backslash (\) special character issometimes required as an escapecharacter for the double quotation mark(") special ch

Strona 280 - The listener.ora File

Troubleshooting Enterprise User Security12-38 Oracle Database Advanced Security Administrator's Guide

Strona 281 - The tnsnames.ora File

Administering Enterprise User Security 13-113 Administering Enterprise User SecurityThis chapter describes how to use Enterprise Security Manager to a

Strona 282

Enterprise User Security Administration Tools Overview13-2 Oracle Database Advanced Security Administrator's GuideEnterprise User Security Admini

Strona 283 - Enterprise User Security

Administering Identity Management RealmsAdministering Enterprise User Security 13-3Administering Identity Management RealmsAn identity management real

Strona 284

Administering Identity Management Realms13-4 Oracle Database Advanced Security Administrator's GuideIdentity Management Realm VersionsEnterprise

Strona 285

Administering Identity Management RealmsAdministering Enterprise User Security 13-5Setting Properties of an Identity Management RealmAn identity manag

Strona 286

Administering Identity Management Realms13-6 Oracle Database Advanced Security Administrator's Guide3.In the Realm Information window, enter the

Strona 287

Administering Identity Management RealmsAdministering Enterprise User Security 13-7Managing Identity Management Realm AdministratorsAn identity manage

Strona 288

Administering Enterprise Users13-8 Oracle Database Advanced Security Administrator's GuideAdministering Enterprise UsersEnterprise Security Manag

Strona 289

Administering Enterprise UsersAdministering Enterprise User Security 13-9Creating New Enterprise UsersUse Enterprise Security Manager to create users

Strona 290

xxxviDocumentation AccessibilityOur goal is to make Oracle products, services, and supporting documentationaccessible, with good usability, to the dis

Strona 291

Administering Enterprise Users13-10 Oracle Database Advanced Security Administrator's Guide2.Choose the Users and Groups tab.3. In the Users and

Strona 292 - About Enterprise User Schemas

Administering Enterprise UsersAdministering Enterprise User Security 13-11The enterprise user password is used for: Directory logon Database logon,

Strona 293

Administering Enterprise Users13-12 Oracle Database Advanced Security Administrator's GuideFigure 13–3 Enterprise Security Manager: Add Enterpris

Strona 294

Administering Enterprise UsersAdministering Enterprise User Security 13-13A list of all users that match your search criteria displays. You can browse

Strona 295 - Enterprise Users

Administering Enterprise Users13-14 Oracle Database Advanced Security Administrator's GuideNote that you can also browse enterprise users in the

Strona 296 - Enterprise Roles

Administering Enterprise DomainsAdministering Enterprise User Security 13-15Administering Enterprise DomainsAn identity management realm contains an e

Strona 297

Administering Enterprise Domains13-16 Oracle Database Advanced Security Administrator's GuideCreating a New Enterprise DomainIf you do not want t

Strona 298 - Enterprise Domains

Administering Enterprise DomainsAdministering Enterprise User Security 13-17 Select Remove Enterprise Domain from the Operations menu. Select an ent

Strona 299 - Database Server Entries

Administering Enterprise Domains13-18 Oracle Database Advanced Security Administrator's GuideTo remove a database from an enterprise domain:1. Se

Strona 300 - OracleUserSecurityAdmins

Administering Enterprise DomainsAdministering Enterprise User Security 13-192. Select a new database to be added to the enterprise domain.3. Choose OK

Strona 301 - Administrative Groups

xxxviiWhat's New in Oracle Advanced Security?This section describes new features of Oracle Advanced Security 10g Release 1(10.1) and provides poi

Strona 302

Administering Enterprise Domains13-20 Oracle Database Advanced Security Administrator's GuideManaging Enterprise Domain AdministratorsAn Enterpri

Strona 303

Administering Enterprise DomainsAdministering Enterprise User Security 13-21A database can use a schema mapping to share one database schema betweenmu

Strona 304

Administering Enterprise Domains13-22 Oracle Database Advanced Security Administrator's GuideTo add a new mapping to the list of database schema

Strona 305

Administering Enterprise DomainsAdministering Enterprise User Security 13-234. Enter the name of the database schema for which this Mapping will be ma

Strona 306

Administering Enterprise Domains13-24 Oracle Database Advanced Security Administrator's Guide2.Choose the Accessible Domains tabbed window and cl

Strona 307 - ■ EXTERNALLY

Administering Enterprise DomainsAdministering Enterprise User Security 13-25To remove an enterprise domain from the password-accessible domains list:1

Strona 308

Administering Enterprise Domains13-26 Oracle Database Advanced Security Administrator's GuideSee Also: "Creating New Enterprise Users"

Strona 309

Administering Enterprise RolesAdministering Enterprise User Security 13-27Administering Enterprise RolesAn enterprise domain within an identity manage

Strona 310

Administering Enterprise Roles13-28 Oracle Database Advanced Security Administrator's Guide2.Select the appropriate enterprise domain for the new

Strona 311

Administering Enterprise RolesAdministering Enterprise User Security 13-29Figure 13–12 Enterprise Security Manager: Database Global Roles TabWhen popu

Strona 312 - Typical Configurations

xxxviiiEngineering Task Force (IETF) to be the successor to SSL version 3.0. TLS is aconfigurable option provided in Oracle Net Manager. Support for H

Strona 313 - Tasks and Troubleshooting

Administering Enterprise Roles13-30 Oracle Database Advanced Security Administrator's Guideenabled as its Oracle Net naming method, or if this na

Strona 314

Administering Enterprise RolesAdministering Enterprise User Security 13-31Granting Enterprise Roles to UsersYou can grant an enterprise role to users

Strona 315

Administering Enterprise Roles13-32 Oracle Database Advanced Security Administrator's GuideTo remove a user from the list of enterprise role gran

Strona 316

Part VAppendixesThis part contains the following reference appendixes: Appendix A, "Data Encryption and Integrity Parameters" Appendix B,

Strona 318 - ■ Register databases

Data Encryption and Integrity Parameters A-1AData Encryption and Integrity ParametersThis appendix describes encryption and data integrity parameters

Strona 319

Sample sqlnet.ora FileA-2 Oracle Database Advanced Security Administrator's GuideOracle Advanced Security Encryption#ASO Encryptionsqlnet.encrypt

Strona 320

Data Encryption and Integrity ParametersData Encryption and Integrity Parameters A-3RADIUS#Radiussqlnet.authentication_services = (beq, RADIUS )sqlnet

Strona 321

Data Encryption and Integrity ParametersA-4 Oracle Database Advanced Security Administrator's GuideThere are three classes of parameters used to

Strona 322

Data Encryption and Integrity ParametersData Encryption and Integrity Parameters A-5on the value set for SQLNET.ENCRYPTION_SERVER at the other end of

Strona 323 - Directory

xxxixNew Features in Enterprise User Security Kerberos Authenticated Enterprise UsersKerberos-based authentication to the database is available for u

Strona 324

Data Encryption and Integrity ParametersA-6 Oracle Database Advanced Security Administrator's GuideSQLNET.ENCRYPTION_TYPES_SERVERThis parameter s

Strona 325

Data Encryption and Integrity ParametersData Encryption and Integrity Parameters A-7SQLNET.ENCRYPTION_TYPES_CLIENTThis parameter specifies a list of en

Strona 326

Data Encryption and Integrity ParametersA-8 Oracle Database Advanced Security Administrator's GuideSQLNET.CRYPTO_CHECKSUM_TYPES_CLIENTThis parame

Strona 327

Data Encryption and Integrity ParametersData Encryption and Integrity Parameters A-9If you do not use this parameter, the system uses various sources

Strona 328

Data Encryption and Integrity ParametersA-10 Oracle Database Advanced Security Administrator's Guide

Strona 329

Authentication Parameters B-1BAuthentication ParametersThis appendix illustrates some sample configuration files with the profile file(sqlnet.ora) and the

Strona 330

Parameters for Clients and Servers using RADIUS AuthenticationB-2 Oracle Database Advanced Security Administrator's GuideParameters for Clients a

Strona 331

Parameters for Clients and Servers using RADIUS AuthenticationAuthentication Parameters B-3SQLNET.RADIUS_AUTHENTICATION_TIMEOUTThis parameter sets the

Strona 332 - 3. Click Apply

Parameters for Clients and Servers using RADIUS AuthenticationB-4 Oracle Database Advanced Security Administrator's GuideSQLNET.RADIUS_SECRETThis

Strona 333

Parameters for Clients and Servers using RADIUS AuthenticationAuthentication Parameters B-5SQLNET.RADIUS_ALTERNATE_TIMEOUTThis parameter sets the time

Strona 334

derivative works of the Source Code, whether created by OpenVision or by athird party. The OpenVisioncopyright notice must be preserved if derivative

Strona 335

xl– Oracle Database recognition of standard password verifiers, which is alsonew in this release. Tool Changes– New Tool: Enterprise Security Manager

Strona 336 - SQL> /@connect_identifier

Parameters for Clients and Servers using RADIUS AuthenticationB-6 Oracle Database Advanced Security Administrator's GuideSQLNET.RADIUS_AUTHENTICA

Strona 337

Parameters for Clients and Servers using SSLAuthentication Parameters B-7Initialization File ParametersREMOTE_OS_AUTHENT=FALSEOS_AUTHENT_PREFIX="

Strona 338

Parameters for Clients and Servers using SSLB-8 Oracle Database Advanced Security Administrator's GuideCipher Suite ParametersThis section descri

Strona 339

Parameters for Clients and Servers using SSLAuthentication Parameters B-9 SSL_RSA_WITH_RC4_128_MD5 SSL_RSA_WITH_DES_CBC_SHA SSL_DH_anon_WITH_3DES_E

Strona 340

Parameters for Clients and Servers using SSLB-10 Oracle Database Advanced Security Administrator's GuideSSL Client Authentication ParametersThis

Strona 341

Parameters for Clients and Servers using SSLAuthentication Parameters B-11SSL_SERVER_CERT_DNPurpose Use this parameter to force the server's dist

Strona 342

Parameters for Clients and Servers using SSLB-12 Oracle Database Advanced Security Administrator's GuideWallet LocationFor any application that m

Strona 343

Integrating Authentication Devices Using RADIUS C-1CIntegrating Authentication Devices UsingRADIUSThis appendix describes how third party authenticati

Strona 344

Customizing the RADIUS Challenge-Response User InterfaceC-2 Oracle Database Advanced Security Administrator's GuideCustomizing the RADIUS Challen

Strona 345 - NO-GLOBAL-ROLES Checklist

Oracle Advanced Security FIPS 140-1 Settings D-1DOracle Advanced Security FIPS 140-1SettingsOracle Advanced Security Release 8.1.6 has been validated

Strona 346 - USER-SCHEMA ERROR Checklist

xliOracle9i Release 2 (9.2) New Features in Oracle Advanced SecurityThe new features for Oracle Advanced Security in release 2 (9.2) include thefollow

Strona 347 - DOMAIN-READ-ERROR Checklist

Configuration ParametersD-2 Oracle Database Advanced Security Administrator's Guide Configuration parameters are contained in the sqlnet.ora file t

Strona 348

Configuration ParametersOracle Advanced Security FIPS 140-1 Settings D-3The specified algorithm must be installed or the connection terminates. For FIP

Strona 349

Post Installation ChecksD-4 Oracle Database Advanced Security Administrator's GuidePost Installation ChecksAfter the installation, the following

Strona 350

Physical SecurityOracle Advanced Security FIPS 140-1 Settings D-5Physical SecurityTo comply with FIPS 140-1 Level 2 requirements, tamper-evident seals

Strona 351

Physical SecurityD-6 Oracle Database Advanced Security Administrator's Guide

Strona 352 - ■ Enterprise users

orapki Utility E-1Eorapki UtilityThe orapki utility is provided to manage public key infrastructure (PKI) elements,such as wallets and certificate revo

Strona 353

orapki Utility OverviewE-2 Oracle Database Advanced Security Administrator's Guideorapki Utility OverviewThis command line utility can be used to

Strona 354

Creating Signed Certificates for Testing Purposesorapki Utility E-3Creating Signed Certificates for Testing PurposesThis command line utility provides

Strona 355

Managing Oracle Wallets with orapki UtilityE-4 Oracle Database Advanced Security Administrator's GuideManaging Oracle Wallets with orapki Utility

Strona 356 - Management Realm

Managing Oracle Wallets with orapki Utilityorapki Utility E-5Adding Certificates and Certificate Requests to Oracle Wallets with orapkiTo add a certifica

Strona 358

Managing Certificate Revocation Lists (CRLs) with orapki UtilityE-6 Oracle Database Advanced Security Administrator's GuideExporting Certificates

Strona 359 - Creating New Enterprise Users

orapki Utility Commands Summaryorapki Utility E-7orapki Utility Commands SummaryThis section lists and describes the following orapki commands: orapk

Strona 360

orapki Utility Commands SummaryE-8 Oracle Database Advanced Security Administrator's Guideorapki cert displayPurposeUse this command to display d

Strona 361 - ■ Directory logon

orapki Utility Commands Summaryorapki Utility E-9with no authentication. See "Uploading CRLs to Oracle Internet Directory" onpage 7-42 for m

Strona 362

orapki Utility Commands SummaryE-10 Oracle Database Advanced Security Administrator's Guideorapki crl hashPurposeUse this command to generate a h

Strona 363

orapki Utility Commands Summaryorapki Utility E-11The -ldap parameter specifies the hostname and SSL port for the directory serverfrom where you want t

Strona 364

orapki Utility Commands SummaryE-12 Oracle Database Advanced Security Administrator's Guideorapki wallet addPurposeUse this command to add certifi

Strona 365

orapki Utility Commands Summaryorapki Utility E-13user certificate to a wallet, you must add all the trusted certificates that make upthe certificate cha

Strona 366

orapki Utility Commands SummaryE-14 Oracle Database Advanced Security Administrator's GuideSyntaxTo export a certificate from an Oracle wallet:ora

Strona 367

Entrust-Enabled SSL Authentication F-1FEntrust-Enabled SSL AuthenticationEntrust Authority (formerly known as Entrust/PKI) is a suite of PKI productsp

Strona 368

Part I Getting Started with Oracle AdvancedSecurityThis part introduces Oracle Advanced Security, describing the security solutions itprovides, its fe

Strona 369 - ■ Kerberos

Benefits of Entrust-Enabled Oracle Advanced SecurityF-2 Oracle Database Advanced Security Administrator's GuideBenefits of Entrust-Enabled Oracle

Strona 370

Required System Components for Entrust-Enabled Oracle Advanced SecurityEntrust-Enabled SSL Authentication F-3Required System Components for Entrust-En

Strona 371

Required System Components for Entrust-Enabled Oracle Advanced SecurityF-4 Oracle Database Advanced Security Administrator's GuideEntrust Authori

Strona 372

Entrust Authentication ProcessEntrust-Enabled SSL Authentication F-5Entrust Authority Server Login Feature provides single sign-on by enabling OracleD

Strona 373

Enabling Entrust AuthenticationF-6 Oracle Database Advanced Security Administrator's GuideFigure F–1 Entrust Authentication ProcessEnabling Entru

Strona 374 - Dialog Box

Enabling Entrust AuthenticationEntrust-Enabled SSL Authentication F-7Administrator-Created Entrust ProfilesAdministrators create Entrust profiles as fo

Strona 375

Enabling Entrust AuthenticationF-8 Oracle Database Advanced Security Administrator's GuideInstalling Oracle Advanced Security and Related Product

Strona 376

Enabling Entrust AuthenticationEntrust-Enabled SSL Authentication F-9))Configuring Entrust on a Windows ClientIf the client resides on a Windows platf

Strona 377

Enabling Entrust AuthenticationF-10 Oracle Database Advanced Security Administrator's Guide2.Set the WALLET_LOCATION parameter in the sqlnet.ora

Strona 378

Enabling Entrust AuthenticationEntrust-Enabled SSL Authentication F-115.Start the Oracle database instance.Configuring Entrust on a Windows ServerIf t

Strona 380

Issues and Restrictions that Apply to Entrust-Enabled SSLF-12 Oracle Database Advanced Security Administrator's GuideCreating Entrust-Enabled Dat

Strona 381

Troubleshooting Entrust In Oracle Advanced SecurityEntrust-Enabled SSL Authentication F-13In addition, the following restrictions apply: The use of E

Strona 382

Troubleshooting Entrust In Oracle Advanced SecurityF-14 Oracle Database Advanced Security Administrator's Guide Invalid Entrust initialization fi

Strona 383 - Appendixes

Troubleshooting Entrust In Oracle Advanced SecurityEntrust-Enabled SSL Authentication F-15Action: Ensure that the location of the Entrust initializati

Strona 384

Troubleshooting Entrust In Oracle Advanced SecurityF-16 Oracle Database Advanced Security Administrator's GuideAction: Perform the following task

Strona 385 - Sample sqlnet.ora File

Troubleshooting Entrust In Oracle Advanced SecurityEntrust-Enabled SSL Authentication F-17Search for and locate the string "fail" or "n

Strona 386 - Kerberos

Troubleshooting Entrust In Oracle Advanced SecurityF-18 Oracle Database Advanced Security Administrator's GuideChecklist for Entrust Installation

Strona 387

Using the User Migration Utility G-1GUsing the User Migration UtilityThis chapter describes the User Migration Utility, which can be used to performbu

Strona 388 - SQLNET.ENCRYPTION_CLIENT

Introduction to the User Migration UtilityG-2 Oracle Database Advanced Security Administrator's Guide Provides the infrastructure to enable sing

Strona 389 - SQLNET.CRYPTO_CHECKSUM_CLIENT

Introduction to the User Migration UtilityUsing the User Migration Utility G-3Bulk User Migration Process OverviewBulk user migration is a two-phase p

Strona 390

Introduction to Oracle Advanced Security 1-11Introduction to Oracle Advanced SecurityThis chapter introduces Oracle Advanced Security, summarizing the

Strona 391

Introduction to the User Migration UtilityG-4 Oracle Database Advanced Security Administrator's GuideStep 3: Phase Two Completing the MigrationAf

Strona 392 - ■ MD5: Message Digest 5

Introduction to the User Migration UtilityUsing the User Migration Utility G-5Table G–1 ORCL_GLOBAL_USR_MIGRATION_DATA Table SchemaColumn Name DataTyp

Strona 393

Introduction to the User Migration UtilityG-6 Oracle Database Advanced Security Administrator's GuideWhich Interface Table Column Values Can Be M

Strona 394

Introduction to the User Migration UtilityUsing the User Migration Utility G-7If some users want to retain the objects in their local database schemas

Strona 395 - Authentication Parameters

Prerequisites for Performing MigrationG-8 Oracle Database Advanced Security Administrator's Guide5.Drops or alters the migrating users' loca

Strona 396 - SQLNET.RADIUS_AUTHENTICATION

Prerequisites for Performing MigrationUsing the User Migration Utility G-9Required Directory PrivilegesIn addition to the required database privileges

Strona 397 - SQLNET.RADIUS_SEND_ACCOUNTING

User Migration Utility Command Line SyntaxG-10 Oracle Database Advanced Security Administrator's GuideUser Migration Utility Command Line SyntaxT

Strona 398 - SQLNET.RADIUS_ALTERNATE_PORT

Accessing Help for the User Migration UtilityUsing the User Migration Utility G-11DIRLOCATION=ldap_directory_host:ldap_directory_portUSERSLIST=usernam

Strona 399

User Migration Utility ParametersG-12 Oracle Database Advanced Security Administrator's GuideUser Migration Utility ParametersThe following secti

Strona 400 - Minimum RADIUS Parameters

User Migration Utility ParametersUsing the User Migration Utility G-13Keyword: DIRLOCATIONKeyword: DBADMINSyntax Examples: DBLOCATION=my_oracle.us.ora

Strona 401 - SSL Authentication Parameters

Security Challenges in an Enterprise Environment1-2 Oracle Database Advanced Security Administrator's Guide Security in Enterprise Grid Computin

Strona 402 - Cipher Suite Parameters

User Migration Utility ParametersG-14 Oracle Database Advanced Security Administrator's GuideKeyword: ENTADMINKeyword: USERSValid Values: userDN:

Strona 403 - SSL Version Parameters

User Migration Utility ParametersUsing the User Migration Utility G-15Keyword: USERSLISTKeyword: USERSFILEDescription: Specifies which users are to be

Strona 404

User Migration Utility ParametersG-16 Oracle Database Advanced Security Administrator's GuideKeyword: MAPSCHEMAValid Values: schema_type:schema_n

Strona 405

User Migration Utility ParametersUsing the User Migration Utility G-17Keyword: MAPTYPEValid Values: mapping_type:mapping_levelMapping type can be: DB

Strona 406 - Wallet Location

User Migration Utility ParametersG-18 Oracle Database Advanced Security Administrator's GuideKeyword: CASCADEKeyword: CONTEXTValid Values: NOWh

Strona 407

User Migration Utility ParametersUsing the User Migration Utility G-19Keyword: LOGFILEKeyword: PARFILEDefault Setting: This value is automatically pop

Strona 408

User Migration Utility Usage ExamplesG-20 Oracle Database Advanced Security Administrator's GuideUser Migration Utility Usage ExamplesThe followi

Strona 409 - Settings

User Migration Utility Usage ExamplesUsing the User Migration Utility G-21parameter, the utility runs phase one using the default value, PRIVATE, so a

Strona 410

User Migration Utility Usage ExamplesG-22 Oracle Database Advanced Security Administrator's GuideMapping Users to a Shared Schema Using Different

Strona 411 - FIPS Parameter

User Migration Utility Usage ExamplesUsing the User Migration Utility G-23DBADMIN=system:managerDIRLOCATION=machine2:636ENTADMIN="cn=janeadmin&qu

Strona 412 - Status Information

Security Challenges in an Enterprise EnvironmentIntroduction to Oracle Advanced Security 1-3the amount of information that organizations place on comp

Strona 413 - Physical Security

User Migration Utility Usage ExamplesG-24 Oracle Database Advanced Security Administrator's GuideExample G–3 Migrating Users with Shared Schema M

Strona 414

User Migration Utility Usage ExamplesUsing the User Migration Utility G-25Migrating Users Using the PARFILE, USERSFILE, and LOGFILE ParametersIt is po

Strona 415 - ■ orapki Utility Overview

Troubleshooting Using the User Migration UtilityG-26 Oracle Database Advanced Security Administrator's GuideExample G–6 Migrating Users Using the

Strona 416 - /private/lhale/cert.txt

Troubleshooting Using the User Migration UtilityUsing the User Migration Utility G-27 Database connection failure Database error: < database_erro

Strona 417 - To view a certificate:

Troubleshooting Using the User Migration UtilityG-28 Oracle Database Advanced Security Administrator's GuideCause: There is no entry for the data

Strona 418

Troubleshooting Using the User Migration UtilityUsing the User Migration Utility G-29 Getting local host name failed Interface table creation in SYS

Strona 419

Troubleshooting Using the User Migration UtilityG-30 Oracle Database Advanced Security Administrator's Guide2.Check to ensure that the file has th

Strona 420 - <certificate_filename>

Troubleshooting Using the User Migration UtilityUsing the User Migration Utility G-31Invalid value : : < user > [ USERSFILE ]Cause: Syntax error

Strona 421

Troubleshooting Using the User Migration UtilityG-32 Oracle Database Advanced Security Administrator's GuideResolving Error Messages Displayed fo

Strona 422 - Prerequisites

Troubleshooting Using the User Migration UtilityUsing the User Migration Utility G-33Action: Specify a different DN for the user.Common Log Messages f

Strona 423 - [-summary

Solving Security Challenges with Oracle Advanced Security1-4 Oracle Database Advanced Security Administrator's GuidePassword-Related ThreatsIn la

Strona 424

Troubleshooting Using the User Migration UtilityG-34 Oracle Database Advanced Security Administrator's GuideSCHEMA column of the interface table

Strona 425

Troubleshooting Using the User Migration UtilityUsing the User Migration Utility G-35Database error: < database_error_message > on page G-27 Bot

Strona 426

Troubleshooting Using the User Migration UtilityG-36 Oracle Database Advanced Security Administrator's GuideInvalid value : : <interface_table

Strona 427

Glossary-1Glossaryaccess controlThe ability of a system to grant or limit access to specific data for specific clients orgroups of clients.Access Contro

Strona 428

Glossary-2authenticationThe process of verifying the identity of a user, device, or other entity in a computersystem, often as a prerequisite to grant

Strona 429

Glossary-3CDSSee Cell Directory Services (CDS)Cell Directory Services (CDS)An external naming method that enablesusers to use Oracle tools transparent

Strona 430

Glossary-4provide additional information about the subject identity, such as postal address, ora challenge password by which the subject entity may la

Strona 431

Glossary-5clientA client relies on a service. A client can sometimes be a user, sometimes a processacting on behalf of the user during a database link

Strona 432

Glossary-6form of a URL. CRL DPs allow revocation information within a single certificateauthority domain to be posted in multiple CRLs. CRL DPs subdiv

Strona 433

Glossary-7A public or private database link from one database to another is created on thelocal database by a DBA or user.A global database link is cr

Strona 434 - Creating Entrust Profiles

Solving Security Challenges with Oracle Advanced SecurityIntroduction to Oracle Advanced Security 1-5Data EncryptionSensitive information that travels

Strona 435 - User-Created Entrust Profiles

Glossary-8Diffie-Hellman key negotiation algorithmThis is a method that lets two parties communicating over an insecure channel toagree upon a random n

Strona 436

Glossary-9domainAny tree or subtree within the Domain Name System (DNS) namespace. Domainmost commonly refers to a group of computers whose host names

Strona 437

Glossary-10enterprise userA user defined and managed in a directory. Each enterprise user has a uniqueidentify across an enterprise.entryThe building b

Strona 438

Glossary-11Global Directory Service (GDS)GDS is the DCE directory service that acts as an agent between DCE CDS and anyX.500 directory service. Both G

Strona 439

Glossary-12identity management realmA subtree in Oracle Internet Directory, including not only an Oracle Context, butalso additional subtrees for user

Strona 440

Glossary-13KDCKey Distribution Center. In Kerberos authentication, the KDC maintains a list ofuser principals and is contacted through the kinit (okin

Strona 441

Glossary-14kserviceAn arbitrary name of a Kerberos service object.LDAPSee Lightweight Directory Access Protocol (LDAP)ldap.ora fileA file created by Ora

Strona 442

Glossary-15man-in-the-middleA security attack characterized by the third-party, surreptitious interception of amessage, wherein the third-party, the m

Strona 443

Glossary-16client requests a directory lookup of a net service alias, the directory determines thatthe entry is a net service alias and completes the

Strona 444

Glossary-17object classA named group of attributes. When you want to assign attributes to an entry, youdo so by assigning to that entry the object cla

Strona 445

vContentsList of FiguresList of TablesSend Us Your Comments ...

Strona 446

Solving Security Challenges with Oracle Advanced Security1-6 Oracle Database Advanced Security Administrator's GuideSelecting the network encrypt

Strona 447

Glossary-18peer identitySSL connect sessions are between a particular client and a particular server. Theidentity of the peer may have been establishe

Strona 448

Glossary-19principalA string that uniquely identifies a client or server to which a set of Kerberoscredentials is assigned. It generally has three part

Strona 449

Glossary-20mathematically related, it is generally viewed as computationally infeasible toderive the private key from the public key. Public and priva

Strona 450

Glossary-21schema mappingSee user-schema mappingSecure Hash Algorithm (SHA)An algorithm that assures data integrity by generating a 160-bit cryptograp

Strona 451

Glossary-22service ticketTrusted information used to authenticate the client. A ticket-granting ticket, whichis also known as the initial ticket, is o

Strona 452 - Phase Two?

Glossary-23single sign-on (SSO)The ability of a user to authenticate once, combined with strong authenticationoccurring transparently in subsequent co

Strona 453 - Migration Process

Glossary-24System Global Area (SGA)A group of shared memory structures that contain data and control information foran Oracle instance.system identifie

Strona 454 - Required Database Privileges

Glossary-25is being validated as the entity it claims to be. Typically, the certificate authoritiesyou trust are called trusted certificates. If there a

Strona 455 - Required Directory Privileges

Glossary-26Wallet Resource LocatorA wallet resource locator (WRL) provides all necessary information to locate awallet. It is a path to an operating s

Strona 456

Index-1IndexAaccounting, RADIUS, 5-19activating checksumming and encryption, 3-6adapters, 1-15asynchronous authentication mode inRADIUS, 5-5ATTENTION_

Strona 457

Solving Security Challenges with Oracle Advanced SecurityIntroduction to Oracle Advanced Security 1-7197, Advanced Encryption Standard (AES) is a new

Strona 458 - Keyword: DBLOCATION

Index-2on the server, 7-15thin JDBC support, 4-1connectingacross cells, 10-12to an Oracle databaseto verify roles, 10-14to an Oracle server in DCE, 10

Strona 459 - Keyword: DBADMIN

Index-3enterprise user securitycomponents, 11-25configuration flow chart, 12-3configuration roadmap, 12-4directory entries, 11-11enterprise domains, 1

Strona 460 - Keyword: USERS

Index-4Oracle O3LOGON, 4-2thin driver features, 4-2Java Database connectivity (JDBC)implementation of Oracle AdvancedSecurity, 4-1JDBC. See Java Datab

Strona 461 - Keyword: USERSFILE

Index-5Oracle service names, 10-3loading into CDS, 10-22Oracle Wallet Managerimporting PKCS #7 certificate chains, 8-22OracleContextAdmins group, 11-1

Strona 462 - Keyword: MAPSCHEMA

Index-6challenge-responseauthentication, 5-5user interface, C-1, C-2configuring, 5-9database links not supported, 5-2, 11-24location of secret key, 5-

Strona 463 - Keyword: MAPTYPE

Index-7SQLNET.KERBEROS5_CONF parameter, 6-9SQLNET.KERBEROS5_CONF_MIT parameter, 6-9SQLNET.KERBEROS5_KEYTAB parameter, 6-9SQLNET.KERBEROS5_REALMS param

Strona 464 - Keyword: CONTEXT

Index-8TLS See Secure Sockets Layer (SSL)tnsnames.ora fileloading into CDS using tnnfg, 10-22modifying to load connect descriptors intoCDS, 10-21renam

Strona 465 - Keyword: PARFILE

Index-9managing certificates, 8-20managing trusted certificates, 8-25opening, 8-13Oracle Applications wallet location, 8-18saving, 8-17setting locatio

Strona 466

Index-10

Strona 467

Solving Security Challenges with Oracle Advanced Security1-8 Oracle Database Advanced Security Administrator's GuideStrong AuthenticationAuthenti

Strona 468

Solving Security Challenges with Oracle Advanced SecurityIntroduction to Oracle Advanced Security 1-9How Centralized Network Authentication Works Figu

Strona 469 - DIRLOCATION=machine2:636

Solving Security Challenges with Oracle Advanced Security1-10 Oracle Database Advanced Security Administrator's Guide3.The client passes these cr

Strona 470

Solving Security Challenges with Oracle Advanced SecurityIntroduction to Oracle Advanced Security 1-11protocol. RADIUS can be used with a variety of a

Strona 471

Solving Security Challenges with Oracle Advanced Security1-12 Oracle Database Advanced Security Administrator's GuideOracle Advanced Security SSL

Strona 472

Solving Security Challenges with Oracle Advanced SecurityIntroduction to Oracle Advanced Security 1-13Enterprise User ManagementEnterprise user manage

Strona 473

Solving Security Challenges with Oracle Advanced Security1-14 Oracle Database Advanced Security Administrator's Guide Passwords Kerberos Secur

Strona 474

Oracle Advanced Security ArchitectureIntroduction to Oracle Advanced Security 1-15Oracle Advanced Security ArchitectureOracle Advanced Security comple

Strona 475

vi2 Configuration and Administration Tools OverviewNetwork Encryption and Strong Authentication Configuration Tools...

Strona 476

Secure Data Transfer Across Network Protocol Boundaries1-16 Oracle Database Advanced Security Administrator's GuideFigure 1–6 Oracle Net with Aut

Strona 477

Oracle Advanced Security RestrictionsIntroduction to Oracle Advanced Security 1-17Oracle Advanced Security RestrictionsOracle Applications support Ora

Strona 478

Oracle Advanced Security Restrictions1-18 Oracle Database Advanced Security Administrator's Guide

Strona 479

Configuration and Administration Tools Overview 2-12Configuration and Administration ToolsOverviewConfiguring advanced security features for an Oracle d

Strona 480

Network Encryption and Strong Authentication Configuration Tools2-2 Oracle Database Advanced Security Administrator's GuideNetwork Encryption and

Strona 481

Network Encryption and Strong Authentication Configuration ToolsConfiguration and Administration Tools Overview 2-3To start Oracle Net Manager as a sta

Strona 482

Network Encryption and Strong Authentication Configuration Tools2-4 Oracle Database Advanced Security Administrator's GuideFigure 2–1 Oracle Adva

Strona 483

Network Encryption and Strong Authentication Configuration ToolsConfiguration and Administration Tools Overview 2-5Authentication Property Sheet Use th

Strona 484 - Glossary-2

Public Key Infrastructure Credentials Management Tools2-6 Oracle Database Advanced Security Administrator's GuidePublic Key Infrastructure Creden

Strona 485 - Glossary-3

Public Key Infrastructure Credentials Management ToolsConfiguration and Administration Tools Overview 2-7 (UNIX) From $ORACLE_HOME/bin, enter the foll

Strona 486 - Glossary-4

vii4 Configuring Network Data Encryption and Integrity for Thin JDBC ClientsAbout the Java Implementation...

Strona 487 - Glossary-5

Public Key Infrastructure Credentials Management Tools2-8 Oracle Database Advanced Security Administrator's GuideNavigator Pane The navigator pan

Strona 488 - Glossary-6

Public Key Infrastructure Credentials Management ToolsConfiguration and Administration Tools Overview 2-9text box. To request a certificate from a certi

Strona 489 - Glossary-7

Public Key Infrastructure Credentials Management Tools2-10 Oracle Database Advanced Security Administrator's GuideMenusYou use Oracle Wallet Mana

Strona 490 - Glossary-8

Public Key Infrastructure Credentials Management ToolsConfiguration and Administration Tools Overview 2-11Operations Menu Table 2–4 describes the conte

Strona 491 - Glossary-9

Public Key Infrastructure Credentials Management Tools2-12 Oracle Database Advanced Security Administrator's GuideHelp Menu Table 2–5 describes t

Strona 492 - Glossary-10

Enterprise User Security Configuration and Management ToolsConfiguration and Administration Tools Overview 2-13Enterprise User Security Configuration an

Strona 493 - Glossary-11

Enterprise User Security Configuration and Management Tools2-14 Oracle Database Advanced Security Administrator's GuideStarting Database Configur

Strona 494 - Glossary-12

Enterprise User Security Configuration and Management ToolsConfiguration and Administration Tools Overview 2-15 Logging in to Enterprise Security Mana

Strona 495 - Glossary-13

Enterprise User Security Configuration and Management Tools2-16 Oracle Database Advanced Security Administrator's Guide OracleAS Single Sign-On

Strona 496 - Glossary-14

Enterprise User Security Configuration and Management ToolsConfiguration and Administration Tools Overview 2-17Figure 2–4 Directory Server Login Window

Strona 497 - Glossary-15

viiiTask 1: Install Kerberos... 6-2Task 2

Strona 498 - Glossary-16

Enterprise User Security Configuration and Management Tools2-18 Oracle Database Advanced Security Administrator's GuideFigure 2–5 Enterprise Secu

Strona 499 - Glossary-17

Enterprise User Security Configuration and Management ToolsConfiguration and Administration Tools Overview 2-19 Right-click an enterprise domain to pe

Strona 500 - Glossary-18

Enterprise User Security Configuration and Management Tools2-20 Oracle Database Advanced Security Administrator's GuideFigure 2–6 Enterprise Secu

Strona 501 - Glossary-19

Enterprise User Security Configuration and Management ToolsConfiguration and Administration Tools Overview 2-21File Menu Table 2–9 describes the conten

Strona 502 - Glossary-20

Enterprise User Security Configuration and Management Tools2-22 Oracle Database Advanced Security Administrator's GuideEnterprise Security Manage

Strona 503 - Glossary-21

Enterprise User Security Configuration and Management ToolsConfiguration and Administration Tools Overview 2-23Figure 2–7 Enterprise Security Manager C

Strona 504 - Glossary-22

Enterprise User Security Configuration and Management Tools2-24 Oracle Database Advanced Security Administrator's GuideFigure 2–8 ESM Console URL

Strona 505 - Glossary-23

Enterprise User Security Configuration and Management ToolsConfiguration and Administration Tools Overview 2-25a. Select krbPrincipalName in the left c

Strona 506 - Glossary-24

Enterprise User Security Configuration and Management Tools2-26 Oracle Database Advanced Security Administrator's GuideHome Tabbed Window The Hom

Strona 507 - Glossary-25

Enterprise User Security Configuration and Management ToolsConfiguration and Administration Tools Overview 2-27The Group subtab (shown in Figure 2–11 o

Strona 508 - Glossary-26

ixHow SSL Works with Other Authentication Methods... 7-10SSL and Firewalls...

Strona 509

Enterprise User Security Configuration and Management Tools2-28 Oracle Database Advanced Security Administrator's GuideFigure 2–11 Enterprise Sec

Strona 510

Enterprise User Security Configuration and Management ToolsConfiguration and Administration Tools Overview 2-29Figure 2–12 Enterprise Security Manager

Strona 511

Enterprise User Security Configuration and Management Tools2-30 Oracle Database Advanced Security Administrator's GuideRealm Configuration Tabbed

Strona 512

Enterprise User Security Configuration and Management ToolsConfiguration and Administration Tools Overview 2-31Enterprise Security Manager Command-Line

Strona 513

Enterprise User Security Configuration and Management Tools2-32 Oracle Database Advanced Security Administrator's GuideOracle Net Configuration As

Strona 514

Enterprise User Security Configuration and Management ToolsConfiguration and Administration Tools Overview 2-33After you start this tool, you will be p

Strona 515

Duties of a Security Administrator/DBA2-34 Oracle Database Advanced Security Administrator's Guidephase one, it populates a table with database u

Strona 516

Duties of an Enterprise User Security Administrator/DBAConfiguration and Administration Tools Overview 2-35Duties of an Enterprise User Security Admini

Strona 517

Duties of an Enterprise User Security Administrator/DBA2-36 Oracle Database Advanced Security Administrator's GuideTable 2–15 Common Enterprise U

Strona 518 - Index-10

Duties of an Enterprise User Security Administrator/DBAConfiguration and Administration Tools Overview 2-37Manage user wallets on the local system orup

Komentarze do niniejszej Instrukcji

Brak uwag