Oracle Advanced Security Administrator's Guide Release 8.1.7 Part Number A85430-01 |
|
Welcome to the Administrator's Guide for Release 8.1.7 of Oracle Advanced Security (formerly Oracle Advanced Networking Option).
Oracle Advanced Security includes a comprehensive suite of security features that protect enterprise networks and securely extend them to the Internet. It provides a single source of integration with multiple network encryption and authentication solutions, single sign-on services, and security protocols.
This Administrator's Guide describes how to implement, configure and administer Oracle Advanced Security.
This guide is intended for users or systems professionals involved with the implementation, configuration, and administration of Oracle Advanced Security including:
This guide is organized into the following parts:
Each part describes a different set of Oracle Advanced Security features.
This chapter provides an overview of Oracle Advanced Security features provided with this release.
This chapter describes how to configure data encryption and integrity within an existing Net8 Release 8.1.7 network.
This chapter provides an overview of the Java implementation of Oracle Advanced Security, which allows Thin Java Database Connectivity (JDBC) clients to connect securely to Oracle8i databases.
This chapter describes how to configure Oracle for use with RADIUS (Remote Authentication Dial-In User Service). It provides an overview of how RADIUS works within an Oracle environment, and describes how to enable RADIUS authentication and accounting. It also introduces the challenge-response user interface that third party vendors can customize to integrate with third party authentication devices.
This chapter describes how to configure Oracle for use with CyberSafe, and provides a brief overview of steps to configure CyberSafe to authenticate Oracle users.
This chapter describes how to configure Oracle for use with MIT Kerberos and provides a brief overview of steps to configure Kerberos to authenticate Oracle users.
This chapter describes how to configure SecurID authentication in combination with the Oracle server and Oracle clients for use with the Security Dynamics ACE/Server and token cards. It includes system requirements, known limitations, and troubleshooting information.
This chapter describes how to configure and use Oracle biometric authentication, which enables use of the Identix fingerprint authentication device.
This chapter describes the SSL feature of Oracle Advanced Security and explains how to configure SSL.
This chapter describes how to configure and use Entrust-enabled Oracle Advanced Security for Secure Socket Layer (SSL) authentication.
This chapter describes the authentication methods that can be used with Oracle Advanced Security, and how to user conventional user name and password authentication. It also describes how to configure the network so that Oracle clients can user a specific authentication method, and Oracle servers can accept any method specified.
This chapter provides a brief discussion of Open Software Foundation (OSF) DCE and Oracle DCE Integration.
This chapter describes what you need to do to configure DCE to use Oracle DCE Integration. It also describes how to configure the DCE CDS naming adapter.
This chapter describes the DCE parameters that you need to add to the configuration files to enable clients and servers to access Oracle servers in the DCE environment. It also describes some Oracle Server configuration that you need to perform, such as setting up DCE groups to map to external roles. Additionally, it describes how to configure clients to use the DCE CDS naming adapter.
This chapter describes how to connect to an Oracle database in a DCE environment.
This chapter describes how clients outside of DCE can access Oracle databases using another protocol such as TCP/IP.
This chapter describes Oracle directory and security integration. It describes its components and provides an overview of the interaction between the components.
This chapter describes how to configure and use the Oracle Wallet Manager.
This chapter describes how to configure and use the Oracle Enterprise Login Assistant.
This chapter describes how an Enterprise DBA uses Oracle Enterprise Security Manager to administer database security in an enterprise domain of Oracle8i databases.
This appendix describes Oracle Advanced Security data encryption and integrity configuration parameters.
This appendix describes Oracle Advanced Security authentication configuration file parameters.
This appendix explains how third party authentication device vendors can integrate their devices and customize the graphical user interface used in RADIUS challenge-response authentication.
This appendix describes the Sqlnet.ora configuration parameters required to comply with the FIPS 140-1 Level 2 evaluated configuration.
This appendix describes the object classes and attributes defined in the LDAP directory schema for Oracle database security.
This appendix provides an overview of components and usage of the Oracle implementation of Java SSL.
Refer to the appropriate Oracle platform-specific documentation to install and configure Oracle Advanced Security software on your particular platform.
In addition, see the following:
Table 0-1 defines abbreviations and acronyms used in this document:
The following syntax conventions are used in this guide:
|
![]() Copyright © 1996-2000, Oracle Corporation. All Rights Reserved. |
|