Oracle Database B10772-01 Bedienungsanleitung Seite 1

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Datenbanksoftware Oracle Database B10772-01 herunter. Oracle Database B10772-01 User's Manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 518
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 0
Oracle
Database
Advanced Security Administrator's Guide
10g Release 1 (10.1)
Part No. B10772-01
December 2003
Seitenansicht 0
1 2 3 4 5 6 ... 517 518

Inhaltsverzeichnis

Seite 1 - Database

OracleDatabaseAdvanced Security Administrator's Guide10g Release 1 (10.1)Part No. B10772-01December 2003

Seite 2

xOpening an Existing Wallet... 8-13Closing a Walle

Seite 3

Duties of an Enterprise User Security Administrator/DBA2-38 Oracle Database Advanced Security Administrator's Guide

Seite 4

Part II Network Data Encryption and IntegrityThis part describes how to configure data encryption and integrity for your existingOracle network, and fo

Seite 6

Configuring Network Data Encryption and Integrity for Oracle Servers and Clients 3-13Configuring Network Data Encryption andIntegrity for Oracle Server

Seite 7

Oracle Advanced Security Encryption3-2 Oracle Database Advanced Security Administrator's GuideAbout EncryptionThe purpose of a secure cryptosyste

Seite 8

Oracle Advanced Security Data IntegrityConfiguring Network Data Encryption and Integrity for Oracle Servers and Clients 3-3of message security, but wit

Seite 9

Diffie-Hellman Based Key Management3-4 Oracle Database Advanced Security Administrator's Guide Data modification attackThis type of attack occurs

Seite 10 - Advanced Security

How To Configure Data Encryption and IntegrityConfiguring Network Data Encryption and Integrity for Oracle Servers and Clients 3-5Oracle Advanced Secur

Seite 11

How To Configure Data Encryption and Integrity3-6 Oracle Database Advanced Security Administrator's GuideAbout Activating Encryption and Integrit

Seite 12

How To Configure Data Encryption and IntegrityConfiguring Network Data Encryption and Integrity for Oracle Servers and Clients 3-7 REQUESTED REQUIRED

Seite 13 - B Authentication Parameters

xiTask 1: Create New Principals and Accounts... 10-5Task 2: Install the Key of t

Seite 14 - E orapki Utility

How To Configure Data Encryption and Integrity3-8 Oracle Database Advanced Security Administrator's GuideIn this scenario, this side of the conne

Seite 15

How To Configure Data Encryption and IntegrityConfiguring Network Data Encryption and Integrity for Oracle Servers and Clients 3-9the sqlnet.crypto_see

Seite 16 - Glossary

How To Configure Data Encryption and Integrity3-10 Oracle Database Advanced Security Administrator's GuideFigure 3–1 Oracle Advanced Security Enc

Seite 17

How To Configure Data Encryption and IntegrityConfiguring Network Data Encryption and Integrity for Oracle Servers and Clients 3-118. Repeat this proce

Seite 18 - List of Figures

How To Configure Data Encryption and Integrity3-12 Oracle Database Advanced Security Administrator's Guide1.Navigate to the Oracle Advanced Secur

Seite 19

How To Configure Data Encryption and IntegrityConfiguring Network Data Encryption and Integrity for Oracle Servers and Clients 3-136. Choose File >

Seite 20

How To Configure Data Encryption and Integrity3-14 Oracle Database Advanced Security Administrator's Guide

Seite 21 - List of Tables

Configuring Network Data Encryption and Integrity for Thin JDBC Clients 4-14Configuring Network Data Encryption andIntegrity for Thin JDBC ClientsThis

Seite 22

About the Java Implementation4-2 Oracle Database Advanced Security Administrator's GuideMicrosystems defined the JDBC standard and Oracle Corporat

Seite 23 - Send Us Your Comments

About the Java ImplementationConfiguring Network Data Encryption and Integrity for Thin JDBC Clients 4-3Oracle Advanced Security continues to encrypt a

Seite 24

xiiConsiderations for Choosing Authentication Types between Clients, Databases, andDirectories for Enterprise User Security...

Seite 25 - ■ Audience

Configuration Parameters4-4 Oracle Database Advanced Security Administrator's Guidethe code. The process leaves the original program structure in

Seite 26 - Organization

Configuration ParametersConfiguring Network Data Encryption and Integrity for Thin JDBC Clients 4-5Client Encryption Selected List: ORACLE.NET.ENCRYPTI

Seite 27

Configuration Parameters4-6 Oracle Database Advanced Security Administrator's GuideClient Integrity Selected List: ORACLE.NET.CRYPTO_CHEKSUM_TYPE

Seite 28

Part III Oracle Advanced Security StrongAuthenticationThis part describes how to configure strong authentication methods for yourexisting Oracle networ

Seite 30

Configuring RADIUS Authentication 5-15Configuring RADIUS AuthenticationThis chapter describes how to configure an Oracle Database server for use withRAD

Seite 31 - Conventions

RADIUS Overview5-2 Oracle Database Advanced Security Administrator's Guidechange the authentication method without modifying either the Oracle cl

Seite 32 - Conventions in Code Examples

RADIUS Authentication ModesConfiguring RADIUS Authentication 5-3A RADIUS server vendor is often the authentication server vendor as well, in whichcase

Seite 33

RADIUS Authentication Modes5-4 Oracle Database Advanced Security Administrator's GuideFigure 5–2 Synchronous Authentication Sequence1.A user logs

Seite 34

RADIUS Authentication ModesConfiguring RADIUS Authentication 5-5Example: Synchronous Authentication with SecurID Token CardsWith SecurID authentication

Seite 35

xiiiBrowsing Users in the Directory... 13-12Administering Ent

Seite 36 - Documentation Accessibility

RADIUS Authentication Modes5-6 Oracle Database Advanced Security Administrator's GuideFigure 5–3 Asynchronous Authentication Sequence1.A user see

Seite 37

RADIUS Authentication ModesConfiguring RADIUS Authentication 5-72. The Oracle database server, acting as the RADIUS client, passes the data fromthe Ora

Seite 38

Enabling RADIUS Authentication, Authorization, and Accounting5-8 Oracle Database Advanced Security Administrator's GuideThe Oracle client sends t

Seite 39

Enabling RADIUS Authentication, Authorization, and AccountingConfiguring RADIUS Authentication 5-9 Task 9: Configure Mapping RolesTask 1: Install RADIU

Seite 40 - ■ Tool Changes

Enabling RADIUS Authentication, Authorization, and Accounting5-10 Oracle Database Advanced Security Administrator's GuideFigure 5–4 Oracle Advanc

Seite 41

Enabling RADIUS Authentication, Authorization, and AccountingConfiguring RADIUS Authentication 5-11Create the RADIUS Secret Key File on the Oracle Data

Seite 42

Enabling RADIUS Authentication, Authorization, and Accounting5-12 Oracle Database Advanced Security Administrator's GuideFigure 5–5 Oracle Advanc

Seite 43

Enabling RADIUS Authentication, Authorization, and AccountingConfiguring RADIUS Authentication 5-13OS_AUTHENT_PREFIX=""Step 3: Configure Addi

Seite 44

Enabling RADIUS Authentication, Authorization, and Accounting5-14 Oracle Database Advanced Security Administrator's Guide5.Choose File > Save

Seite 45

Enabling RADIUS Authentication, Authorization, and AccountingConfiguring RADIUS Authentication 5-15To configure challenge-response:1. If you are using J

Seite 46 - ■ Common Security Threats

xivC Integrating Authentication Devices Using RADIUSAbout the RADIUS Challenge-Response User Interface...

Seite 47 - Common Security Threats

Enabling RADIUS Authentication, Authorization, and Accounting5-16 Oracle Database Advanced Security Administrator's Guide6.In the Interface Class

Seite 48 - Password-Related Threats

Enabling RADIUS Authentication, Authorization, and AccountingConfiguring RADIUS Authentication 5-17Task 3: Create a User and Grant AccessTo grant user

Seite 49 - Data Encryption

Enabling RADIUS Authentication, Authorization, and Accounting5-18 Oracle Database Advanced Security Administrator's Guide3.Add externally identifi

Seite 50

Enabling RADIUS Authentication, Authorization, and AccountingConfiguring RADIUS Authentication 5-19Ensure that RADIUS groups which map to Oracle roles

Seite 51 - Data Integrity

Enabling RADIUS Authentication, Authorization, and Accounting5-20 Oracle Database Advanced Security Administrator's GuideTask 6: Add the RADIUS C

Seite 52 - Strong Authentication

Enabling RADIUS Authentication, Authorization, and AccountingConfiguring RADIUS Authentication 5-21Task 9: Configure Mapping RolesIf the RADIUS server s

Seite 53

Using RADIUS to Log In to a Database5-22 Oracle Database Advanced Security Administrator's GuideUsing RADIUS to Log In to a DatabaseIf you are us

Seite 54 - ■ Entrust/PKI

RSA ACE/Server Configuration ChecklistConfiguring RADIUS Authentication 5-23See Also: RSA ACE/Server documentation for specificinformation about trouble

Seite 55 - ■ DCE Communication/Security

RSA ACE/Server Configuration Checklist5-24 Oracle Database Advanced Security Administrator's Guide

Seite 56

Configuring Kerberos Authentication 6-16Configuring Kerberos AuthenticationThis chapter describes how to configure Oracle Advanced Security for OracleDa

Seite 57 - Enterprise User Management

xvorapki wallet create... E-13orapki

Seite 58

Enabling Kerberos Authentication6-2 Oracle Database Advanced Security Administrator's GuideEnabling Kerberos AuthenticationTo enable Kerberos aut

Seite 59

Enabling Kerberos AuthenticationConfiguring Kerberos Authentication 6-3For example, if kservice is oracle, the fully qualified name of the system onwhic

Seite 60

Enabling Kerberos Authentication6-4 Oracle Database Advanced Security Administrator's Guide1.Enter the following to extract the service table:kad

Seite 61

Enabling Kerberos AuthenticationConfiguring Kerberos Authentication 6-5Task 5: Install Oracle Net Services and Oracle Advanced SecurityInstall Oracle N

Seite 62

Enabling Kerberos Authentication6-6 Oracle Database Advanced Security Administrator's GuideFigure 6–1 Oracle Advanced Security Authentication Win

Seite 63 - Overview

Enabling Kerberos AuthenticationConfiguring Kerberos Authentication 6-7Figure 6–2 Oracle Advanced Security Other Params Window (Kerberos)7.From the Aut

Seite 64 - Oracle Net Manager

Enabling Kerberos Authentication6-8 Oracle Database Advanced Security Administrator's GuideThe sqlnet.ora file is updated with the following entri

Seite 65

Enabling Kerberos AuthenticationConfiguring Kerberos Authentication 6-9Parameter: SQLNET.KERBEROS5_CLOCKSKEW=number_of_seconds_accepted_as_network_dela

Seite 66 - ■ SSL Property Sheet

Enabling Kerberos Authentication6-10 Oracle Database Advanced Security Administrator's GuideTask 8: Create a Kerberos UserTo create Oracle users

Seite 67

Utilities for the Kerberos Authentication AdapterConfiguring Kerberos Authentication 6-11Task 10: Get an Initial Ticket for the Kerberos/Oracle UserBef

Seite 68 - Oracle Wallet Manager

xviPrerequisites for Performing Migration... G-8Required Database

Seite 69

Utilities for the Kerberos Authentication Adapter6-12 Oracle Database Advanced Security Administrator's GuideDisplaying Credentials with the okli

Seite 70

Configuring Interoperability with a Windows 2000 Domain Controller KDCConfiguring Kerberos Authentication 6-13% oklist -f27-Jul-1999 21:57:51 28-Jul-

Seite 71

Configuring Interoperability with a Windows 2000 Domain Controller KDC6-14 Oracle Database Advanced Security Administrator's Guide Task 2: Config

Seite 72

Configuring Interoperability with a Windows 2000 Domain Controller KDCConfiguring Kerberos Authentication 6-15Step 2: Specifying Oracle Configuration P

Seite 73

Configuring Interoperability with a Windows 2000 Domain Controller KDC6-16 Oracle Database Advanced Security Administrator's GuideFor example, if

Seite 74

Configuring Interoperability with a Windows 2000 Domain Controller KDCConfiguring Kerberos Authentication 6-17Task 3: Configuring an Oracle Database to

Seite 75

Troubleshooting6-18 Oracle Database Advanced Security Administrator's GuideTroubleshootingThis section lists some common configuration problems an

Seite 76

Configuring Secure Sockets Layer Authentication 7-17Configuring Secure Sockets LayerAuthenticationThis chapter describes how to configure and use the Se

Seite 77

SSL and TLS in an Oracle Environment7-2 Oracle Database Advanced Security Administrator's GuideSSL and TLS in an Oracle EnvironmentSecure Sockets

Seite 78

SSL and TLS in an Oracle EnvironmentConfiguring Secure Sockets Layer Authentication 7-3About Using SSLOracle Advanced Security supports authentication

Seite 80

SSL and TLS in an Oracle Environment7-4 Oracle Database Advanced Security Administrator's GuideHow SSL Works in an Oracle Environment: The SSL Ha

Seite 81

Public Key Infrastructure in an Oracle EnvironmentConfiguring Secure Sockets Layer Authentication 7-5Public Key Infrastructure in an Oracle Environment

Seite 82

Public Key Infrastructure in an Oracle Environment7-6 Oracle Database Advanced Security Administrator's GuidePublic Key Infrastructure Components

Seite 83

Public Key Infrastructure in an Oracle EnvironmentConfiguring Secure Sockets Layer Authentication 7-7A certificate contains the entity's name, publ

Seite 84

Public Key Infrastructure in an Oracle Environment7-8 Oracle Database Advanced Security Administrator's GuideWalletsA wallet is a container that

Seite 85

Public Key Infrastructure in an Oracle EnvironmentConfiguring Secure Sockets Layer Authentication 7-9Note: Currently only nCipher devices are certified

Seite 86

SSL Combined with Other Authentication Methods7-10 Oracle Database Advanced Security Administrator's GuideSSL Combined with Other Authentication

Seite 87

SSL Combined with Other Authentication MethodsConfiguring Secure Sockets Layer Authentication 7-11Figure 7–1 SSL in Relation to Other Authentication Me

Seite 88

SSL and Firewalls7-12 Oracle Database Advanced Security Administrator's GuideSSL and FirewallsOracle Advanced Security supports two types of firew

Seite 89 - ■ Edit history for the group

SSL and FirewallsConfiguring Secure Sockets Layer Authentication 7-13Note: Although Oracle Connection Manager can be used to avoidopening up multiple S

Seite 90

xviiiList of Figures1–1 Encryption ...

Seite 91

SSL Usage Issues7-14 Oracle Database Advanced Security Administrator's GuideSSL Usage IssuesConsider the following issues when using SSL: SSL us

Seite 92

Enabling SSLConfiguring Secure Sockets Layer Authentication 7-15Enabling SSLTo enable SSL: Task 1: Install Oracle Advanced Security and Related Produc

Seite 93

Enabling SSL7-16 Oracle Database Advanced Security Administrator's GuideManager. The wallet should contain a certificate with a status of "Re

Seite 94

Enabling SSLConfiguring Secure Sockets Layer Authentication 7-17The sqlnet.ora and listener.ora files are updated with the followingentries:wallet_locat

Seite 95 - User Migration Utility

Enabling SSL7-18 Oracle Database Advanced Security Administrator's Guide Prioritize cipher suites starting with the strongest and moving to the

Seite 96

Enabling SSLConfiguring Secure Sockets Layer Authentication 7-19To specify cipher suites for the server:1. Navigate to the SSL tab of the Oracle Advanc

Seite 97

Enabling SSL7-20 Oracle Database Advanced Security Administrator's GuideFigure 7–3 Oracle Advanced Security SSL Window (Server)4. Use the up and

Seite 98

Enabling SSLConfiguring Secure Sockets Layer Authentication 7-21To set the SSL version for the server:1. Navigate to the SSL tab of the Oracle Advanced

Seite 99

Enabling SSL7-22 Oracle Database Advanced Security Administrator's GuideFigure 7–4 Oracle Advanced Security SSL Window (Server)2.Uncheck Require

Seite 100

Enabling SSLConfiguring Secure Sockets Layer Authentication 7-23To set the SQLNET.AUTHENTICATION_SERVICES parameter on the server:Add TCP/IP with SSL (

Seite 101

xix11–3 Related Entries in a Realm Oracle Context... 11-1612–1 Enterprise User Securi

Seite 102

Enabling SSL7-24 Oracle Database Advanced Security Administrator's GuideStep 1: Confirm Client Wallet CreationBefore proceeding with the next ste

Seite 103

Enabling SSLConfiguring Secure Sockets Layer Authentication 7-25(SECURITY=(SSL_SERVER_CERT_DN="cn=finance,cn=OracleContext,c=us,o=acme"))The

Seite 104 - Triple-DES Support

Enabling SSL7-26 Oracle Database Advanced Security Administrator's Guide1.Navigate to the Oracle Advanced Security profile. (See "Navigating

Seite 105 - DES40 Algorithm

Enabling SSLConfiguring Secure Sockets Layer Authentication 7-27 No (default): SSL checks for a match between the DN and the service name,but does not

Seite 106 - See Also:

Enabling SSL7-28 Oracle Database Advanced Security Administrator's GuideStep 4: Set the Client SSL Cipher Suites (Optional)A cipher suite is a se

Seite 107 - Authentication Key Fold-in

Enabling SSLConfiguring Secure Sockets Layer Authentication 7-29To specify client cipher suites:1. Navigate to the SSL tab of the Oracle Advanced Secur

Seite 108 - ■ ACCEPTED

Enabling SSL7-30 Oracle Database Advanced Security Administrator's Guide4.Use the up and down arrows to prioritize the cipher suites.5. Choose Fi

Seite 109 - REQUIRED

Troubleshooting SSLConfiguring Secure Sockets Layer Authentication 7-31Oracle Advanced Security. For example, use this parameter if you want the server

Seite 110

Troubleshooting SSL7-32 Oracle Database Advanced Security Administrator's Guide Ensure that the correct wallet location is specified in the sqlne

Seite 111

Troubleshooting SSLConfiguring Secure Sockets Layer Authentication 7-33Action: Check the following: Ensure that the correct wallet location is specifie

Seite 112 - ■ REQUIRED

Oracle Database Advanced Security Administrator's Guide, 10g Release 1 (10.1)Part No. B10772-01Copyright © 1996, 2003 Oracle Corporation. All ri

Seite 114

Troubleshooting SSL7-34 Oracle Database Advanced Security Administrator's Guide A certificate authority for one of the certificates in the chain i

Seite 115

Certificate Validation with Certificate Revocation ListsConfiguring Secure Sockets Layer Authentication 7-35does not give the complete chain and you do

Seite 116

Certificate Validation with Certificate Revocation Lists7-36 Oracle Database Advanced Security Administrator's GuideHow CRL Checking WorksCertific

Seite 117 - About the Java Implementation

Certificate Validation with Certificate Revocation ListsConfiguring Secure Sockets Layer Authentication 7-37Configuring Certificate Validation with Certi

Seite 118 - Securing Thin JDBC

Certificate Validation with Certificate Revocation Lists7-38 Oracle Database Advanced Security Administrator's GuideFigure 7–7 Oracle Advanced Se

Seite 119 - Obfuscation

Certificate Validation with Certificate Revocation ListsConfiguring Secure Sockets Layer Authentication 7-393.(Optional) If CRLs are stored on your loc

Seite 120 - Configuration Parameters

Certificate Validation with Certificate Revocation Lists7-40 Oracle Database Advanced Security Administrator's Guide5.Choose File > Save Netwo

Seite 121 - Configuration Parameters

Certificate Validation with Certificate Revocation ListsConfiguring Secure Sockets Layer Authentication 7-41You can also use LDAP command-line tools to

Seite 122

Certificate Validation with Certificate Revocation Lists7-42 Oracle Database Advanced Security Administrator's Guideissuer's name. Then when

Seite 123 - Part III

Certificate Validation with Certificate Revocation ListsConfiguring Secure Sockets Layer Authentication 7-43permission to add CRLs to the CRL subtree,

Seite 124

xxiList of Tables1–1 Authentication Methods and System Requirements ... 1-172–1 Oracle Wallet Manage

Seite 125 - RADIUS Overview

Certificate Validation with Certificate Revocation Lists7-44 Oracle Database Advanced Security Administrator's Guidefollowing at the command line

Seite 126

Certificate Validation with Certificate Revocation ListsConfiguring Secure Sockets Layer Authentication 7-45[-summary]where issuer_name is the name of

Seite 127 - RADIUS Authentication Modes

Certificate Validation with Certificate Revocation Lists7-46 Oracle Database Advanced Security Administrator's GuideOracle Net Tracing File Error

Seite 128

Certificate Validation with Certificate Revocation ListsConfiguring Secure Sockets Layer Authentication 7-472. If necessary, use the orapki utility to

Seite 129

Configuring Your System to Use Hardware Security Modules7-48 Oracle Database Advanced Security Administrator's GuideConfiguring Your System to Use

Seite 130

Configuring Your System to Use Hardware Security ModulesConfiguring Secure Sockets Layer Authentication 7-49Configuring Your System to Use nCipher Hardw

Seite 131

Configuring Your System to Use Hardware Security Modules7-50 Oracle Database Advanced Security Administrator's Guide (UNIX) /opt/nfast (Windows

Seite 132

Configuring Your System to Use Hardware Security ModulesConfiguring Secure Sockets Layer Authentication 7-51Error Messages Associated with Using Hardwa

Seite 133

Configuring Your System to Use Hardware Security Modules7-52 Oracle Database Advanced Security Administrator's GuideNote: The nCipher log file is

Seite 134

Using Oracle Wallet Manager 8-18Using Oracle Wallet ManagerSecurity administrators use Oracle Wallet ManagerOracle Wallet Manager tomanage public key

Seite 135

xxii11–3 Enterprise User Security: Supported Authentication Types for Connections betweenClients, Databases, and Directories ...

Seite 136

Oracle Wallet Manager Overview8-2 Oracle Database Advanced Security Administrator's GuideOracle Wallet Manager OverviewOracle Wallet Manager is a

Seite 137 - ■ Configure Challenge-Response

Oracle Wallet Manager OverviewUsing Oracle Wallet Manager 8-3Strong Wallet EncryptionOracle Wallet Manager stores private keys associated with X.509 c

Seite 138

Oracle Wallet Manager Overview8-4 Oracle Database Advanced Security Administrator's Guidecryptography standards called Public-Key Cryptography St

Seite 139

Oracle Wallet Manager OverviewUsing Oracle Wallet Manager 8-5legal usage combinations). There must be a one-to-one mapping between certificaterequests

Seite 140

Oracle Wallet Manager Overview8-6 Oracle Database Advanced Security Administrator's GuideYou should obtain certificates from the certificate author

Seite 141

Starting Oracle Wallet ManagerUsing Oracle Wallet Manager 8-7LDAP Directory SupportOracle Wallet Manager can upload wallets to and retrieve them from

Seite 142

How To Create a Complete Wallet: Process Overview8-8 Oracle Database Advanced Security Administrator's GuideHow To Create a Complete Wallet: Proc

Seite 143

Managing WalletsUsing Oracle Wallet Manager 8-9client wallets. It is only optional for products that take the wallet password atthe time of startup.Af

Seite 144

Managing Wallets8-10 Oracle Database Advanced Security Administrator's GuidePasswords must contain at least eight characters that consist of alph

Seite 145

Managing WalletsUsing Oracle Wallet Manager 8-115. Click OK to continue. If the entered password does not conform to the requiredguidelines, then the

Seite 146

xxiiiSend Us Your CommentsOracle Database Advanced Security Administrator's Guide, 10g Release 1 (10.1)Part No. B10772-01Oracle Corporation welc

Seite 147

Managing Wallets8-12 Oracle Database Advanced Security Administrator's Guide6.In the PKCS11 library filename field, enter the path to the directory

Seite 148

Managing WalletsUsing Oracle Wallet Manager 8-13Opening an Existing WalletOpen a wallet that already exists in the file system directory as follows:1.

Seite 149 - ■ Troubleshooting

Managing Wallets8-14 Oracle Database Advanced Security Administrator's GuideFor other operating systems, see the Oracle documentation for that sp

Seite 150 - Task 1: Install Kerberos

Managing WalletsUsing Oracle Wallet Manager 8-151. Choose Operations > Export Wallet... The Export Wallet dialog box appears.2. Enter the destinat

Seite 151

Managing Wallets8-16 Oracle Database Advanced Security Administrator's Guide If no certificates have SSL key usage: When prompted, enter the user

Seite 152

Managing WalletsUsing Oracle Wallet Manager 8-17If Oracle Wallet Manager cannot open the target wallet using the walletpassword, then check to make su

Seite 153

Managing Wallets8-18 Oracle Database Advanced Security Administrator's Guide (UNIX) ORACLE_HOME/admin/ORACLE_SID (Windows) ORACLE_BASE\ORACLE_H

Seite 154

Managing WalletsUsing Oracle Wallet Manager 8-19To change the password for the current open wallet:1. Choose Wallet > Change Password. The Change W

Seite 155 - ■ Clock Skew

Managing Certificates8-20 Oracle Database Advanced Security Administrator's Guide1.Choose Wallet from the menu bar.2. Uncheck Auto Login. A messa

Seite 156

Managing CertificatesUsing Oracle Wallet Manager 8-21 Importing the User Certificate into the Wallet Removing a User Certificate from a Wallet Removi

Seite 158

Managing Certificates8-22 Oracle Database Advanced Security Administrator's GuideTable 8–6 lists the available key sizes and the relative securit

Seite 159

Managing CertificatesUsing Oracle Wallet Manager 8-23certificates, including the user's certificate and all of the supporting CA and subCAcertificat

Seite 160

Managing Certificates8-24 Oracle Database Advanced Security Administrator's GuideManager main panel, and the status of the corresponding entry in

Seite 161

Managing CertificatesUsing Oracle Wallet Manager 8-25Exporting a User Certificate RequestTo save the certificate request in a file system directory, exp

Seite 162 - Domain Controller KDC

Managing Certificates8-26 Oracle Database Advanced Security Administrator's Guide3.Choose Paste the Certificate, and click OK. Another Import Trus

Seite 163 - Oracle Client

Managing CertificatesUsing Oracle Wallet Manager 8-27A dialog panel warns you that your user certificate will no longer beverifiable by its recipients i

Seite 164

Managing Certificates8-28 Oracle Database Advanced Security Administrator's Guide

Seite 165 - Controller KDC

Configuring Multiple Authentication Methods and Disabling Oracle Advanced Security 9-19Configuring Multiple AuthenticationMethods and Disabling Oracle

Seite 166 - Troubleshooting

Disabling Oracle Advanced Security Authentication9-2 Oracle Database Advanced Security Administrator's GuideFor example:% sqlplus scott/tiger@emp

Seite 167 - Authentication

Disabling Oracle Advanced Security AuthenticationConfiguring Multiple Authentication Methods and Disabling Oracle Advanced Security 9-3Figure 9–1 Oracl

Seite 168 - ■ About Using SSL

xxvPrefaceWelcome to the Oracle Database Advanced Security Administrator's Guide for the10g Release 1 (10.1) of Oracle Advanced Security.Oracle A

Seite 169 - About Using SSL

Configuring Multiple Authentication Methods9-4 Oracle Database Advanced Security Administrator's GuideConfiguring Multiple Authentication MethodsM

Seite 170

Configuring Oracle Database for External AuthenticationConfiguring Multiple Authentication Methods and Disabling Oracle Advanced Security 9-5Configuring

Seite 171 - About Public Key Cryptography

Configuring Oracle Database for External Authentication9-6 Oracle Database Advanced Security Administrator's GuideIf REMOTE_OS_AUTHENT is set to

Seite 172 - Certificates

Configuring Oracle Database for External AuthenticationConfiguring Multiple Authentication Methods and Disabling Oracle Advanced Security 9-7See Also:

Seite 173 - Certificate Revocation Lists

Configuring Oracle Database for External Authentication9-8 Oracle Database Advanced Security Administrator's Guide

Seite 174 - Hardware security modules

Configuring Oracle DCE Integration 10-110Configuring Oracle DCE IntegrationOracle DCE Integration enables Oracle applications and tools to access Oracl

Seite 175

Introduction to Oracle DCE Integration10-2 Oracle Database Advanced Security Administrator's GuideIntroduction to Oracle DCE IntegrationThe Distr

Seite 176

Introduction to Oracle DCE IntegrationConfiguring Oracle DCE Integration 10-3DCE Communication/SecurityThis component has three principal features:Auth

Seite 177

Introduction to Oracle DCE Integration10-4 Oracle Database Advanced Security Administrator's GuideThe DCE CDS offers a distributed, replicated re

Seite 178 - SSL and Firewalls

Configuring DCE for Oracle DCE IntegrationConfiguring Oracle DCE Integration 10-5 Only one listener address that uses the DCE protocol is permitted fo

Seite 179

xxviAudienceThe Oracle Database Advanced Security Administrator's Guide is intended forusers and systems professionals involved with the implemen

Seite 180 - SSL Usage Issues

Configuring DCE for Oracle DCE Integration10-6 Oracle Database Advanced Security Administrator's GuideTask 2: Install the Key of the Server into

Seite 181 - Enabling SSL

Configuring DCE for Oracle DCE IntegrationConfiguring Oracle DCE Integration 10-7cdscp> create dir /.:/subsys/oraclecdscp> create dir /.:/subsys/

Seite 182 - Important:

Configuring Oracle Database and Oracle Net Services for Oracle DCE Integration10-8 Oracle Database Advanced Security Administrator's GuideConfigur

Seite 183

Configuring Oracle Database and Oracle Net Services for Oracle DCE IntegrationConfiguring Oracle DCE Integration 10-9You can specify a service as follo

Seite 184

Configuring Oracle Database and Oracle Net Services for Oracle DCE Integration10-10 Oracle Database Advanced Security Administrator's Guide2.For

Seite 185 - (Figure 7–3):

Configuring Oracle Database and Oracle Net Services for Oracle DCE IntegrationConfiguring Oracle DCE Integration 10-111. Verify that these lines are in

Seite 186

Configuring Oracle Database and Oracle Net Services for Oracle DCE Integration10-12 Oracle Database Advanced Security Administrator's GuideIf con

Seite 187

Configuring Oracle Database and Oracle Net Services for Oracle DCE IntegrationConfiguring Oracle DCE Integration 10-133. Ensure that the DCE groups tha

Seite 188

Configuring Oracle Database and Oracle Net Services for Oracle DCE Integration10-14 Oracle Database Advanced Security Administrator's GuideLocal

Seite 189

Configuring Oracle Database and Oracle Net Services for Oracle DCE IntegrationConfiguring Oracle DCE Integration 10-15Task 4: Configure DCE for SYSDBA a

Seite 190 - TCP/IP with SSL on the Client

xxviiPart III, "Oracle Advanced Security Strong Authentication"Chapter 5, "Configuring RADIUS Authentication"This chapter describes

Seite 191

Configuring Oracle Database and Oracle Net Services for Oracle DCE Integration10-16 Oracle Database Advanced Security Administrator's Guide

Seite 192

Configuring Oracle Database and Oracle Net Services for Oracle DCE IntegrationConfiguring Oracle DCE Integration 10-17 protocol.ora sqlnet.oraTypical

Seite 193

Configuring Oracle Database and Oracle Net Services for Oracle DCE Integration10-18 Oracle Database Advanced Security Administrator's Guidegreate

Seite 194

Configuring Oracle Database and Oracle Net Services for Oracle DCE IntegrationConfiguring Oracle DCE Integration 10-19Task 6: Configure Clients to Use D

Seite 195

Configuring Oracle Database and Oracle Net Services for Oracle DCE Integration10-20 Oracle Database Advanced Security Administrator's GuideFor ex

Seite 196

Configuring Oracle Database and Oracle Net Services for Oracle DCE IntegrationConfiguring Oracle DCE Integration 10-212. Restart CDS on the system.The

Seite 197 - Troubleshooting SSL

Configuring Oracle Database and Oracle Net Services for Oracle DCE Integration10-22 Oracle Database Advanced Security Administrator's GuideStep 4

Seite 198

Connecting to an Oracle Database Server in the DCE EnvironmentConfiguring Oracle DCE Integration 10-23For a client or server to use DCE CDS Naming, the

Seite 199

Connecting to an Oracle Database Server in the DCE Environment10-24 Oracle Database Advanced Security Administrator's Guide3.Verify that the serv

Seite 200

Connecting Clients Outside DCE to Oracle Servers in DCEConfiguring Oracle DCE Integration 10-25For example:% sqlplus /@ORADCEConnecting to an Oracle Da

Seite 201 - What CRLs Should You Use?

xxviiiparameters, and how clients outside of DCE can access Oracle databases usinganother protocol such as TCP/IP.Part IV, "Enterprise User Secur

Seite 202 - How CRL Checking Works

Connecting Clients Outside DCE to Oracle Servers in DCE10-26 Oracle Database Advanced Security Administrator's Guide The listener.ora File The

Seite 203

Connecting Clients Outside DCE to Oracle Servers in DCEConfiguring Oracle DCE Integration 10-27 (SID_NAME=ORASID) (ORACLE_HOME=/usr/prod/or

Seite 204 - Checking Selected

Connecting Clients Outside DCE to Oracle Servers in DCE10-28 Oracle Database Advanced Security Administrator's GuideTo access the DB1 database, a

Seite 205

Part IV Enterprise User SecurityThis part describes Oracle Database directory and security integration functionality,which enables single sign-on in a

Seite 207 - Displaying orapki Help

Getting Started with Enterprise User Security 11-111Getting Started with Enterprise UserSecurityEnterprise User Security, a critical component of Orac

Seite 208

Introduction to Enterprise User Security11-2 Oracle Database Advanced Security Administrator's GuideIntroduction to Enterprise User SecurityThis

Seite 209

Introduction to Enterprise User SecurityGetting Started with Enterprise User Security 11-3Enterprise User Security: The Big PictureEnterprise User Sec

Seite 210

Introduction to Enterprise User Security11-4 Oracle Database Advanced Security Administrator's GuideFigure 11–1 Enterprise User Security and the

Seite 211

Introduction to Enterprise User SecurityGetting Started with Enterprise User Security 11-5Single password authentication lets users authenticate to mu

Seite 212 - 3. CRL DP

xxixAppendix D, "Oracle Advanced Security FIPS 140-1 Settings"This appendix describes the sqlnet.ora configuration parameters required tocomp

Seite 213

Introduction to Enterprise User Security11-6 Oracle Database Advanced Security Administrator's GuideAbout Identity Management Realms An identity

Seite 214 - Security

Introduction to Enterprise User SecurityGetting Started with Enterprise User Security 11-7name (DN). When enterprise users log on to a database, the d

Seite 215

Introduction to Enterprise User Security11-8 Oracle Database Advanced Security Administrator's GuideAbout Enterprise User SchemasEnterprise users

Seite 216 - ■ (Windows) C:\nfast

Introduction to Enterprise User SecurityGetting Started with Enterprise User Security 11-9How Enterprise Users Access Database Resources with Database

Seite 217

Introduction to Enterprise User Security11-10 Oracle Database Advanced Security Administrator's GuideTable 11–1 Enterprise User Security Authenti

Seite 218 - /log/logfile

Introduction to Enterprise User SecurityGetting Started with Enterprise User Security 11-11About Enterprise User Security Directory EntriesIn a direct

Seite 219 - Using Oracle Wallet Manager

Introduction to Enterprise User Security11-12 Oracle Database Advanced Security Administrator's GuideThe entries described in the following secti

Seite 220 - Wallet Password Management

Introduction to Enterprise User SecurityGetting Started with Enterprise User Security 11-13Figure 11–2 Example of Enterprise RolesAcme Widgets(Enterpr

Seite 221 - Backward Compatibility

Introduction to Enterprise User Security11-14 Oracle Database Advanced Security Administrator's GuideAn enterprise role can be assigned to one or

Seite 222 - Multiple Certificate Support

Introduction to Enterprise User SecurityGetting Started with Enterprise User Security 11-15Database Server EntriesA database server entry (represented

Seite 223

responsible for the performance of the Kerberos software, does not provide technical support for thesoftware, and shall not be liable for any damages

Seite 224

xxxPrinted documentation is available for sale in the Oracle Store athttp://oraclestore.oracle.com/To download free release notes, installation docume

Seite 225 - LDAP Directory Support

Introduction to Enterprise User Security11-16 Oracle Database Advanced Security Administrator's GuideFigure 11–3 Related Entries in a Realm Oracl

Seite 226

Introduction to Enterprise User SecurityGetting Started with Enterprise User Security 11-17Administrative GroupsAn identity management realm contains

Seite 227 - Managing Wallets

Introduction to Enterprise User Security11-18 Oracle Database Advanced Security Administrator's GuideTable 11–2 Administrative Groups in a Realm

Seite 228 - Creating a New Wallet

About Using Shared Schemas for Enterprise User SecurityGetting Started with Enterprise User Security 11-19About Using Shared Schemas for Enterprise Us

Seite 229

About Using Shared Schemas for Enterprise User Security11-20 Oracle Database Advanced Security Administrator's Guide Each enterprise user can be

Seite 230

About Using Shared Schemas for Enterprise User SecurityGetting Started with Enterprise User Security 11-21multiple enterprise users (shared schema). T

Seite 231 - Importing Third-Party Wallets

About Using Shared Schemas for Enterprise User Security11-22 Oracle Database Advanced Security Administrator's GuideFor example, suppose that Har

Seite 232

About Using Current User Database Links for Enterprise User SecurityGetting Started with Enterprise User Security 11-23About Using Current User Databa

Seite 233

About Using Current User Database Links for Enterprise User Security11-24 Oracle Database Advanced Security Administrator's GuideSSL to authentic

Seite 234

Enterprise User Security Deployment ConsiderationsGetting Started with Enterprise User Security 11-25Enterprise User Security Deployment Consideration

Seite 235 - Saving in System Default

xxxi Applied Cryptography, Second Edition: Protocols, Algorithms, and Source Code inC by Bruce Schneier. New York: John Wiley & Sons, 1996. SSL

Seite 236 - Changing the Password

Enterprise User Security Deployment Considerations11-26 Oracle Database Advanced Security Administrator's GuideSecurity of Password-Authenticated

Seite 237 - Using Auto Login

Enterprise User Security Deployment ConsiderationsGetting Started with Enterprise User Security 11-27Protecting Database Password VerifiersThe OracleP

Seite 238 - Managing Certificates

Enterprise User Security Deployment Considerations11-28 Oracle Database Advanced Security Administrator's GuideConsiderations for Choosing Authen

Seite 239 - Adding a Certificate Request

Enterprise User Security Configuration Tasks and Troubleshooting 12-112Enterprise User Security ConfigurationTasks and TroubleshootingThis chapter desc

Seite 240 - Managing Certificates

Enterprise User Security Configuration Overview12-2 Oracle Database Advanced Security Administrator's GuideRegardless of the authentication metho

Seite 241

Enterprise User Security Configuration OverviewEnterprise User Security Configuration Tasks and Troubleshooting 12-3Figure 12–1 Enterprise User Securit

Seite 242 - Exporting a User Certificate

Enterprise User Security Configuration Roadmap12-4 Oracle Database Advanced Security Administrator's GuideFor brevity, some product names and fea

Seite 243 - Managing Trusted Certificates

Preparing the Directory for Enterprise User SecurityEnterprise User Security Configuration Tasks and Troubleshooting 12-5– "Configuring Enterprise

Seite 244

Preparing the Directory for Enterprise User Security12-6 Oracle Database Advanced Security Administrator's GuideTask 3: Identity administrative u

Seite 245

Preparing the Directory for Enterprise User SecurityEnterprise User Security Configuration Tasks and Troubleshooting 12-7Task 5: (Optional) Configure yo

Seite 246

xxxiiConventions in Code ExamplesCode examples illustrate SQL, PL/SQL, SQL*Plus, or other command-linestatements. They are displayed in a monospace (fi

Seite 247

Preparing the Directory for Enterprise User Security12-8 Oracle Database Advanced Security Administrator's GuideTask 6: Register the database in

Seite 248 - % sqlplus scott/tiger@emp

Preparing the Directory for Enterprise User SecurityEnterprise User Security Configuration Tasks and Troubleshooting 12-9 After creating the wallet, D

Seite 249

Preparing the Directory for Enterprise User Security12-10 Oracle Database Advanced Security Administrator's Guide4.Choose Finish if you are only

Seite 250

Configuring Enterprise User Security Objects in the Database and the DirectoryEnterprise User Security Configuration Tasks and Troubleshooting 12-11Aft

Seite 251

Configuring Enterprise User Security Objects in the Database and the Directory12-12 Oracle Database Advanced Security Administrator's GuideTo con

Seite 252

Configuring Enterprise User Security Objects in the Database and the DirectoryEnterprise User Security Configuration Tasks and Troubleshooting 12-13Alt

Seite 253

Configuring Enterprise User Security Objects in the Database and the Directory12-14 Oracle Database Advanced Security Administrator's GuideTask 3

Seite 254

Configuring Enterprise User Security Objects in the Database and the DirectoryEnterprise User Security Configuration Tasks and Troubleshooting 12-154.

Seite 255

Configuring Enterprise User Security for Password Authentication12-16 Oracle Database Advanced Security Administrator's GuideFor more information

Seite 256 - System Requirements

Configuring Enterprise User Security for Password AuthenticationEnterprise User Security Configuration Tasks and Troubleshooting 12-17 Task 1: (Option

Seite 257 - DCE Communication/Security

xxxiiiConvention Meaning Example[ ] Brackets enclose one or more optionalitems. Do not enter the brackets.DECIMAL (digits [ , precision ]){ } Braces e

Seite 258 - Release Limitations

Configuring Enterprise User Security for Kerberos Authentication12-18 Oracle Database Advanced Security Administrator's GuideTask 3: Connect as a

Seite 259

Configuring Enterprise User Security for Kerberos AuthenticationEnterprise User Security Configuration Tasks and Troubleshooting 12-19 You have prepar

Seite 260

Configuring Enterprise User Security for Kerberos Authentication12-20 Oracle Database Advanced Security Administrator's GuideKerberos Principal N

Seite 261

Configuring Enterprise User Security for SSL AuthenticationEnterprise User Security Configuration Tasks and Troubleshooting 12-21If the KDC is part of

Seite 262 - Integration

Configuring Enterprise User Security for SSL Authentication12-22 Oracle Database Advanced Security Administrator's Guide– Database certificate DN

Seite 263 - Task 1: Configure the Server

Configuring Enterprise User Security for SSL AuthenticationEnterprise User Security Configuration Tasks and Troubleshooting 12-233. Click Apply.For mor

Seite 264

Configuring Enterprise User Security for SSL Authentication12-24 Oracle Database Advanced Security Administrator's Guideclient cannot have a wall

Seite 265

Enabling Current User Database LinksEnterprise User Security Configuration Tasks and Troubleshooting 12-25To view the database DN so you can request a

Seite 266

Troubleshooting Enterprise User Security12-26 Oracle Database Advanced Security Administrator's GuideTroubleshooting Enterprise User SecurityThis

Seite 267

Troubleshooting Enterprise User SecurityEnterprise User Security Configuration Tasks and Troubleshooting 12-275. Use Database Configuration Assistant to

Seite 268

xxxivConventions for Windows Operating SystemsThe following table describes conventions for Windows operating systems andprovides examples of their us

Seite 269

Troubleshooting Enterprise User Security12-28 Oracle Database Advanced Security Administrator's GuideORA-28272: Domain policy does not allow pass

Seite 270 - Task 5: Configure the Client

Troubleshooting Enterprise User SecurityEnterprise User Security Configuration Tasks and Troubleshooting 12-293. Use Enterprise Security Manager to che

Seite 271 - DCE.PROTECTION

Troubleshooting Enterprise User Security12-30 Oracle Database Advanced Security Administrator's GuideCause: Indicates a problem with the connecti

Seite 272 - DCE.LOCAL_CELL_USERNAMES

Troubleshooting Enterprise User SecurityEnterprise User Security Configuration Tasks and Troubleshooting 12-312. Check that there is a value for the at

Seite 273

Troubleshooting Enterprise User Security12-32 Oracle Database Advanced Security Administrator's Guide2.If these values are incorrect, reset the d

Seite 274

Troubleshooting Enterprise User SecurityEnterprise User Security Configuration Tasks and Troubleshooting 12-334. Check that the LDAP_DIRECTORY_ACCESS p

Seite 275

Troubleshooting Enterprise User Security12-34 Oracle Database Advanced Security Administrator's Guide1.Check that the global role has been create

Seite 276

Troubleshooting Enterprise User SecurityEnterprise User Security Configuration Tasks and Troubleshooting 12-35Use the following syntax to view the DN t

Seite 277 - Starting the Listener

Troubleshooting Enterprise User Security12-36 Oracle Database Advanced Security Administrator's Guide1.Use Enterprise Security Manager to check t

Seite 278

Troubleshooting Enterprise User SecurityEnterprise User Security Configuration Tasks and Troubleshooting 12-37– If the database connects to the directo

Seite 279 - Sample Parameter Files

xxxvSpecial characters The backslash (\) special character issometimes required as an escapecharacter for the double quotation mark(") special ch

Seite 280 - The listener.ora File

Troubleshooting Enterprise User Security12-38 Oracle Database Advanced Security Administrator's Guide

Seite 281 - The tnsnames.ora File

Administering Enterprise User Security 13-113 Administering Enterprise User SecurityThis chapter describes how to use Enterprise Security Manager to a

Seite 282

Enterprise User Security Administration Tools Overview13-2 Oracle Database Advanced Security Administrator's GuideEnterprise User Security Admini

Seite 283 - Enterprise User Security

Administering Identity Management RealmsAdministering Enterprise User Security 13-3Administering Identity Management RealmsAn identity management real

Seite 284

Administering Identity Management Realms13-4 Oracle Database Advanced Security Administrator's GuideIdentity Management Realm VersionsEnterprise

Seite 285

Administering Identity Management RealmsAdministering Enterprise User Security 13-5Setting Properties of an Identity Management RealmAn identity manag

Seite 286

Administering Identity Management Realms13-6 Oracle Database Advanced Security Administrator's Guide3.In the Realm Information window, enter the

Seite 287

Administering Identity Management RealmsAdministering Enterprise User Security 13-7Managing Identity Management Realm AdministratorsAn identity manage

Seite 288

Administering Enterprise Users13-8 Oracle Database Advanced Security Administrator's GuideAdministering Enterprise UsersEnterprise Security Manag

Seite 289

Administering Enterprise UsersAdministering Enterprise User Security 13-9Creating New Enterprise UsersUse Enterprise Security Manager to create users

Seite 290

xxxviDocumentation AccessibilityOur goal is to make Oracle products, services, and supporting documentationaccessible, with good usability, to the dis

Seite 291

Administering Enterprise Users13-10 Oracle Database Advanced Security Administrator's Guide2.Choose the Users and Groups tab.3. In the Users and

Seite 292 - About Enterprise User Schemas

Administering Enterprise UsersAdministering Enterprise User Security 13-11The enterprise user password is used for: Directory logon Database logon,

Seite 293

Administering Enterprise Users13-12 Oracle Database Advanced Security Administrator's GuideFigure 13–3 Enterprise Security Manager: Add Enterpris

Seite 294

Administering Enterprise UsersAdministering Enterprise User Security 13-13A list of all users that match your search criteria displays. You can browse

Seite 295 - Enterprise Users

Administering Enterprise Users13-14 Oracle Database Advanced Security Administrator's GuideNote that you can also browse enterprise users in the

Seite 296 - Enterprise Roles

Administering Enterprise DomainsAdministering Enterprise User Security 13-15Administering Enterprise DomainsAn identity management realm contains an e

Seite 297

Administering Enterprise Domains13-16 Oracle Database Advanced Security Administrator's GuideCreating a New Enterprise DomainIf you do not want t

Seite 298 - Enterprise Domains

Administering Enterprise DomainsAdministering Enterprise User Security 13-17 Select Remove Enterprise Domain from the Operations menu. Select an ent

Seite 299 - Database Server Entries

Administering Enterprise Domains13-18 Oracle Database Advanced Security Administrator's GuideTo remove a database from an enterprise domain:1. Se

Seite 300 - OracleUserSecurityAdmins

Administering Enterprise DomainsAdministering Enterprise User Security 13-192. Select a new database to be added to the enterprise domain.3. Choose OK

Seite 301 - Administrative Groups

xxxviiWhat's New in Oracle Advanced Security?This section describes new features of Oracle Advanced Security 10g Release 1(10.1) and provides poi

Seite 302

Administering Enterprise Domains13-20 Oracle Database Advanced Security Administrator's GuideManaging Enterprise Domain AdministratorsAn Enterpri

Seite 303

Administering Enterprise DomainsAdministering Enterprise User Security 13-21A database can use a schema mapping to share one database schema betweenmu

Seite 304

Administering Enterprise Domains13-22 Oracle Database Advanced Security Administrator's GuideTo add a new mapping to the list of database schema

Seite 305

Administering Enterprise DomainsAdministering Enterprise User Security 13-234. Enter the name of the database schema for which this Mapping will be ma

Seite 306

Administering Enterprise Domains13-24 Oracle Database Advanced Security Administrator's Guide2.Choose the Accessible Domains tabbed window and cl

Seite 307 - ■ EXTERNALLY

Administering Enterprise DomainsAdministering Enterprise User Security 13-25To remove an enterprise domain from the password-accessible domains list:1

Seite 308

Administering Enterprise Domains13-26 Oracle Database Advanced Security Administrator's GuideSee Also: "Creating New Enterprise Users"

Seite 309

Administering Enterprise RolesAdministering Enterprise User Security 13-27Administering Enterprise RolesAn enterprise domain within an identity manage

Seite 310

Administering Enterprise Roles13-28 Oracle Database Advanced Security Administrator's Guide2.Select the appropriate enterprise domain for the new

Seite 311

Administering Enterprise RolesAdministering Enterprise User Security 13-29Figure 13–12 Enterprise Security Manager: Database Global Roles TabWhen popu

Seite 312 - Typical Configurations

xxxviiiEngineering Task Force (IETF) to be the successor to SSL version 3.0. TLS is aconfigurable option provided in Oracle Net Manager. Support for H

Seite 313 - Tasks and Troubleshooting

Administering Enterprise Roles13-30 Oracle Database Advanced Security Administrator's Guideenabled as its Oracle Net naming method, or if this na

Seite 314

Administering Enterprise RolesAdministering Enterprise User Security 13-31Granting Enterprise Roles to UsersYou can grant an enterprise role to users

Seite 315

Administering Enterprise Roles13-32 Oracle Database Advanced Security Administrator's GuideTo remove a user from the list of enterprise role gran

Seite 316

Part VAppendixesThis part contains the following reference appendixes: Appendix A, "Data Encryption and Integrity Parameters" Appendix B,

Seite 318 - ■ Register databases

Data Encryption and Integrity Parameters A-1AData Encryption and Integrity ParametersThis appendix describes encryption and data integrity parameters

Seite 319

Sample sqlnet.ora FileA-2 Oracle Database Advanced Security Administrator's GuideOracle Advanced Security Encryption#ASO Encryptionsqlnet.encrypt

Seite 320

Data Encryption and Integrity ParametersData Encryption and Integrity Parameters A-3RADIUS#Radiussqlnet.authentication_services = (beq, RADIUS )sqlnet

Seite 321

Data Encryption and Integrity ParametersA-4 Oracle Database Advanced Security Administrator's GuideThere are three classes of parameters used to

Seite 322

Data Encryption and Integrity ParametersData Encryption and Integrity Parameters A-5on the value set for SQLNET.ENCRYPTION_SERVER at the other end of

Seite 323 - Directory

xxxixNew Features in Enterprise User Security Kerberos Authenticated Enterprise UsersKerberos-based authentication to the database is available for u

Seite 324

Data Encryption and Integrity ParametersA-6 Oracle Database Advanced Security Administrator's GuideSQLNET.ENCRYPTION_TYPES_SERVERThis parameter s

Seite 325

Data Encryption and Integrity ParametersData Encryption and Integrity Parameters A-7SQLNET.ENCRYPTION_TYPES_CLIENTThis parameter specifies a list of en

Seite 326

Data Encryption and Integrity ParametersA-8 Oracle Database Advanced Security Administrator's GuideSQLNET.CRYPTO_CHECKSUM_TYPES_CLIENTThis parame

Seite 327

Data Encryption and Integrity ParametersData Encryption and Integrity Parameters A-9If you do not use this parameter, the system uses various sources

Seite 328

Data Encryption and Integrity ParametersA-10 Oracle Database Advanced Security Administrator's Guide

Seite 329

Authentication Parameters B-1BAuthentication ParametersThis appendix illustrates some sample configuration files with the profile file(sqlnet.ora) and the

Seite 330

Parameters for Clients and Servers using RADIUS AuthenticationB-2 Oracle Database Advanced Security Administrator's GuideParameters for Clients a

Seite 331

Parameters for Clients and Servers using RADIUS AuthenticationAuthentication Parameters B-3SQLNET.RADIUS_AUTHENTICATION_TIMEOUTThis parameter sets the

Seite 332 - 3. Click Apply

Parameters for Clients and Servers using RADIUS AuthenticationB-4 Oracle Database Advanced Security Administrator's GuideSQLNET.RADIUS_SECRETThis

Seite 333

Parameters for Clients and Servers using RADIUS AuthenticationAuthentication Parameters B-5SQLNET.RADIUS_ALTERNATE_TIMEOUTThis parameter sets the time

Seite 334

derivative works of the Source Code, whether created by OpenVision or by athird party. The OpenVisioncopyright notice must be preserved if derivative

Seite 335

xl– Oracle Database recognition of standard password verifiers, which is alsonew in this release. Tool Changes– New Tool: Enterprise Security Manager

Seite 336 - SQL> /@connect_identifier

Parameters for Clients and Servers using RADIUS AuthenticationB-6 Oracle Database Advanced Security Administrator's GuideSQLNET.RADIUS_AUTHENTICA

Seite 337

Parameters for Clients and Servers using SSLAuthentication Parameters B-7Initialization File ParametersREMOTE_OS_AUTHENT=FALSEOS_AUTHENT_PREFIX="

Seite 338

Parameters for Clients and Servers using SSLB-8 Oracle Database Advanced Security Administrator's GuideCipher Suite ParametersThis section descri

Seite 339

Parameters for Clients and Servers using SSLAuthentication Parameters B-9 SSL_RSA_WITH_RC4_128_MD5 SSL_RSA_WITH_DES_CBC_SHA SSL_DH_anon_WITH_3DES_E

Seite 340

Parameters for Clients and Servers using SSLB-10 Oracle Database Advanced Security Administrator's GuideSSL Client Authentication ParametersThis

Seite 341

Parameters for Clients and Servers using SSLAuthentication Parameters B-11SSL_SERVER_CERT_DNPurpose Use this parameter to force the server's dist

Seite 342

Parameters for Clients and Servers using SSLB-12 Oracle Database Advanced Security Administrator's GuideWallet LocationFor any application that m

Seite 343

Integrating Authentication Devices Using RADIUS C-1CIntegrating Authentication Devices UsingRADIUSThis appendix describes how third party authenticati

Seite 344

Customizing the RADIUS Challenge-Response User InterfaceC-2 Oracle Database Advanced Security Administrator's GuideCustomizing the RADIUS Challen

Seite 345 - NO-GLOBAL-ROLES Checklist

Oracle Advanced Security FIPS 140-1 Settings D-1DOracle Advanced Security FIPS 140-1SettingsOracle Advanced Security Release 8.1.6 has been validated

Seite 346 - USER-SCHEMA ERROR Checklist

xliOracle9i Release 2 (9.2) New Features in Oracle Advanced SecurityThe new features for Oracle Advanced Security in release 2 (9.2) include thefollow

Seite 347 - DOMAIN-READ-ERROR Checklist

Configuration ParametersD-2 Oracle Database Advanced Security Administrator's Guide Configuration parameters are contained in the sqlnet.ora file t

Seite 348

Configuration ParametersOracle Advanced Security FIPS 140-1 Settings D-3The specified algorithm must be installed or the connection terminates. For FIP

Seite 349

Post Installation ChecksD-4 Oracle Database Advanced Security Administrator's GuidePost Installation ChecksAfter the installation, the following

Seite 350

Physical SecurityOracle Advanced Security FIPS 140-1 Settings D-5Physical SecurityTo comply with FIPS 140-1 Level 2 requirements, tamper-evident seals

Seite 351

Physical SecurityD-6 Oracle Database Advanced Security Administrator's Guide

Seite 352 - ■ Enterprise users

orapki Utility E-1Eorapki UtilityThe orapki utility is provided to manage public key infrastructure (PKI) elements,such as wallets and certificate revo

Seite 353

orapki Utility OverviewE-2 Oracle Database Advanced Security Administrator's Guideorapki Utility OverviewThis command line utility can be used to

Seite 354

Creating Signed Certificates for Testing Purposesorapki Utility E-3Creating Signed Certificates for Testing PurposesThis command line utility provides

Seite 355

Managing Oracle Wallets with orapki UtilityE-4 Oracle Database Advanced Security Administrator's GuideManaging Oracle Wallets with orapki Utility

Seite 356 - Management Realm

Managing Oracle Wallets with orapki Utilityorapki Utility E-5Adding Certificates and Certificate Requests to Oracle Wallets with orapkiTo add a certifica

Seite 358

Managing Certificate Revocation Lists (CRLs) with orapki UtilityE-6 Oracle Database Advanced Security Administrator's GuideExporting Certificates

Seite 359 - Creating New Enterprise Users

orapki Utility Commands Summaryorapki Utility E-7orapki Utility Commands SummaryThis section lists and describes the following orapki commands: orapk

Seite 360

orapki Utility Commands SummaryE-8 Oracle Database Advanced Security Administrator's Guideorapki cert displayPurposeUse this command to display d

Seite 361 - ■ Directory logon

orapki Utility Commands Summaryorapki Utility E-9with no authentication. See "Uploading CRLs to Oracle Internet Directory" onpage 7-42 for m

Seite 362

orapki Utility Commands SummaryE-10 Oracle Database Advanced Security Administrator's Guideorapki crl hashPurposeUse this command to generate a h

Seite 363

orapki Utility Commands Summaryorapki Utility E-11The -ldap parameter specifies the hostname and SSL port for the directory serverfrom where you want t

Seite 364

orapki Utility Commands SummaryE-12 Oracle Database Advanced Security Administrator's Guideorapki wallet addPurposeUse this command to add certifi

Seite 365

orapki Utility Commands Summaryorapki Utility E-13user certificate to a wallet, you must add all the trusted certificates that make upthe certificate cha

Seite 366

orapki Utility Commands SummaryE-14 Oracle Database Advanced Security Administrator's GuideSyntaxTo export a certificate from an Oracle wallet:ora

Seite 367

Entrust-Enabled SSL Authentication F-1FEntrust-Enabled SSL AuthenticationEntrust Authority (formerly known as Entrust/PKI) is a suite of PKI productsp

Seite 368

Part I Getting Started with Oracle AdvancedSecurityThis part introduces Oracle Advanced Security, describing the security solutions itprovides, its fe

Seite 369 - ■ Kerberos

Benefits of Entrust-Enabled Oracle Advanced SecurityF-2 Oracle Database Advanced Security Administrator's GuideBenefits of Entrust-Enabled Oracle

Seite 370

Required System Components for Entrust-Enabled Oracle Advanced SecurityEntrust-Enabled SSL Authentication F-3Required System Components for Entrust-En

Seite 371

Required System Components for Entrust-Enabled Oracle Advanced SecurityF-4 Oracle Database Advanced Security Administrator's GuideEntrust Authori

Seite 372

Entrust Authentication ProcessEntrust-Enabled SSL Authentication F-5Entrust Authority Server Login Feature provides single sign-on by enabling OracleD

Seite 373

Enabling Entrust AuthenticationF-6 Oracle Database Advanced Security Administrator's GuideFigure F–1 Entrust Authentication ProcessEnabling Entru

Seite 374 - Dialog Box

Enabling Entrust AuthenticationEntrust-Enabled SSL Authentication F-7Administrator-Created Entrust ProfilesAdministrators create Entrust profiles as fo

Seite 375

Enabling Entrust AuthenticationF-8 Oracle Database Advanced Security Administrator's GuideInstalling Oracle Advanced Security and Related Product

Seite 376

Enabling Entrust AuthenticationEntrust-Enabled SSL Authentication F-9))Configuring Entrust on a Windows ClientIf the client resides on a Windows platf

Seite 377

Enabling Entrust AuthenticationF-10 Oracle Database Advanced Security Administrator's Guide2.Set the WALLET_LOCATION parameter in the sqlnet.ora

Seite 378

Enabling Entrust AuthenticationEntrust-Enabled SSL Authentication F-115.Start the Oracle database instance.Configuring Entrust on a Windows ServerIf t

Seite 380

Issues and Restrictions that Apply to Entrust-Enabled SSLF-12 Oracle Database Advanced Security Administrator's GuideCreating Entrust-Enabled Dat

Seite 381

Troubleshooting Entrust In Oracle Advanced SecurityEntrust-Enabled SSL Authentication F-13In addition, the following restrictions apply: The use of E

Seite 382

Troubleshooting Entrust In Oracle Advanced SecurityF-14 Oracle Database Advanced Security Administrator's Guide Invalid Entrust initialization fi

Seite 383 - Appendixes

Troubleshooting Entrust In Oracle Advanced SecurityEntrust-Enabled SSL Authentication F-15Action: Ensure that the location of the Entrust initializati

Seite 384

Troubleshooting Entrust In Oracle Advanced SecurityF-16 Oracle Database Advanced Security Administrator's GuideAction: Perform the following task

Seite 385 - Sample sqlnet.ora File

Troubleshooting Entrust In Oracle Advanced SecurityEntrust-Enabled SSL Authentication F-17Search for and locate the string "fail" or "n

Seite 386 - Kerberos

Troubleshooting Entrust In Oracle Advanced SecurityF-18 Oracle Database Advanced Security Administrator's GuideChecklist for Entrust Installation

Seite 387

Using the User Migration Utility G-1GUsing the User Migration UtilityThis chapter describes the User Migration Utility, which can be used to performbu

Seite 388 - SQLNET.ENCRYPTION_CLIENT

Introduction to the User Migration UtilityG-2 Oracle Database Advanced Security Administrator's Guide Provides the infrastructure to enable sing

Seite 389 - SQLNET.CRYPTO_CHECKSUM_CLIENT

Introduction to the User Migration UtilityUsing the User Migration Utility G-3Bulk User Migration Process OverviewBulk user migration is a two-phase p

Seite 390

Introduction to Oracle Advanced Security 1-11Introduction to Oracle Advanced SecurityThis chapter introduces Oracle Advanced Security, summarizing the

Seite 391

Introduction to the User Migration UtilityG-4 Oracle Database Advanced Security Administrator's GuideStep 3: Phase Two Completing the MigrationAf

Seite 392 - ■ MD5: Message Digest 5

Introduction to the User Migration UtilityUsing the User Migration Utility G-5Table G–1 ORCL_GLOBAL_USR_MIGRATION_DATA Table SchemaColumn Name DataTyp

Seite 393

Introduction to the User Migration UtilityG-6 Oracle Database Advanced Security Administrator's GuideWhich Interface Table Column Values Can Be M

Seite 394

Introduction to the User Migration UtilityUsing the User Migration Utility G-7If some users want to retain the objects in their local database schemas

Seite 395 - Authentication Parameters

Prerequisites for Performing MigrationG-8 Oracle Database Advanced Security Administrator's Guide5.Drops or alters the migrating users' loca

Seite 396 - SQLNET.RADIUS_AUTHENTICATION

Prerequisites for Performing MigrationUsing the User Migration Utility G-9Required Directory PrivilegesIn addition to the required database privileges

Seite 397 - SQLNET.RADIUS_SEND_ACCOUNTING

User Migration Utility Command Line SyntaxG-10 Oracle Database Advanced Security Administrator's GuideUser Migration Utility Command Line SyntaxT

Seite 398 - SQLNET.RADIUS_ALTERNATE_PORT

Accessing Help for the User Migration UtilityUsing the User Migration Utility G-11DIRLOCATION=ldap_directory_host:ldap_directory_portUSERSLIST=usernam

Seite 399

User Migration Utility ParametersG-12 Oracle Database Advanced Security Administrator's GuideUser Migration Utility ParametersThe following secti

Seite 400 - Minimum RADIUS Parameters

User Migration Utility ParametersUsing the User Migration Utility G-13Keyword: DIRLOCATIONKeyword: DBADMINSyntax Examples: DBLOCATION=my_oracle.us.ora

Seite 401 - SSL Authentication Parameters

Security Challenges in an Enterprise Environment1-2 Oracle Database Advanced Security Administrator's Guide Security in Enterprise Grid Computin

Seite 402 - Cipher Suite Parameters

User Migration Utility ParametersG-14 Oracle Database Advanced Security Administrator's GuideKeyword: ENTADMINKeyword: USERSValid Values: userDN:

Seite 403 - SSL Version Parameters

User Migration Utility ParametersUsing the User Migration Utility G-15Keyword: USERSLISTKeyword: USERSFILEDescription: Specifies which users are to be

Seite 404

User Migration Utility ParametersG-16 Oracle Database Advanced Security Administrator's GuideKeyword: MAPSCHEMAValid Values: schema_type:schema_n

Seite 405

User Migration Utility ParametersUsing the User Migration Utility G-17Keyword: MAPTYPEValid Values: mapping_type:mapping_levelMapping type can be: DB

Seite 406 - Wallet Location

User Migration Utility ParametersG-18 Oracle Database Advanced Security Administrator's GuideKeyword: CASCADEKeyword: CONTEXTValid Values: NOWh

Seite 407

User Migration Utility ParametersUsing the User Migration Utility G-19Keyword: LOGFILEKeyword: PARFILEDefault Setting: This value is automatically pop

Seite 408

User Migration Utility Usage ExamplesG-20 Oracle Database Advanced Security Administrator's GuideUser Migration Utility Usage ExamplesThe followi

Seite 409 - Settings

User Migration Utility Usage ExamplesUsing the User Migration Utility G-21parameter, the utility runs phase one using the default value, PRIVATE, so a

Seite 410

User Migration Utility Usage ExamplesG-22 Oracle Database Advanced Security Administrator's GuideMapping Users to a Shared Schema Using Different

Seite 411 - FIPS Parameter

User Migration Utility Usage ExamplesUsing the User Migration Utility G-23DBADMIN=system:managerDIRLOCATION=machine2:636ENTADMIN="cn=janeadmin&qu

Seite 412 - Status Information

Security Challenges in an Enterprise EnvironmentIntroduction to Oracle Advanced Security 1-3the amount of information that organizations place on comp

Seite 413 - Physical Security

User Migration Utility Usage ExamplesG-24 Oracle Database Advanced Security Administrator's GuideExample G–3 Migrating Users with Shared Schema M

Seite 414

User Migration Utility Usage ExamplesUsing the User Migration Utility G-25Migrating Users Using the PARFILE, USERSFILE, and LOGFILE ParametersIt is po

Seite 415 - ■ orapki Utility Overview

Troubleshooting Using the User Migration UtilityG-26 Oracle Database Advanced Security Administrator's GuideExample G–6 Migrating Users Using the

Seite 416 - /private/lhale/cert.txt

Troubleshooting Using the User Migration UtilityUsing the User Migration Utility G-27 Database connection failure Database error: < database_erro

Seite 417 - To view a certificate:

Troubleshooting Using the User Migration UtilityG-28 Oracle Database Advanced Security Administrator's GuideCause: There is no entry for the data

Seite 418

Troubleshooting Using the User Migration UtilityUsing the User Migration Utility G-29 Getting local host name failed Interface table creation in SYS

Seite 419

Troubleshooting Using the User Migration UtilityG-30 Oracle Database Advanced Security Administrator's Guide2.Check to ensure that the file has th

Seite 420 - <certificate_filename>

Troubleshooting Using the User Migration UtilityUsing the User Migration Utility G-31Invalid value : : < user > [ USERSFILE ]Cause: Syntax error

Seite 421

Troubleshooting Using the User Migration UtilityG-32 Oracle Database Advanced Security Administrator's GuideResolving Error Messages Displayed fo

Seite 422 - Prerequisites

Troubleshooting Using the User Migration UtilityUsing the User Migration Utility G-33Action: Specify a different DN for the user.Common Log Messages f

Seite 423 - [-summary

Solving Security Challenges with Oracle Advanced Security1-4 Oracle Database Advanced Security Administrator's GuidePassword-Related ThreatsIn la

Seite 424

Troubleshooting Using the User Migration UtilityG-34 Oracle Database Advanced Security Administrator's GuideSCHEMA column of the interface table

Seite 425

Troubleshooting Using the User Migration UtilityUsing the User Migration Utility G-35Database error: < database_error_message > on page G-27 Bot

Seite 426

Troubleshooting Using the User Migration UtilityG-36 Oracle Database Advanced Security Administrator's GuideInvalid value : : <interface_table

Seite 427

Glossary-1Glossaryaccess controlThe ability of a system to grant or limit access to specific data for specific clients orgroups of clients.Access Contro

Seite 428

Glossary-2authenticationThe process of verifying the identity of a user, device, or other entity in a computersystem, often as a prerequisite to grant

Seite 429

Glossary-3CDSSee Cell Directory Services (CDS)Cell Directory Services (CDS)An external naming method that enablesusers to use Oracle tools transparent

Seite 430

Glossary-4provide additional information about the subject identity, such as postal address, ora challenge password by which the subject entity may la

Seite 431

Glossary-5clientA client relies on a service. A client can sometimes be a user, sometimes a processacting on behalf of the user during a database link

Seite 432

Glossary-6form of a URL. CRL DPs allow revocation information within a single certificateauthority domain to be posted in multiple CRLs. CRL DPs subdiv

Seite 433

Glossary-7A public or private database link from one database to another is created on thelocal database by a DBA or user.A global database link is cr

Seite 434 - Creating Entrust Profiles

Solving Security Challenges with Oracle Advanced SecurityIntroduction to Oracle Advanced Security 1-5Data EncryptionSensitive information that travels

Seite 435 - User-Created Entrust Profiles

Glossary-8Diffie-Hellman key negotiation algorithmThis is a method that lets two parties communicating over an insecure channel toagree upon a random n

Seite 436

Glossary-9domainAny tree or subtree within the Domain Name System (DNS) namespace. Domainmost commonly refers to a group of computers whose host names

Seite 437

Glossary-10enterprise userA user defined and managed in a directory. Each enterprise user has a uniqueidentify across an enterprise.entryThe building b

Seite 438

Glossary-11Global Directory Service (GDS)GDS is the DCE directory service that acts as an agent between DCE CDS and anyX.500 directory service. Both G

Seite 439

Glossary-12identity management realmA subtree in Oracle Internet Directory, including not only an Oracle Context, butalso additional subtrees for user

Seite 440

Glossary-13KDCKey Distribution Center. In Kerberos authentication, the KDC maintains a list ofuser principals and is contacted through the kinit (okin

Seite 441

Glossary-14kserviceAn arbitrary name of a Kerberos service object.LDAPSee Lightweight Directory Access Protocol (LDAP)ldap.ora fileA file created by Ora

Seite 442

Glossary-15man-in-the-middleA security attack characterized by the third-party, surreptitious interception of amessage, wherein the third-party, the m

Seite 443

Glossary-16client requests a directory lookup of a net service alias, the directory determines thatthe entry is a net service alias and completes the

Seite 444

Glossary-17object classA named group of attributes. When you want to assign attributes to an entry, youdo so by assigning to that entry the object cla

Seite 445

vContentsList of FiguresList of TablesSend Us Your Comments ...

Seite 446

Solving Security Challenges with Oracle Advanced Security1-6 Oracle Database Advanced Security Administrator's GuideSelecting the network encrypt

Seite 447

Glossary-18peer identitySSL connect sessions are between a particular client and a particular server. Theidentity of the peer may have been establishe

Seite 448

Glossary-19principalA string that uniquely identifies a client or server to which a set of Kerberoscredentials is assigned. It generally has three part

Seite 449

Glossary-20mathematically related, it is generally viewed as computationally infeasible toderive the private key from the public key. Public and priva

Seite 450

Glossary-21schema mappingSee user-schema mappingSecure Hash Algorithm (SHA)An algorithm that assures data integrity by generating a 160-bit cryptograp

Seite 451

Glossary-22service ticketTrusted information used to authenticate the client. A ticket-granting ticket, whichis also known as the initial ticket, is o

Seite 452 - Phase Two?

Glossary-23single sign-on (SSO)The ability of a user to authenticate once, combined with strong authenticationoccurring transparently in subsequent co

Seite 453 - Migration Process

Glossary-24System Global Area (SGA)A group of shared memory structures that contain data and control information foran Oracle instance.system identifie

Seite 454 - Required Database Privileges

Glossary-25is being validated as the entity it claims to be. Typically, the certificate authoritiesyou trust are called trusted certificates. If there a

Seite 455 - Required Directory Privileges

Glossary-26Wallet Resource LocatorA wallet resource locator (WRL) provides all necessary information to locate awallet. It is a path to an operating s

Seite 456

Index-1IndexAaccounting, RADIUS, 5-19activating checksumming and encryption, 3-6adapters, 1-15asynchronous authentication mode inRADIUS, 5-5ATTENTION_

Seite 457

Solving Security Challenges with Oracle Advanced SecurityIntroduction to Oracle Advanced Security 1-7197, Advanced Encryption Standard (AES) is a new

Seite 458 - Keyword: DBLOCATION

Index-2on the server, 7-15thin JDBC support, 4-1connectingacross cells, 10-12to an Oracle databaseto verify roles, 10-14to an Oracle server in DCE, 10

Seite 459 - Keyword: DBADMIN

Index-3enterprise user securitycomponents, 11-25configuration flow chart, 12-3configuration roadmap, 12-4directory entries, 11-11enterprise domains, 1

Seite 460 - Keyword: USERS

Index-4Oracle O3LOGON, 4-2thin driver features, 4-2Java Database connectivity (JDBC)implementation of Oracle AdvancedSecurity, 4-1JDBC. See Java Datab

Seite 461 - Keyword: USERSFILE

Index-5Oracle service names, 10-3loading into CDS, 10-22Oracle Wallet Managerimporting PKCS #7 certificate chains, 8-22OracleContextAdmins group, 11-1

Seite 462 - Keyword: MAPSCHEMA

Index-6challenge-responseauthentication, 5-5user interface, C-1, C-2configuring, 5-9database links not supported, 5-2, 11-24location of secret key, 5-

Seite 463 - Keyword: MAPTYPE

Index-7SQLNET.KERBEROS5_CONF parameter, 6-9SQLNET.KERBEROS5_CONF_MIT parameter, 6-9SQLNET.KERBEROS5_KEYTAB parameter, 6-9SQLNET.KERBEROS5_REALMS param

Seite 464 - Keyword: CONTEXT

Index-8TLS See Secure Sockets Layer (SSL)tnsnames.ora fileloading into CDS using tnnfg, 10-22modifying to load connect descriptors intoCDS, 10-21renam

Seite 465 - Keyword: PARFILE

Index-9managing certificates, 8-20managing trusted certificates, 8-25opening, 8-13Oracle Applications wallet location, 8-18saving, 8-17setting locatio

Seite 466

Index-10

Seite 467

Solving Security Challenges with Oracle Advanced Security1-8 Oracle Database Advanced Security Administrator's GuideStrong AuthenticationAuthenti

Seite 468

Solving Security Challenges with Oracle Advanced SecurityIntroduction to Oracle Advanced Security 1-9How Centralized Network Authentication Works Figu

Seite 469 - DIRLOCATION=machine2:636

Solving Security Challenges with Oracle Advanced Security1-10 Oracle Database Advanced Security Administrator's Guide3.The client passes these cr

Seite 470

Solving Security Challenges with Oracle Advanced SecurityIntroduction to Oracle Advanced Security 1-11protocol. RADIUS can be used with a variety of a

Seite 471

Solving Security Challenges with Oracle Advanced Security1-12 Oracle Database Advanced Security Administrator's GuideOracle Advanced Security SSL

Seite 472

Solving Security Challenges with Oracle Advanced SecurityIntroduction to Oracle Advanced Security 1-13Enterprise User ManagementEnterprise user manage

Seite 473

Solving Security Challenges with Oracle Advanced Security1-14 Oracle Database Advanced Security Administrator's Guide Passwords Kerberos Secur

Seite 474

Oracle Advanced Security ArchitectureIntroduction to Oracle Advanced Security 1-15Oracle Advanced Security ArchitectureOracle Advanced Security comple

Seite 475

vi2 Configuration and Administration Tools OverviewNetwork Encryption and Strong Authentication Configuration Tools...

Seite 476

Secure Data Transfer Across Network Protocol Boundaries1-16 Oracle Database Advanced Security Administrator's GuideFigure 1–6 Oracle Net with Aut

Seite 477

Oracle Advanced Security RestrictionsIntroduction to Oracle Advanced Security 1-17Oracle Advanced Security RestrictionsOracle Applications support Ora

Seite 478

Oracle Advanced Security Restrictions1-18 Oracle Database Advanced Security Administrator's Guide

Seite 479

Configuration and Administration Tools Overview 2-12Configuration and Administration ToolsOverviewConfiguring advanced security features for an Oracle d

Seite 480

Network Encryption and Strong Authentication Configuration Tools2-2 Oracle Database Advanced Security Administrator's GuideNetwork Encryption and

Seite 481

Network Encryption and Strong Authentication Configuration ToolsConfiguration and Administration Tools Overview 2-3To start Oracle Net Manager as a sta

Seite 482

Network Encryption and Strong Authentication Configuration Tools2-4 Oracle Database Advanced Security Administrator's GuideFigure 2–1 Oracle Adva

Seite 483

Network Encryption and Strong Authentication Configuration ToolsConfiguration and Administration Tools Overview 2-5Authentication Property Sheet Use th

Seite 484 - Glossary-2

Public Key Infrastructure Credentials Management Tools2-6 Oracle Database Advanced Security Administrator's GuidePublic Key Infrastructure Creden

Seite 485 - Glossary-3

Public Key Infrastructure Credentials Management ToolsConfiguration and Administration Tools Overview 2-7 (UNIX) From $ORACLE_HOME/bin, enter the foll

Seite 486 - Glossary-4

vii4 Configuring Network Data Encryption and Integrity for Thin JDBC ClientsAbout the Java Implementation...

Seite 487 - Glossary-5

Public Key Infrastructure Credentials Management Tools2-8 Oracle Database Advanced Security Administrator's GuideNavigator Pane The navigator pan

Seite 488 - Glossary-6

Public Key Infrastructure Credentials Management ToolsConfiguration and Administration Tools Overview 2-9text box. To request a certificate from a certi

Seite 489 - Glossary-7

Public Key Infrastructure Credentials Management Tools2-10 Oracle Database Advanced Security Administrator's GuideMenusYou use Oracle Wallet Mana

Seite 490 - Glossary-8

Public Key Infrastructure Credentials Management ToolsConfiguration and Administration Tools Overview 2-11Operations Menu Table 2–4 describes the conte

Seite 491 - Glossary-9

Public Key Infrastructure Credentials Management Tools2-12 Oracle Database Advanced Security Administrator's GuideHelp Menu Table 2–5 describes t

Seite 492 - Glossary-10

Enterprise User Security Configuration and Management ToolsConfiguration and Administration Tools Overview 2-13Enterprise User Security Configuration an

Seite 493 - Glossary-11

Enterprise User Security Configuration and Management Tools2-14 Oracle Database Advanced Security Administrator's GuideStarting Database Configur

Seite 494 - Glossary-12

Enterprise User Security Configuration and Management ToolsConfiguration and Administration Tools Overview 2-15 Logging in to Enterprise Security Mana

Seite 495 - Glossary-13

Enterprise User Security Configuration and Management Tools2-16 Oracle Database Advanced Security Administrator's Guide OracleAS Single Sign-On

Seite 496 - Glossary-14

Enterprise User Security Configuration and Management ToolsConfiguration and Administration Tools Overview 2-17Figure 2–4 Directory Server Login Window

Seite 497 - Glossary-15

viiiTask 1: Install Kerberos... 6-2Task 2

Seite 498 - Glossary-16

Enterprise User Security Configuration and Management Tools2-18 Oracle Database Advanced Security Administrator's GuideFigure 2–5 Enterprise Secu

Seite 499 - Glossary-17

Enterprise User Security Configuration and Management ToolsConfiguration and Administration Tools Overview 2-19 Right-click an enterprise domain to pe

Seite 500 - Glossary-18

Enterprise User Security Configuration and Management Tools2-20 Oracle Database Advanced Security Administrator's GuideFigure 2–6 Enterprise Secu

Seite 501 - Glossary-19

Enterprise User Security Configuration and Management ToolsConfiguration and Administration Tools Overview 2-21File Menu Table 2–9 describes the conten

Seite 502 - Glossary-20

Enterprise User Security Configuration and Management Tools2-22 Oracle Database Advanced Security Administrator's GuideEnterprise Security Manage

Seite 503 - Glossary-21

Enterprise User Security Configuration and Management ToolsConfiguration and Administration Tools Overview 2-23Figure 2–7 Enterprise Security Manager C

Seite 504 - Glossary-22

Enterprise User Security Configuration and Management Tools2-24 Oracle Database Advanced Security Administrator's GuideFigure 2–8 ESM Console URL

Seite 505 - Glossary-23

Enterprise User Security Configuration and Management ToolsConfiguration and Administration Tools Overview 2-25a. Select krbPrincipalName in the left c

Seite 506 - Glossary-24

Enterprise User Security Configuration and Management Tools2-26 Oracle Database Advanced Security Administrator's GuideHome Tabbed Window The Hom

Seite 507 - Glossary-25

Enterprise User Security Configuration and Management ToolsConfiguration and Administration Tools Overview 2-27The Group subtab (shown in Figure 2–11 o

Seite 508 - Glossary-26

ixHow SSL Works with Other Authentication Methods... 7-10SSL and Firewalls...

Seite 509

Enterprise User Security Configuration and Management Tools2-28 Oracle Database Advanced Security Administrator's GuideFigure 2–11 Enterprise Sec

Seite 510

Enterprise User Security Configuration and Management ToolsConfiguration and Administration Tools Overview 2-29Figure 2–12 Enterprise Security Manager

Seite 511

Enterprise User Security Configuration and Management Tools2-30 Oracle Database Advanced Security Administrator's GuideRealm Configuration Tabbed

Seite 512

Enterprise User Security Configuration and Management ToolsConfiguration and Administration Tools Overview 2-31Enterprise Security Manager Command-Line

Seite 513

Enterprise User Security Configuration and Management Tools2-32 Oracle Database Advanced Security Administrator's GuideOracle Net Configuration As

Seite 514

Enterprise User Security Configuration and Management ToolsConfiguration and Administration Tools Overview 2-33After you start this tool, you will be p

Seite 515

Duties of a Security Administrator/DBA2-34 Oracle Database Advanced Security Administrator's Guidephase one, it populates a table with database u

Seite 516

Duties of an Enterprise User Security Administrator/DBAConfiguration and Administration Tools Overview 2-35Duties of an Enterprise User Security Admini

Seite 517

Duties of an Enterprise User Security Administrator/DBA2-36 Oracle Database Advanced Security Administrator's GuideTable 2–15 Common Enterprise U

Seite 518 - Index-10

Duties of an Enterprise User Security Administrator/DBAConfiguration and Administration Tools Overview 2-37Manage user wallets on the local system orup

Kommentare zu diesen Handbüchern

Keine Kommentare