Oracle Security Server Guide
Release 2.0.3

A54088-01

Library

Product

Contents

Prev


Index


A

Advanced Networking Option, 1-5
asymmetric cryptography
See Public-key cryptography
authentication, 1-4, 1-6
and certificates, 1-8
defined, 1-2, 1-13, G-1
SKEME, 1-10
authenticity
defined, G-1
authorization
defined, 1-2, 1-14, G-1

B

block cipher
defined, G-1
BSAFE, 1-11
defined, G-1

C

CA
See Certification Authority (CA)
CA hierarchy
defined, G-2
certificate
defined, 1-8, G-2
expiration date, 1-9
format, 1-9
restoring, 33
revoking, 1-10, 33
X.509, 1-11, 1-12
certificate revocation list (CRL)
defined, 1-10, G-2
certification authority (CA), 2-2
defined, 1-8, G-2
establishing, 3-5
checksum
defined, G-2
cipher
See Cryptographic algorithm
ciphertext
defined, 1-2, G-2
cleartext
See Plaintext
client
defined, G-2
confidentiality, 1-4
defined, G-2
credentials
creating, 29, 31
defined, 27, G-3
restoring, 33
revoking, 33
CRL
See Certificate Revocation List (CRL)
cryptanalysis
defined, G-3
cryptanalyst
defined, G-3
cryptographer
defined, G-3
cryptographic algorithm, 1-9, 1-10
defined, 1-2, G-3
cryptography
defined, 1-2, G-3
cryptology
defined, G-3
cryptosystem
defined, G-3

D

Data Encryption Standard (DES)
See DES
database server
defined, G-3
decrypt
defined, G-4
decryption
defined, 1-2
DES, 1-4
defined, G-4
digital signature
defined, 1-6, G-4
example, 1-7
functions, 1-6
generating, 1-6
in certificate, 1-10
MD5 algorithm
RSA algorithm, 1-11
verifying, 1-7
distinguished name (DN)
defined, 1-12, G-4
DN
See Distinguished Name (DN)

E

encrypt
defined, G-4
encryption
defined, 1-2
enrollment
defined, G-4
enterprise authorization
adding server authorizations to, 39
creating, 38
defined, 3-5, 38, G-4
deleting, 39
deleting server authorizations from, 39
granting server authorizations to identity, 42
nesting, 41
revoking server authorizations from identity, 42
entity
defined, G-4
expiration date
checking, 2-4
in certificate, 1-9

G

global role
defined, 1-14
implementation, 3-11
global user
defined, 1-14, G-4
implementation, 3-5

H

hash function
defined, G-5
hash value
defined, G-5
hybrid cryptosystem
defined, 1-4, G-5

I

IDEA
defined, G-5
identity
creating, 27
defined, 27, G-5
deleting, 33
integrity, 1-6
defined, G-5
International Data Encryption Algorithm (IDEA)
See IDEA

K

key
defined, 1-2, G-5

M

MD5, 1-11, 2-4
defined, G-5
message digest
decrypting, 1-7
defined, 1-6
encrypting, 1-6
generating, 1-6, 1-7
See Hash Value
Message Digest 5 (MD5)
See MD5
mutual authentication
defined, 2-4, G-6

N

Net8, 2-4, 3-2
nonce
defined, 2-4, G-6
nonrepudiation, 1-6
defined, G-6

O

one-way hash function
characteristics, 1-6
defined, 1-6, G-6
using, 1-6, 1-7
Oracle Enterprise Manager, 2-2, 2-4, 3-2
Oracle Names, 3-16
Oracle Security Adapter, 2-4
configuring, 3-15
defined, 2-2, G-6
Oracle Security Server Manager, 2-4, 3-5
defined, 2-2, G-6
Oracle Security Server Repository, 2-4, 3-15, 3-16
constructing, 3-5
defined, 2-2, G-6
dependencies, 3-2
downloading wallet, 3-18, 3-19
installing, 3-2
removing, 3-20
Oracle WebServer, 1-13, 2-4, 3-15, 31
oracle_security_service_admin username, 3-3, 22
Oracle8 Server, 1-2, 1-13, 2-2, 3-2, 3-5, 34, 35
oss.source.location parameter, 3-16
oss.source.my_wallet parameter, 3-16, 3-17, 3-18, 3-19
osslogin tool, 3-17, 3-18, 3-19

P

plaintext
defined, G-6
preface
Send Us Your Comments, i
pre-image
defined, G-6
principal
defined, G-6
privacy
defined, G-6
private key
decrypting, 3-17, 3-18, 3-19
defined, 1-3, G-7
generating, 1-12
managing, 1-5
using, 1-6, 1-8, 2-4
private-key cryptography, 1-3
defined, G-7
private-key encryption
defined, G-7
privilege
defined, G-7
public key
defined, 1-3, G-7
generating, 1-12
in certificate, 1-10
using, 1-7, 1-10, 2-4
Public Key Cryptography Standards (PKCS)
# 1, 1-11
# 7, 1-11
public-key cryptography
benefits, 1-5
defined, 1-3, G-7
public-key encryption
defined, G-7

R

RC4, 1-5
defined, G-7
revocation status
checking, 2-4
role
defined, G-7
RSA, 1-3, 1-4, 1-5, 1-11
defined, G-7

S

secret-key cryptography
See Private-key cryptography
Security Manager, 3-2
Send Us Your Comments
boilerplate, i
server
creating, 34
defined, 3-5, 34, G-8
deleting, 35
server authorization
adding to enterprise authorizations, 39
defined, 3-5, 35, G-8
deleting, 36
deleting from enterprise authorizations, 39
granting, 37
revoking, 37
session key
defined, 1-4, G-8
sign
defined, 1-6, G-8
signature
See Digital Signature
single sign-on
defined, G-8
SKEME, 1-10
SQL*Net, 2-4, 3-2
SQLNET.ORA file, 3-15, 3-17
stream cipher
defined, G-8
strength
defined, 1-2, G-8
subject
in certificate, 1-9
symmetric-key cryptography
See Private-key cryptography

T

TIPEM, 1-11, 1-12
defined, G-8
TNSNAMES.ORA file, 3-16
trustpoint
defined, G-9

U

URLs, 1-4, 1-10, 1-11, 1-12

V

validate
defined, G-9
verify
defined, 1-7, G-9

W

wallet
defined, 3-15, G-9
downloading, 3-17
Web Server
defined, G-9

X

X.500, 1-11, 1-12
defined, G-9
X.509, 1-11, 1-12, 3-17
defined, G-9


Prev
Oracle
Copyright © 1997 Oracle Corporation.

All Rights Reserved.

Library

Product

Contents