Oracle Security Server Guide
Release 2.0.3
A54088-01
Library
Product
Contents
Index
A
Advanced Networking Option, 1-5
asymmetric cryptography
See Public-key cryptography
authentication, 1-4,
1-6
and certificates, 1-8
defined, 1-2,
1-13,
G-1
SKEME, 1-10
authenticity
defined, G-1
authorization
defined, 1-2,
1-14,
G-1
B
block cipher
defined, G-1
BSAFE, 1-11
defined, G-1
C
CA
See Certification Authority (CA)
CA hierarchy
defined, G-2
certificate
defined, 1-8,
G-2
expiration date, 1-9
format, 1-9
restoring, 33
revoking, 1-10,
33
X.509, 1-11,
1-12
certificate revocation list (CRL)
defined, 1-10,
G-2
certification authority (CA), 2-2
defined, 1-8,
G-2
establishing, 3-5
checksum
defined, G-2
cipher
See Cryptographic algorithm
ciphertext
defined, 1-2,
G-2
cleartext
See Plaintext
client
defined, G-2
confidentiality, 1-4
defined, G-2
credentials
creating, 29,
31
defined, 27,
G-3
restoring, 33
revoking, 33
CRL
See Certificate Revocation List (CRL)
cryptanalysis
defined, G-3
cryptanalyst
defined, G-3
cryptographer
defined, G-3
cryptographic algorithm, 1-9,
1-10
defined, 1-2,
G-3
cryptography
defined, 1-2,
G-3
cryptology
defined, G-3
cryptosystem
defined, G-3
D
Data Encryption Standard (DES)
See DES
database server
defined, G-3
decrypt
defined, G-4
decryption
defined, 1-2
DES,
1-4
defined, G-4
digital signature
defined, 1-6,
G-4
example, 1-7
functions, 1-6
generating, 1-6
in certificate, 1-10
MD5 algorithm
RSA algorithm, 1-11
verifying, 1-7
distinguished name (DN)
defined, 1-12,
G-4
DN
See Distinguished Name (DN)
E
encrypt
defined, G-4
encryption
defined, 1-2
enrollment
defined, G-4
enterprise authorization
adding server authorizations to, 39
creating, 38
defined, 3-5,
38,
G-4
deleting, 39
deleting server authorizations from, 39
granting server authorizations to identity, 42
nesting, 41
revoking server authorizations from identity, 42
entity
defined, G-4
expiration date
checking, 2-4
in certificate, 1-9
G
global role
defined, 1-14
implementation, 3-11
global user
defined, 1-14,
G-4
implementation, 3-5
H
hash function
defined, G-5
hash value
defined, G-5
hybrid cryptosystem
defined, 1-4,
G-5
I
IDEA
defined, G-5
identity
creating, 27
defined, 27,
G-5
deleting, 33
integrity, 1-6
defined, G-5
International Data Encryption Algorithm (IDEA)
See IDEA
K
key
defined, 1-2,
G-5
M
MD5, 1-11,
2-4
defined, G-5
message digest
decrypting, 1-7
defined, 1-6
encrypting, 1-6
generating, 1-6,
1-7
See Hash Value
Message Digest 5 (MD5)
See MD5
mutual authentication
defined, 2-4,
G-6
N
Net8, 2-4,
3-2
nonce
defined, 2-4,
G-6
nonrepudiation, 1-6
defined, G-6
O
one-way hash function
characteristics, 1-6
defined, 1-6,
G-6
using, 1-6,
1-7
Oracle Enterprise Manager, 2-2,
2-4,
3-2
Oracle Names, 3-16
Oracle Security Adapter, 2-4
configuring, 3-15
defined, 2-2,
G-6
Oracle Security Server Manager, 2-4,
3-5
defined, 2-2,
G-6
Oracle Security Server Repository, 2-4,
3-15,
3-16
constructing, 3-5
defined, 2-2,
G-6
dependencies, 3-2
downloading wallet, 3-18,
3-19
installing, 3-2
removing, 3-20
Oracle WebServer, 1-13,
2-4,
3-15,
31
oracle_security_service_admin username, 3-3,
22
Oracle8 Server, 1-2,
1-13,
2-2,
3-2,
3-5,
34,
35
oss.source.location parameter, 3-16
oss.source.my_wallet parameter, 3-16,
3-17,
3-18,
3-19
osslogin tool, 3-17,
3-18,
3-19
P
plaintext
defined, G-6
preface
Send Us Your Comments, i
pre-image
defined, G-6
principal
defined, G-6
privacy
defined, G-6
private key
decrypting, 3-17,
3-18,
3-19
defined, 1-3,
G-7
generating, 1-12
managing, 1-5
using, 1-6,
1-8,
2-4
private-key cryptography, 1-3
defined, G-7
private-key encryption
defined, G-7
privilege
defined, G-7
public key
defined, 1-3,
G-7
generating, 1-12
in certificate, 1-10
using, 1-7,
1-10,
2-4
Public Key Cryptography Standards (PKCS)
# 1, 1-11
# 7, 1-11
public-key cryptography
benefits, 1-5
defined, 1-3,
G-7
public-key encryption
defined, G-7
R
RC4, 1-5
defined, G-7
revocation status
checking, 2-4
role
defined, G-7
RSA, 1-3,
1-4,
1-5,
1-11
defined, G-7
S
secret-key cryptography
See Private-key cryptography
Security Manager, 3-2
Send Us Your Comments
boilerplate, i
server
creating, 34
defined, 3-5,
34,
G-8
deleting, 35
server authorization
adding to enterprise authorizations, 39
defined, 3-5,
35,
G-8
deleting, 36
deleting from enterprise authorizations, 39
granting, 37
revoking, 37
session key
defined, 1-4,
G-8
sign
defined, 1-6,
G-8
signature
See Digital Signature
single sign-on
defined, G-8
SKEME, 1-10
SQL*Net, 2-4,
3-2
SQLNET.ORA file, 3-15,
3-17
stream cipher
defined, G-8
strength
defined, 1-2,
G-8
subject
in certificate, 1-9
symmetric-key cryptography
See Private-key cryptography
T
TIPEM, 1-11,
1-12
defined, G-8
TNSNAMES.ORA file, 3-16
trustpoint
defined, G-9
U
URLs, 1-4,
1-10,
1-11,
1-12
V
validate
defined, G-9
verify
defined, 1-7,
G-9
W
wallet
defined, 3-15,
G-9
downloading, 3-17
Web Server
defined, G-9
X
X.500, 1-11,
1-12
defined, G-9
X.509, 1-11,
1-12,
3-17
defined, G-9
Prev
Copyright © 1997 Oracle Corporation.
All Rights Reserved.
Library
Product
Contents