Oracle Advanced Networking Option Administrator's Guide Release 8.0.3 A54084_01 |
|
The Oracle Advanced Networking Option is an optional product that provides enhanced functionality to SQL*Net and Net8. Its set of features provides enhanced security and authentication to your network and enables integration with a Distributed Computing Environment (DCE). This guide provides generic information on all these features of the Advanced Networking Option.
For information about installation of the Oracle Advanced Networking Option and platform-specific details of the configuration and use of its features, refer also to your Oracle platform-specific documentation.
This manual is divided into two parts: Security and Single Sign-On and DCE Integration. Each part describes a different set of Oracle Advanced Networking Option features.
Chapter 1, "Overview of Network Security and Single Sign-On"
This chapter provides an overview of the security and single sign-on features of the Oracle Advanced Networking Option. It includes an brief overview of the authentication adapters available with this release, and it describes how to disable the use of the authentication adapters when you want to use username/password authentication instead. These features include:
Note:
These features were previously packaged as the Secure Network Services product. |
Chapter 2, "Configuring Encryption and Checksumming"
This chapter provides a brief overview of the authentication adapters available with this release. It describes how to disable the use of the authentication adapters when you want to use username/password authentication instead. It also describes how to configure multiple authentication adapters on clients and servers.This chapter tells you how to install the encryption and checksumming software and tells you how to configure encryption and checksumming into your existing SQL*Net release 8.0.3 network using Oracle Net8 Assistant.
Chapter 3, "Configuring the CyberSAFE Authentication Adapter"
This chapter discusses how to configure Oracle for use with CyberSAFE, and provides a brief overview of steps to configure CyberSAFE to authenticate Oracle users.
Chapter 4, "Configuring the Kerberos Authentication Adapter"
This chapter discusses how to configure Oracle for use with MIT Kerberos, and provides a brief overview of steps to configure Kerberos to authenticate Oracle users.
Chapter 5, "Configuring Oracle for Use with the SecurID Adapter"
This chapter discusses how to configure the SecurID authentication adapter in combination with the Oracle server and Oracle clients. It includes system requirements and known limitations. It also contains troubleshooting information if you experience problems while configuring the SecurID authentication adapter.
Note:
For a complete list of Advanced Networking Option error messages see the Oracle Network Products Troubleshooting Guide. |
Chapter 6, "Configuring and Using the Identix Biometric Authentication Adapter"
This chapter describes how to configure and use the the Oracle Biometric authentication adapter, which enables the use of the Identix fingerprint authentication device.
Chapter 7, "Choosing and Combining Authentication Services"
This chapter discusses how to use the SecurID authentication adapter in combination with the Oracle client tools.
Chapter 8, "Configuring the DCE GSSAPI Authentication Adapter"
This chapter describes how to configure the Oracle DCE GSSAPI authentication adapter to provide DCE authentication even if you are not using other DCE services in your network.
Chapter 9, "Overview of Oracle DCE Integration"
This chapter provides a brief discussion of OSF's DCE and Oracle's DCE Integration.
Chapter 10, "Configuring DCE for Oracle DCE Integration"
This chapter describes what you need to do to configure DCE to use Oracle DCE Integration. It also describes how to configure the DCE CDS naming adapter.
Chapter 11, "Configuring Oracle for Oracle DCE Integration"
This chapter describes the DCE parameters that you need to add to the SQL*Net configuration files to enable clients and servers to access Oracle7 and Oracle8 servers in the DCE environment. It also describes some Oracle Server configuration that you need to perform, such as setting up DCE groups to map to external roles. Additionally, it describes how to configure clients to use the DCE CDS naming adapter.
Chapter 12, "Connecting to an Oracle Database in DCE"
This chapter discusses how to connect to an Oracle database in a DCE environment.
Chapter 13, "DCE and Non-DCE Interoperability"
This chapter discusses how clients outside of DCE can access Oracle databases using another protocol such as TCP/IP.
Appendix A, "Encryption and Checksum Parameters"
This appendix shows examples of the Oracle Advanced Networking Option encryption and checksumming configuration parameters. You can use the Oracle Net8 Assistant to create, modify, or delete these parameters. When the configuration files are generated, the parameters appear in the Profile component of SQLNET.ORA files. These parameters are described in Chapter 2, "Configuring Encryption and Checksumming".
Appendix B, "Encryption Enhancements"
This appendix contains information on two encryption enhancements that are included in the Oracle Advanced Networking Option release 8.0.3: site-specific Diffie-Hellman and authentication key fold-in.
Appendix B, "Authentication Parameters"
This appendix shows examples of the Oracle Advanced Networking Option authentication configuration file parameters.
The following syntax conventions are used in this guide:
To install and configure Advanced Networking Option software on your particular platform, refer to the Oracle platform-specific documentation.
In addition, see the following documents for detailed information about Oracle network products that applies across platforms:
For information on roles and privileges, see:
For third-party vendor documentation on security and single sign-on features see:
For information on MIT Kerberos see:
For additional information about the OSF Distributed Computing Environment (DCE), refer to the following OSF documents published by Prentice Hall, Inc.:
For information about Identix products, refer to the following Identix documentation.
Client side documentation:
Server side documentation: