Oracle Security Server Guide
Release 2.0.3
A54088_01
Library
Product
Contents
Index
A
Advanced Networking Option,
1-5
asymmetric cryptography
See Public-key cryptography,
1-3
,
G-1
authentication,
1-4
,
1-6
and certificates,
1-8
defined,
1-2
,
1-13
,
G-1
SKEME,
1-10
authenticity
defined,
G-1
authorization
defined,
1-2
,
1-14
,
G-1
B
block cipher
defined,
G-1
BSAFE,
1-11
defined,
G-1
C
CA
See Certification Authority (CA),
1-8
,
G-1
CA hierarchy
defined,
G-2
certificate
defined,
1-8
,
G-2
expiration date,
1-9
format,
1-9
restoring,
4-13
revoking,
1-10
,
4-13
X.509,
1-11
to
1-12
certificate revocation list (CRL)
defined,
1-10
,
G-2
certification authority (CA),
2-2
defined,
1-8
,
G-2
establishing,
3-5
checksum
defined,
G-2
cipher
See Cryptographic algorithm,
1-2
,
G-2
ciphertext
defined,
1-2
,
G-2
cleartext
See Plaintext,
G-2
client
defined,
G-2
confidentiality,
1-4
defined,
G-2
credentials
creating,
4-9
,
4-11
defined,
4-7
,
G-3
restoring,
4-13
revoking,
4-13
CRL
See Certificate Revocation List (CRL),
1-10
,
G-3
cryptanalysis
defined,
G-3
cryptanalyst
defined,
G-3
cryptographer
defined,
G-3
cryptographic algorithm,
1-9
to
1-10
defined,
1-2
,
G-3
cryptography
defined,
1-2
,
G-3
cryptology
defined,
G-3
cryptosystem
defined,
G-3
D
Data Encryption Standard (DES)
See DES,
1-3
,
G-3
database server
defined,
G-3
decrypt
defined,
G-4
decryption
defined,
1-2
DES,
1-3
to
1-4
defined,
G-4
digital signature
defined,
1-6
,
G-4
example,
1-7
functions,
1-6
generating,
1-6
in certificate,
1-10
MD5 algorithm,
1-11
RSA algorithm,
1-11
verifying,
1-7
distinguished name (DN)
defined,
1-12
,
G-4
DN
See Distinguished Name (DN),
1-12
,
G-4
E
encrypt
defined,
G-4
encryption
defined,
1-2
enrollment
defined,
G-4
enterprise authorization
adding server authorizations to,
4-19
creating,
4-18
defined,
3-5
,
4-18
,
G-4
deleting,
4-19
deleting server authorizations from,
4-19
granting server authorizations to identity,
4-22
nesting,
4-21
revoking server authorizations from identity,
4-22
entity
defined,
G-4
expiration date
checking,
2-4
in certificate,
1-9
G
global role
defined,
1-14
implementation,
3-11
global user
defined,
1-14
,
G-4
implementation,
3-5
H
hash function
defined,
G-5
hash value
defined,
G-5
hybrid cryptosystem
defined,
1-4
,
G-5
I
IDEA,
1-3
defined,
G-5
identity
creating,
4-7
defined,
4-7
,
G-5
deleting,
4-13
integrity,
1-6
defined,
G-5
International Data Encryption Algorithm (IDEA)
See IDEA,
1-3
,
G-5
K
key
defined,
1-2
,
G-5
M
MD5,
1-11
,
2-4
defined,
G-5
message digest
decrypting,
1-7
defined,
1-6
encrypting,
1-6
generating,
1-6
to
1-7
See Hash Value,
G-5
Message Digest 5 (MD5)
See MD5,
1-11
,
G-5
mutual authentication
defined,
2-4
,
G-6
N
Net8,
2-4
,
3-2
nonce
defined,
2-4
,
G-6
nonrepudiation,
1-6
defined,
G-6
O
one-way hash function
characteristics,
1-6
defined,
1-6
,
G-6
using,
1-6
to
1-7
Oracle Enterprise Manager,
2-2
,
2-4
,
3-2
Oracle Names,
3-16
Oracle Security Adapter,
2-4
configuring,
3-15
defined,
2-2
,
G-6
Oracle Security Server Manager,
2-4
,
3-5
defined,
2-2
,
G-6
Oracle Security Server Repository,
2-4
,
3-15
to
3-16
constructing,
3-5
defined,
2-2
,
G-6
dependencies,
3-2
downloading wallet,
3-18
to
3-19
installing,
3-2
removing,
3-20
Oracle WebServer,
1-13
,
2-4
,
3-15
,
4-11
oracle_security_service_admin username,
3-3
,
4-2
Oracle8 Server,
1-2
,
1-13
,
2-2
,
3-2
,
3-5
,
4-14
to
4-15
oss.source.location parameter,
3-16
oss.source.my_wallet parameter,
3-16
to
3-19
osslogin tool,
3-17
to
3-19
P
plaintext
defined,
G-6
pre-image
defined,
G-6
principal
defined,
G-6
privacy
defined,
G-6
private key
decrypting,
3-17
to
3-19
defined,
1-3
,
G-7
generating,
1-12
managing,
1-5
using,
1-6
,
1-8
,
2-4
private-key cryptography,
1-3
defined,
G-7
private-key encryption
defined,
G-7
privilege
defined,
G-7
public key
defined,
1-3
,
G-7
generating,
1-12
in certificate,
1-10
using,
1-7
,
1-10
,
2-4
Public Key Cryptography Standards (PKCS)
# 1,
1-11
# 7,
1-11
public-key cryptography
benefits,
1-5
defined,
1-3
,
G-7
public-key encryption
defined,
G-7
R
RC4,
1-5
defined,
G-7
revocation status
checking,
2-4
role
defined,
G-7
RSA,
1-3
to
1-5
,
1-11
defined,
G-7
S
secret-key cryptography
See Private-key cryptography,
1-3
,
G-8
Security Manager,
3-2
server
creating,
4-14
defined,
3-5
,
4-14
,
G-8
deleting,
4-15
server authorization
adding to enterprise authorizations,
4-19
defined,
3-5
,
4-15
,
G-8
deleting,
4-16
deleting from enterprise authorizations,
4-19
granting,
4-17
revoking,
4-17
session key
defined,
1-4
,
G-8
sign
defined,
1-6
,
G-8
signature
See Digital Signature,
G-8
single sign-on
defined,
G-8
SKEME,
1-10
SQL*Net,
2-4
,
3-2
SQLNET.ORA file,
3-15
,
3-17
stream cipher
defined,
G-8
strength
defined,
1-2
,
G-8
subject
in certificate,
1-9
symmetric-key cryptography
See Private-key cryptography,
1-3
,
G-8
T
TIPEM,
1-11
to
1-12
defined,
G-8
TNSNAMES.ORA file,
3-16
trustpoint
defined,
G-9
U
URLs,
1-4
,
1-10
to
1-12
V
validate
defined,
G-9
verify
defined,
1-7
,
G-9
W
wallet
defined,
3-15
,
G-9
downloading,
3-17
Web Server
defined,
G-9
X
X.500,
1-11
to
1-12
defined,
G-9
X.509,
1-11
to
1-12
,
3-17
defined,
G-9
Prev
Copyright © 1997 Oracle Corporation.
All Rights Reserved.
Library
Product
Contents