xviii
List of Figures
1–1
Encryption ..............................................................................................................................
1-5
1–2
Strong Authentication with Oracle Authentication Adapters ........................................
1-8
1–3
How a Network Authentication Service Authenticates a User ......................................
1-9
1–4
Centralized User Management with Enterprise User Security.....................................
1-13
1–5
Oracle Advanced Security in an Oracle Networking Environment ............................
1-15
1–6
Oracle Net with Authentication Adapters.......................................................................
1-16
2–1
Oracle Advanced Security Profile in Oracle Net Manager..............................................
2-4
2–2
Oracle Wallet Manager User Interface ...............................................................................
2-7
2–3
Certificate Request Information Displayed in Oracle Wallet Manager Right Pane ....
2-9
2–4
Directory Server Login Window .......................................................................................
2-17
2–5
Enterprise Security Manager User Interface....................................................................
2-18
2–6
Enterprise Security Manager Databases Tabbed Window............................................
2-20
2–7
Enterprise Security Manager Console Login Page .........................................................
2-23
2–8
ESM Console URL Window...............................................................................................
2-24
2–9
Enterprise Security Manager Console User Interface ....................................................
2-25
2–10
Enterprise Security Manager Console Users Subtab ......................................................
2-26
2–11
Enterprise Security Manager Console Group Subtab ....................................................
2-28
2–12
Enterprise Security Manager Console Edit Group Page................................................
2-29
2–13
Enterprise Security Manager Console Realm Configuration Tabbed Window .........
2-30
2–14
Opening Page of Oracle Net Configuration Assistant ...................................................
2-33
3–1
Oracle Advanced Security Encryption Window.............................................................
3-10
3–2
Oracle Advanced Security Integrity Window .................................................................
3-12
5–1
RADIUS in an Oracle Environment....................................................................................
5-2
5–2
Synchronous Authentication Sequence..............................................................................
5-4
5–3
Asynchronous Authentication Sequence ...........................................................................
5-6
5–4
Oracle Advanced Security Authentication Window......................................................
5-10
5–5
Oracle Advanced Security Other Params Window........................................................
5-12
6–1
Oracle Advanced Security Authentication Window (Kerberos) ....................................
6-6
6–2
Oracle Advanced Security Other Params Window (Kerberos) ......................................
6-7
7–1
SSL in Relation to Other Authentication Methods .........................................................
7-11
7–2
SSL Cipher Suites Window ................................................................................................
7-19
7–3
Oracle Advanced Security SSL Window (Server)...........................................................
7-20
7–4
Oracle Advanced Security SSL Window (Server)...........................................................
7-22
7–5
Oracle Advanced Security SSL Window (Client) ...........................................................
7-26
7–6
Oracle Advanced Security SSL Window (Client) ...........................................................
7-29
7–7
Oracle Advanced Security SSL Window with Certificate Revocation Checking Selected
................................................................................................................................................
7-38
9–1
Oracle Advanced Security Authentication Window........................................................
9-3
11–1
Enterprise User Security and the Oracle Security Architecture ...................................
11-4
11–2
Example of Enterprise Roles ............................................................................................
11-13
Содержание Database Advanced Security 10g Release 1
Страница 17: ...xvii ...
Страница 20: ...xx ...
Страница 24: ...xxiv ...
Страница 42: ...xlii ...
Страница 44: ......
Страница 62: ...Oracle Advanced Security Restrictions 1 18 Oracle Database Advanced Security Administrator s Guide ...
Страница 100: ...Duties of an Enterprise User Security Administrator DBA 2 38 Oracle Database Advanced Security Administrator s Guide ...
Страница 102: ......
Страница 116: ...How To Configure Data Encryption and Integrity 3 14 Oracle Database Advanced Security Administrator s Guide ...
Страница 124: ......
Страница 148: ...RSA ACE Server Configuration Checklist 5 24 Oracle Database Advanced Security Administrator s Guide ...
Страница 246: ...Managing Certificates 8 28 Oracle Database Advanced Security Administrator s Guide ...
Страница 254: ...Configuring Oracle Database for External Authentication 9 8 Oracle Database Advanced Security Administrator s Guide ...
Страница 284: ......
Страница 350: ...Troubleshooting Enterprise User Security 12 38 Oracle Database Advanced Security Administrator s Guide ...
Страница 384: ......
Страница 394: ...Data Encryption and Integrity Parameters A 10 Oracle Database Advanced Security Administrator s Guide ...
Страница 414: ...Physical Security D 6 Oracle Database Advanced Security Administrator s Guide ...
Страница 518: ...Index 10 ...