Solving Security Challenges with Oracle Advanced Security
Introduction to Oracle Advanced Security
1-11
protocol. RADIUS can be used with a variety of authentication mechanisms,
including token cards and smart cards. See
Chapter 5, "Configuring RADIUS
Authentication"
for information about configuring and using this adapter.
■
Smart Cards
A RADIUS-compliant smart card is a credit card-like hardware device. It has
memory and a processor and is read by a smart card reader located at the client
workstation.
■
Token Cards
Token cards (SecurID or RADIUS-compliant) can improve ease of use through
several different mechanisms. Some token cards dynamically display one-time
passwords that are synchronized with an authentication service. The server can
verify the password provided by the token card at any given time by contacting
the authentication service. Other token cards have a keypad and operate on a
challenge-response basis. In this case, the server offers a challenge (a number)
that the user enters into a token card. The token card provides a response
(another number cryptographically derived from the challenge) that the user
enters and sends to the server.
You can use SecurID tokens through the RADIUS adapter.
DCE (Distributed Computing Environment)
DCE is a set of integrated network services
that works across multiple systems to provide a distributed environment. Oracle
DCE Integration consists of the following two components:
■
DCE Communication/Security
■
DCE Cell Directory services Native Naming
Oracle DCE Integration provides applications the flexibility to have different levels
of integration with DCE services. Depending on the need, applications can choose
to integrate very tightly with the DCE services or choose to plug in the other
security authentication services provided by Oracle Advanced Security. See
Chapter 10, "Configuring Oracle DCE Integration"
for information about
configuring and using this adapter.
Secure Sockets Layer
Secure Sockets Layer (SSL) is an industry standard protocol for
securing network connections. SSL provides
authentication
, data
encryption
, and
data
integrity
.
The SSL protocol is the foundation of a
public key infrastructure (PKI)
. For
authentication, SSL uses digital certificates that comply with the X.509v3 standard,
and a
public and private key pair
.
Содержание Database Advanced Security 10g Release 1
Страница 17: ...xvii ...
Страница 20: ...xx ...
Страница 24: ...xxiv ...
Страница 42: ...xlii ...
Страница 44: ......
Страница 62: ...Oracle Advanced Security Restrictions 1 18 Oracle Database Advanced Security Administrator s Guide ...
Страница 100: ...Duties of an Enterprise User Security Administrator DBA 2 38 Oracle Database Advanced Security Administrator s Guide ...
Страница 102: ......
Страница 116: ...How To Configure Data Encryption and Integrity 3 14 Oracle Database Advanced Security Administrator s Guide ...
Страница 124: ......
Страница 148: ...RSA ACE Server Configuration Checklist 5 24 Oracle Database Advanced Security Administrator s Guide ...
Страница 246: ...Managing Certificates 8 28 Oracle Database Advanced Security Administrator s Guide ...
Страница 254: ...Configuring Oracle Database for External Authentication 9 8 Oracle Database Advanced Security Administrator s Guide ...
Страница 284: ......
Страница 350: ...Troubleshooting Enterprise User Security 12 38 Oracle Database Advanced Security Administrator s Guide ...
Страница 384: ......
Страница 394: ...Data Encryption and Integrity Parameters A 10 Oracle Database Advanced Security Administrator s Guide ...
Страница 414: ...Physical Security D 6 Oracle Database Advanced Security Administrator s Guide ...
Страница 518: ...Index 10 ...