Oracle Security Server Guide
Release 2.0.3

A54088_01

Library

Product

Contents

Prev


Index


A

Advanced Networking Option, 1-5
asymmetric cryptography
See Public-key cryptography, 1-3, G-1
authentication, 1-4, 1-6
and certificates, 1-8
defined, 1-2, 1-13, G-1
SKEME, 1-10
authenticity
defined, G-1
authorization
defined, 1-2, 1-14, G-1

B

block cipher
defined, G-1
BSAFE, 1-11
defined, G-1

C

CA
See Certification Authority (CA), 1-8, G-1
CA hierarchy
defined, G-2
certificate
defined, 1-8, G-2
expiration date, 1-9
format, 1-9
restoring, 4-13
revoking, 1-10, 4-13
X.509, 1-11 to 1-12
certificate revocation list (CRL)
defined, 1-10, G-2
certification authority (CA), 2-2
defined, 1-8, G-2
establishing, 3-5
checksum
defined, G-2
cipher
See Cryptographic algorithm, 1-2, G-2
ciphertext
defined, 1-2, G-2
cleartext
See Plaintext, G-2
client
defined, G-2
confidentiality, 1-4
defined, G-2
credentials
creating, 4-9, 4-11
defined, 4-7, G-3
restoring, 4-13
revoking, 4-13
CRL
See Certificate Revocation List (CRL), 1-10, G-3
cryptanalysis
defined, G-3
cryptanalyst
defined, G-3
cryptographer
defined, G-3
cryptographic algorithm, 1-9 to 1-10
defined, 1-2, G-3
cryptography
defined, 1-2, G-3
cryptology
defined, G-3
cryptosystem
defined, G-3

D

Data Encryption Standard (DES)
See DES, 1-3, G-3
database server
defined, G-3
decrypt
defined, G-4
decryption
defined, 1-2
DES, 1-3 to 1-4
defined, G-4
digital signature
defined, 1-6, G-4
example, 1-7
functions, 1-6
generating, 1-6
in certificate, 1-10
MD5 algorithm, 1-11
RSA algorithm, 1-11
verifying, 1-7
distinguished name (DN)
defined, 1-12, G-4
DN
See Distinguished Name (DN), 1-12, G-4

E

encrypt
defined, G-4
encryption
defined, 1-2
enrollment
defined, G-4
enterprise authorization
adding server authorizations to, 4-19
creating, 4-18
defined, 3-5, 4-18, G-4
deleting, 4-19
deleting server authorizations from, 4-19
granting server authorizations to identity, 4-22
nesting, 4-21
revoking server authorizations from identity, 4-22
entity
defined, G-4
expiration date
checking, 2-4
in certificate, 1-9

G

global role
defined, 1-14
implementation, 3-11
global user
defined, 1-14, G-4
implementation, 3-5

H

hash function
defined, G-5
hash value
defined, G-5
hybrid cryptosystem
defined, 1-4, G-5

I

IDEA, 1-3
defined, G-5
identity
creating, 4-7
defined, 4-7, G-5
deleting, 4-13
integrity, 1-6
defined, G-5
International Data Encryption Algorithm (IDEA)
See IDEA, 1-3, G-5

K

key
defined, 1-2, G-5

M

MD5, 1-11, 2-4
defined, G-5
message digest
decrypting, 1-7
defined, 1-6
encrypting, 1-6
generating, 1-6 to 1-7
See Hash Value, G-5
Message Digest 5 (MD5)
See MD5, 1-11, G-5
mutual authentication
defined, 2-4, G-6

N

Net8, 2-4, 3-2
nonce
defined, 2-4, G-6
nonrepudiation, 1-6
defined, G-6

O

one-way hash function
characteristics, 1-6
defined, 1-6, G-6
using, 1-6 to 1-7
Oracle Enterprise Manager, 2-2, 2-4, 3-2
Oracle Names, 3-16
Oracle Security Adapter, 2-4
configuring, 3-15
defined, 2-2, G-6
Oracle Security Server Manager, 2-4, 3-5
defined, 2-2, G-6
Oracle Security Server Repository, 2-4, 3-15 to 3-16
constructing, 3-5
defined, 2-2, G-6
dependencies, 3-2
downloading wallet, 3-18 to 3-19
installing, 3-2
removing, 3-20
Oracle WebServer, 1-13, 2-4, 3-15, 4-11
oracle_security_service_admin username, 3-3, 4-2
Oracle8 Server, 1-2, 1-13, 2-2, 3-2, 3-5, 4-14 to 4-15
oss.source.location parameter, 3-16
oss.source.my_wallet parameter, 3-16 to 3-19
osslogin tool, 3-17 to 3-19

P

plaintext
defined, G-6
pre-image
defined, G-6
principal
defined, G-6
privacy
defined, G-6
private key
decrypting, 3-17 to 3-19
defined, 1-3, G-7
generating, 1-12
managing, 1-5
using, 1-6, 1-8, 2-4
private-key cryptography, 1-3
defined, G-7
private-key encryption
defined, G-7
privilege
defined, G-7
public key
defined, 1-3, G-7
generating, 1-12
in certificate, 1-10
using, 1-7, 1-10, 2-4
Public Key Cryptography Standards (PKCS)
# 1, 1-11
# 7, 1-11
public-key cryptography
benefits, 1-5
defined, 1-3, G-7
public-key encryption
defined, G-7

R

RC4, 1-5
defined, G-7
revocation status
checking, 2-4
role
defined, G-7
RSA, 1-3 to 1-5, 1-11
defined, G-7

S

secret-key cryptography
See Private-key cryptography, 1-3, G-8
Security Manager, 3-2
server
creating, 4-14
defined, 3-5, 4-14, G-8
deleting, 4-15
server authorization
adding to enterprise authorizations, 4-19
defined, 3-5, 4-15, G-8
deleting, 4-16
deleting from enterprise authorizations, 4-19
granting, 4-17
revoking, 4-17
session key
defined, 1-4, G-8
sign
defined, 1-6, G-8
signature
See Digital Signature, G-8
single sign-on
defined, G-8
SKEME, 1-10
SQL*Net, 2-4, 3-2
SQLNET.ORA file, 3-15, 3-17
stream cipher
defined, G-8
strength
defined, 1-2, G-8
subject
in certificate, 1-9
symmetric-key cryptography
See Private-key cryptography, 1-3, G-8

T

TIPEM, 1-11 to 1-12
defined, G-8
TNSNAMES.ORA file, 3-16
trustpoint
defined, G-9

U

URLs, 1-4, 1-10 to 1-12

V

validate
defined, G-9
verify
defined, 1-7, G-9

W

wallet
defined, 3-15, G-9
downloading, 3-17
Web Server
defined, G-9

X

X.500, 1-11 to 1-12
defined, G-9
X.509, 1-11 to 1-12, 3-17
defined, G-9


Prev
Oracle
Copyright © 1997 Oracle Corporation.

All Rights Reserved.

Library

Product

Contents