Home
Home
Customize
Customize
Help
Help
Contact us
Contact Us

Virtual Book about 'security'



Table of Contents: Virtual Book about 'security'

This virtual book brings together the most relevant topics about 'security'. The topics are grouped into these categories:
[Back to top]

Introductory Information about 'security'

This category includes definitions, overviews, concepts, restrictions, frequently asked questions, and explanations of how things work. This is where you should start if you are not familiar with this subject area.

Results in this section come from these books:

[ Next book ]

Concepts

Database Security

Security Mechanisms

Figure 1-4 Oracle Security Features

Security Domain

Security with Definer-Rights Procedures

Security Authorizations

Introduction to Database Security

Schemas, Database Users, and Security Domains

Security Issues for Middle-Tier Applications

Privileges, Roles, and Security Policies

Table Security Topics

View Security Topics

Increasing Table Security with Views

Procedure Security Topics

Procedure Execution and Security Domains

Type Security Topics

Security Domains of Roles and Users

Security Policy Example

Distributed Database Security

Figure 30-5 Global User Security

[ Previous book | Next book ]

Advanced Security Administrator's Guide

About the RADIUS Challenge-Response User Interface

Overview

Architecture of the Biometric Authentication Service

Overview of Oracle DCE Integration

Release Limitations

Overview

Issues and Restrictions

Introduction to Oracle Advanced Security

About Oracle Advanced Security

Oracle Advanced Security Architecture

Oracle Advanced Security Restrictions

About the Java Implementation

About Oracle Enterprise Login Assistant

Part I: Overview / Concepts

Overview of Enterprise User Security

Introduction to Enterprise User Security

Overview of Enterprise User Security Management

Figure 17-3 Overview of Enterprise User Security

Introduction

RADIUS Overview

Known Limitations

Architecture: Oracle Advanced Security and SSL

Introduction

Overview

[ Previous book | Next book ]

Application Developer's Guide - Fundamentals

Introduction to Security Policies

Features to Use in Establishing Security Policies

[ Previous book | Next book ]

Enterprise Manager Concepts Guide

Security

Security and Jobs

Security Management

Text description of the illustration security.gif

Oracle Enterprise Security Manager

[ Previous book | Next book ]

Integration Server Overview

Security

Security Enforcement:

[ Previous book | Next book ]

Message Broker Administration Guide

Provider Security Limitations

Network Security Overview

Figure 12-2 Overview of Network Security

[Next book]

Glossary

data security - Glossary

Database Security Administrator - Glossary

Enterprise Security Manager: - Glossary

Oracle Advanced Security - Glossary

Oracle Advanced Security - Glossary

security level - Glossary

Security Management: - Glossary

security policy - Glossary


[Back to top]

Tasks Related to 'security'

This category includes how-to information, both detailed procedures and general usage information and guidelines. The tasks are listed alphabetically, with shortcut links that jump to places within the list. For example, if you want to find Creating, look for a link labeled CRE.

Shortcuts to Tasks

ACT ADD ADM ASS AUT BRO CHA CLO CON CRE CUS DEC DEF DEL DIS
EAV ENA EST EXP FAL GRA IMP INC INS INT LOG MAN MAP NAM NAV
NEG NET OPE PAS PRE REM SAV SEC SEE SEL SET STA TRO USI VER

Activating Encryption and Integrity

Adding a Database to an Enterprise Domain

Administering Databases

Administering Enterprise Databases, Domains, and Users

Administering Enterprise Domains

Administering Enterprise Users

Administering the Biometric Authentication Service

Assigning a New PIN to a SecurID Card

Assigning Enterprise Users to an Enterprise Role

Authenticating Users with a Biometric Authentication Service

Browsing the Directory

Changing a Search Base

Changing a Wallet Password

Changing the Password

Closing a Wallet

Configuring Encryption and Integrity Parameters Using Net8 Assistant

Configuring Authentication Methods

Configuring CyberSafe Authentication

Configuring CyberSafe Authentication

Configuring Data Encryption and Integrity

Configuring Data Encryption and Integrity

Configuring DCE for Oracle DCE Integration

Configuring Each Database Server

Configuring Encryption on the Client and the Server

Configuring Entrust on a UNIX Client

Configuring Entrust on a UNIX Server

Configuring Entrust on a Windows Client

Configuring Entrust on a Windows Server

Configuring Entrust on the Client

Configuring Entrust on the Server

Configuring Entrust-Enabled SSL Authentication

Configuring Identix Biometric Authentication

Configuring Integrity on the Client and the Server

Configuring Kerberos Authentication

Configuring Multiple Authentication Methods

Configuring Multiple Authentication Methods

Configuring Oracle 8i and Net8:

Configuring Oracle8i for External Authentication

Configuring Oracle8i for Oracle DCE Integration

Configuring RADIUS Authentication

Configuring Secure Socket Layer Authentication

Configuring SecurID Authentication

Configuring SSL on the Client and Server

Configuring the Biometric Manager PC

Configuring the Client PC

Connecting Clients Outside DCE to Oracle Servers in DCE

Connecting to an Oracle Database in DCE

Connecting to an Oracle Database Server Authenticated by Kerberos

Connecting to an Oracle Database Server in the DCE Environment

Connecting with User Name and Password

Creating a Certificate Request

Creating a New Enterprise User

Creating a New Wallet

Creating a Shared Schema

Creating an Enterprise Domain

Creating an Enterprise Role within an Enterprise Domain

Creating an Enterprise User in the Directory

Creating Database Users

Creating Entrust Profiles

Creating Users for SecurID Authentication

Customizing the RADIUS Challenge-Response User Interface

Declaring A Security Servlet

Declaring A Security Servlet

Defining Security

Deleting an Enterprise Domain

Deleting an Enterprise User

Deleting the Wallet

Disabling Auto Login

Disabling Automatic Login

Disabling Oracle Advanced Security Authentication

Eavesdropping and Data Theft

Enabling Auto Login

Enabling Automatic Login

Enabling Biometric Authentication

Enabling Entrust Authentication

Enabling Kerberos Authentication

Enabling Propagation Security

Enabling RADIUS Authentication and Accounting

Enabling SecurID Authentication

Enabling SSL

Establishing Security Policies

Establishing Security Policies

Exporting a Trusted Certificate

Exporting a User Certificate Request

Exporting a Wallet

Exporting All Trusted Certificates

Falsifying User Identities

Granting an Enterprise Role to an Enterprise User

Importing a Trusted Certificate

Importing the User Certificate into the Wallet

Increasing Table Security with Views

Installing and Configuring Enterprise User Security

Installing and Configuring Oracle Enterprise Security Manager

Installing Oracle Advanced Security and Related Products

Installing the TouchSafe II Encrypt Device Driver for Windows NT

Integrating Authentication Devices Using RADIUS

Logging in to the Database

Logging On to the Oracle Server

Logging on When the SecurID Card is in Next Code Mode

Logging on with a PINPAD Card

Logging on with a Standard Card

Logging Security Exceptions

Managing Certificates

Managing Database Administrators

Managing Database Installation Administrators

Managing Database Security Administrators

Managing Enterprise Domain Administrators

Managing Enterprise User Security

Managing Security Administrators

Managing Trusted Certificates

Managing User Certificates

Managing User/Schema Separation

Managing Wallets

Mapping an Enterprise User to a Shared Schema

Naming Contexts

Navigating Oracle Enterprise Security Manager

Negotiating Encryption and Integrity

Networking and Security

Opening an Existing Wallet

Operating System Security

Pasting the Certificate

Pasting the Trusted Certificate

Preparing to Use SecurID Authentication

Removing a Database from an Enterprise Domain

Removing a Trusted Certificate

Removing a User Certificate from a Wallet

Saving Changes

Saving in System Default

Saving the Open Wallet to a New Location

Securing Thin JDBC

Seeding the Random Key Generator

Selecting a File that Contains the Certificate

Selecting a File that Contains the Trusted Certificate

Setting OS_AUTHENT_PREFIX to a Null Value

Setting the Encryption Seed

Setting the SQLNET.AUTHENTICATION_SERVICES Parameter in sqlnet.ora

Setting Up Shared Schemas

Starting Oracle Enterprise Login Assistant

Starting Oracle Wallet Manager

Starting the Listener

Troubleshooting Enterprise User Login

Using Application Context to Return a Specific Predicate (Security Policy)

Using Auto Login

Using Oracle Enterprise Login Assistant

Using Oracle Enterprise Security Manager

Using Oracle Wallet Manager

Using Oracle Wallet Manager with Oracle Application Server

Using PINPAD Cards

Using SecurID Authentication

Using Signed JAR Files to Conform to Sandbox Security

Using Signed JAR Files to Conform to Sandbox Security

Using SSL with Other Authentication Methods

Using Standard Cards

Using the Oracle Message Broker Security Service

Using tnsnames.ora for Name Lookup When CDS Is Inaccessible

Verifying that REMOTE_OS_AUTHENT Is Not Set to TRUE


[Back to top]

Examples of 'security'

This category includes sample procedure and sample code, to illustrate how to perform tasks or use features.

Results in this section come from these books:

[ Next book ]

Concepts

Figure 1-4 Oracle Security Features

Figure 30-5 Global User Security

Security Policy Example

[ Previous book | Next book ]

Advanced Security Administrator's Guide

Figure 17-3 Overview of Enterprise User Security

Figure 9-1 SSL Architecture in an Oracle Environment

[ Previous book | Next book ]

Enterprise Manager Concepts Guide

Text description of the illustration security.gif

[ Previous book | Next book ]

Message Broker Administration Guide

Figure 12-2 Overview of Network Security

[ Previous book | Next book ]

Advanced Security Administrator's Guide

Example: Asynchronous Authentication with ActivCard Tokens - RADIUS Authentication Modes

Example: Asynchronous Authentication with Smart Cards - RADIUS Authentication Modes

Example: Synchronous Authentication with SecurID Token Cards - RADIUS Authentication Modes

Example: The LISTENER.ORA File:

Example: The SQLNET.ORA File

Example: The TNSNAMES.ORA File:

Figure 1-1 How a Network Authentication Service Authenticates a User

Figure 1-2 Oracle Advanced Security in an Oracle Networking Environment

Figure 1-3 Net8 with Authentication Adapters

Figure 10-1 Entrust Authentication Process

Figure 17-1 A Directory Information Tree

Figure 17-10 The Oracle Service Window

Figure 17-11 The Oracle Enterprise Login Assistant Window

Figure 17-2 An Administrative Context

Figure 17-4 How Enterprise User Security Management Works

Figure 17-5 Example: The ldap.ora File (Microsoft NT)

Figure 17-6 Example: Oracle Context Subtree

Figure 17-7 Example: The OID Directory Server Login Window

Figure 17-8 Oracle Database Configuration Assistant Window (Finish)

Figure 17-9 DBCA Locate Initialization File Window

Figure 4-1 RADIUS in an Oracle Environment

Figure 4-2 Synchronous Authentication Sequence

Figure 4-3 Asynchronous Authentication Sequence

Figure 8-1 Typical Biometric Authentication Service Configuration

Figure 9-2 Connecting to an Oracle Server over the Internet

Figure 9-3 SSL in Relation to Oracle Advanced Security

Figure 9-4 SSL in Relation to Other Authentication Methods

Oracle Java SSL Examples

Sample Parameter Files

Sample sqlnet.ora File

Table 0-1 Abbreviations and Acronyms

Table 14-1 DCE Address Parameters and Definitions

Table 14-2 Setting Up External Role Syntax Components

Table 17-1 Administrative Groups in an Oracle Context

Table 17-2 Server-Related Objects in an Oracle Context

Table 17-3 Setting up an Enterprise Domain

Table 18-1 Certificate Request: Fields and Descriptions

Table 18-2 PKI Wallet Encoding Standards

Table 2-2 Valid Encryption Algorithms

Table 2-3 Valid Integrity Algorithms

Table 20-1 Authentication Types

Table 9-1 Oracle Advanced Security Cipher Suites

Table A-1 Algorithm Selection

Table A-2 Encryption and Integrity Level Settings

Table A-3 Data Encryption and Integrity Selected Lists

Table B-1 CyberSafe Configuration Parameters

Table B-10 Kerberos Authentication Parameters

Table B-11 SecurID Authentication Parameters

Table B-12 SQLNET.AUTHENTICATION_SERVICES

Table B-13 SQLNET.RADIUS_AUTHENTICATION

Table B-14 SQLNET.RADIUS_AUTHENTICATION_PORT

Table B-15 SQLNET.RADIUS_AUTHENTICATION_TIMEOUT

Table B-16 SQLNET.RADIUS_AUTHENTICATION_RETRIES

Table B-17 SQLNET.RADIUS_SEND_ACCOUNTING

Table B-18 SQLNET.RADIUS_SECRET

Table B-19 SQLNET.RADIUS_ALTERNATE

Table B-2 SQLNET.IDENTIX_USE_MD5HASH

Table B-20 SQLNET.RADIUS_ALTERNATE_PORT

Table B-21 SQLNET.RADIUS_ALTERNATE_TIMEOUT

Table B-22 SQLNET.RADIUS_ALTERNATE_RETRIES

Table B-23 SQLNET.RADIUS_CHALLENGE_RESPONSE

Table B-24 SQLNET.RADIUS_CHALLENGE_KEYWORD

Table B-25 SQLNET.RADIUS_AUTHENTICATION_INTERFACE

Table B-26 SQLNET.RADIUS_CLASSPATH

Table B-27 SSL Authentication Parameters

Table B-28 Cipher Suite Parameters

Table B-29 SSL Version Parameters

Table B-3 SQLNET.IDENTIX_KEY_INDEX

Table B-30 SSL Client Authentication Parameters

Table B-31 Wallet Location Parameters

Table B-4 SQLNET.IDENTIX_VERIFICATION_THRESHOLD

Table B-5 SQLNET.IDENTIX_FINGERPRINT_METHOD

Table B-6 SQLNET.IDENTIX_DATABASE_DIRECTORY

Table B-7 SQLNET.IDENTIX_FINGERPRINT_DATABASE

Table B-8 SQLNET.IDENTIX_FINGERPRINT_DATABASE_USER

Table B-9 SQLNET.IDENTIX_FINGERPRINT_DATABASE_PASSWORD

Table C-1 Server Encryption Level Setting

Table D-1 Sample Output from v$session_connect_info

Table E-1 Structural Object Classes and Attributes

Table E-2 LDAP Directory Schema Attributes

Table E-3 Minimum Required Access to Directory Objects.

[ Previous book | Next book ]

Application Developer's Guide - Advanced Queuing (AQ)

Table 4-1 Security with 8.0- and 8.1-Compatible Queues

Table 4-2 Operations and Required Privileges in the 8.1 Security Model

[ Previous book | Next book ]

CORBA Developer's Guide and Reference

Example 6-1 Setting SSL Security Information Using AuroraCertificateManager

Figure 6-2 Server callout requires security

Figure 6-3 Server callout requires security

[ Previous book | Next book ]

Distributed Database Systems

Figure 1-5 Global User Security

[ Previous book | Next book ]

Enterprise JavaBeans Developer's Guide and Reference

Example 6-1 Setting SSL Security Information Using AuroraCertificateManager

Example A-6 Reentrancy, Transaction Demarcation, and Security Role

Figure 6-2 Server callout requires security

Figure 6-3 Server callout requires security

Figure A-3 Security Mapping

Figure A-4 Security Mapping

[ Previous book | Next book ]

Enterprise Manager Administrator's Guide

Figure 6-6 Security Management Window

[ Previous book | Next book ]

Getting to Know Oracle8i

Table 6-4 Networking and Security Documentation

[ Previous book | Next book ]

Message Broker Administration Guide

Table 12-15 Security Service Java Properties

Table 12-3  Security Roles

Table 12-5  Message Provider Security in Oracle Message Broker

[ Previous book | Next book ]

Oracle Servlet Engine User's Guide

Example 8-1 Executing The Realm Command Listing Valid Security Commands

Figure 1-4 Security Components in the JNDI Namespace

[ Previous book | Next book ]

Replication Management API Reference

Figure A-1 Trusted Security: Multimaster Replication

Figure A-2 Untrusted Security: Multimaster Replication


[Back to top]

Detailed Reference Information on 'security'

This category includes syntax for associated statements, APIs, or commands.

Results in this section come from these books:

[ Next book ]

Reference

SQL92_SECURITY

[ Previous book | Next book ]

Advanced Security Administrator's Guide

addCertChain(byte[]) - OracleSSLCredential

addCertChain(String) - OracleSSLCredential

addTrustedCert(byte[]) - OracleSSLCredential

addTrustedCert(String) - OracleSSLCredential

checkValidity - X509CertificateImpl

checkValidity - X509CertificateImpl

Constructors - SSLSocketSession

Constructors - OracleSSLServerSocketFactory

Constructors - OracleSSLServerSocket

Constructors - OracleSSLCredential

Constructors - OracleSSLSession

Constructors - OracleSSLServerSocketFactoryImpl

Constructors - OracleSSLSocketFactoryImpl

Constructors - OracleSSLSocketFactory

Constructors - X509CertificateImpl

createServerSocket(int) - OracleSSLServerSocketFactoryImpl

createServerSocket(int, int) - OracleSSLServerSocketFactoryImpl

createServerSocket(int, int, InetAddress) - OracleSSLServerSocketFactoryImpl

createSocket(InetAddress, int) - OracleSSLSocketFactoryImpl

createSocket(InetAddress, int, InetAddress, int) - OracleSSLSocketFactoryImpl

createSocket(Socket) - OracleSSLSocketFactory

createSocket(Socket) - OracleSSLSocketFactoryImpl

createSocket(String, int) - OracleSSLSocketFactoryImpl

createSocket(String, int, InetAddress, int) - OracleSSLSocketFactoryImpl

decode - X509CertificateImpl

equals - X509CertificateImpl

Fields - X509CertificateImpl

Fields - OracleSSLProtocolVersion

getBasicConstraints - X509CertificateImpl

getCipherSuite() - SSLSocketSession

getCipherSuite() - OracleSSLSession

getCreationTime() - SSLSocketSession

getCreationTime() - OracleSSLSession

getCriticalExtensionOIDs - X509CertificateImpl

getDefaultCipherSuites() - OracleSSLServerSocketFactoryImpl

getDefaultCipherSuites() - OracleSSLSocketFactoryImpl

getEncoded - X509CertificateImpl

getExtensionValue - X509CertificateImpl

getId() - SSLSocketSession

getId() - OracleSSLSession

getIssuerDN - X509CertificateImpl

getIssuerUniqueID - X509CertificateImpl

getKeyUsage - X509CertificateImpl

getLastAccessedTime() - SSLSocketSession

getLastAccessedTime() - OracleSSLSession

getNegotiatedProtocolVersion() - OracleSSLSession

getNonCriticalExtensionOIDs - X509CertificateImpl

getNotAfter - X509CertificateImpl

getNotBefore - X509CertificateImpl

getPeerCertificateChain() - SSLSocketSession

getPeerCertificateChain() - OracleSSLSession

getPeerHost() - SSLSocketSession

getPeerHost() - OracleSSLSession

getPeerRawCertificateChain() - OracleSSLSession

getPublicKey - X509CertificateImpl

getSerialNumber - X509CertificateImpl

getSessionContext() - SSLSocketSession

getSessionContext() - OracleSSLSession

getSigAlgName - X509CertificateImpl

getSigAlgOID - X509CertificateImpl

getSigAlgParams - X509CertificateImpl

getSignature - X509CertificateImpl

getSubjectDN - X509CertificateImpl

getSubjectUniqueID - X509CertificateImpl

getSupportedCipherSuites() - OracleSSLSocketFactoryImpl

getSupportedCipherSuites() - OracleSSLServerSocketFactoryImpl

getTBSCertificate - X509CertificateImpl

getValue(String) - SSLSocketSession

getValue(String) - OracleSSLSession

getValueNames() - SSLSocketSession

getValueNames() - OracleSSLSession

getVersion - X509CertificateImpl

hashCode - X509CertificateImpl

hasUnsupportedCriticalExtension - X509CertificateImpl

invalidate() - OracleSSLSession

invalidate() - SSLSocketSession

Methods - OracleSSLServerSocket

Methods - OracleSSLServerSocketFactoryImpl

Methods - SSLSocketSession

Methods - OracleSSLSocketFactoryImpl

Methods - OracleSSLSocketFactory

Methods - X509CertificateImpl

Methods - OracleSSLServerSocketFactory

Methods - OracleSSLCredential

Methods - OracleSSLSession

OracleSSLCredential

OracleSSLCredential() - OracleSSLCredential

OracleSSLProtocolVersion

OracleSSLServerSocket

OracleSSLServerSocket(int) - OracleSSLServerSocket

OracleSSLServerSocket(int, int) - OracleSSLServerSocket

OracleSSLServerSocket(int, int, InetAddress) - OracleSSLServerSocket

OracleSSLServerSocketFactory

OracleSSLServerSocketFactory() - OracleSSLServerSocketFactory

OracleSSLServerSocketFactoryImpl

OracleSSLServerSocketFactoryImpl() - OracleSSLServerSocketFactoryImpl

OracleSSLSession

OracleSSLSession() - OracleSSLSession

OracleSSLSocketFactory

OracleSSLSocketFactory() - OracleSSLSocketFactory

OracleSSLSocketFactoryImpl

OracleSSLSocketFactoryImpl() - OracleSSLSocketFactoryImpl

putValue(String, Object) - OracleSSLSession

putValue(String, Object) - SSLSocketSession

removeCertChainCert(int) - OracleSSLCredential

removeTrustedCert(int) - OracleSSLCredential

removeValue(String) - OracleSSLSession

removeValue(String) - SSLSocketSession

setPrivateKey(byte[], String) - OracleSSLCredential

setPrivateKey(String, String) - OracleSSLCredential

setSSLCredentials(OracleSSLCredential) - OracleSSLSocketFactoryImpl

setSSLCredentials(OracleSSLCredential) - OracleSSLServerSocketFactory

setSSLCredentials(OracleSSLCredential) - OracleSSLServerSocketFactoryImpl

setSSLCredentials(OracleSSLCredential) - OracleSSLSocketFactory

setSSLProtocolVersion(int) - OracleSSLSocketFactory

setSSLProtocolVersion(int) - OracleSSLServerSocket

setSSLProtocolVersion(int) - OracleSSLServerSocketFactoryImpl

setSSLProtocolVersion(int) - OracleSSLServerSocketFactory

setSSLProtocolVersion(int) - OracleSSLSocketFactoryImpl

setSSLSessionContext(byte[]) - OracleSSLSession

setWallet(String, String) - OracleSSLCredential

SSLSocketSession

SSLSocketSession() - SSLSocketSession

SSL_Version_2_0 - OracleSSLProtocolVersion

SSL_Version_3_0 - OracleSSLProtocolVersion

SSL_Version_3_0_Only - OracleSSLProtocolVersion

SSL_Version_3_0_With_2_0_Hello - OracleSSLProtocolVersion

SSL_Version_Undetermined - OracleSSLProtocolVersion

toString - X509CertificateImpl

toString() - OracleSSLCredential

verify - X509CertificateImpl

verify - X509CertificateImpl

X509Certificate - X509CertificateImpl

X509CertificateImpl - X509CertificateImpl

X509CertificateImpl - X509CertificateImpl

X509CertificateImpl - X509CertificateImpl

X509CertificateImpl

_x509CertHelper - X509CertificateImpl

[ Previous book | Next book ]

CORBA Developer's Guide and Reference

Callbacks using Security

Callouts using Security

Figure 6-2 Server callout requires security

Figure 6-3 Server callout requires security

IIOP Security

SECURITY_AUTHENTICATION

SECURITY_CREDENTIALS

SECURITY_PRINCIPAL

SECURITY_ROLE

[ Previous book | Next book ]

Enterprise JavaBeans Developer's Guide and Reference

Callbacks using Security

Callouts using Security

Figure 6-2 Server callout requires security

Figure 6-3 Server callout requires security

Figure A-3 Security Mapping

Figure A-4 Security Mapping

IIOP Security

Security Role

SECURITY_AUTHENTICATION

SECURITY_CREDENTIALS

SECURITY_PRINCIPAL

SECURITY_ROLE

[ Previous book | Next book ]

Enterprise Manager SNMP Support Reference Guide

oraListenerSecurityLevel

[ Previous book | Next book ]

Java Tools Reference

Security Management

[ Previous book | Next book ]

JDBC Developer's Guide and Reference

Applets and Security

JDBC Client-Side Security Features

JDBC Support for Oracle Advanced Security

OCI Driver Support for Oracle Advanced Security

Thin Driver Support for Oracle Advanced Security

[ Previous book | Next book ]

PL/SQL User's Guide and Reference

Tight Security

[ Previous book | Next book ]

Replication Management API Reference

Figure A-1 Trusted Security: Multimaster Replication

Figure A-2 Untrusted Security: Multimaster Replication

Security Options

Security Setup for Multimaster Replication

Security Setup for Snapshot Replication

Trusted vs. Untrusted Security

Trusted vs. Untrusted Security

[ Previous book | Next book ]

SQL*Plus User's Guide and Reference

Security


[Back to top]

Troubleshooting Information About 'security'

This category includes information about debugging, preventing errors or handling them when they occur, frequently asked questions, and relevant error messages.

Results in this section come from these books:

[ Next book ]

Advanced Security Administrator's Guide

Issues and Restrictions

Known Limitations

ORA-12560: Protocol adapter error

ORA-12681 "Login failed: the SecurID card does not have a pincode yet"

ORA-12682, "Login failed: the SecurID card is in next PRN mode"

ORA-12688 "Login failed: the SecurID server rejected the new pincode"

Oracle Advanced Security Restrictions

Release Limitations

Troubleshooting

Troubleshooting

Troubleshooting

Troubleshooting

Troubleshooting Enterprise User Login

[ Previous book | Next book ]

Application Developer's Guide - Advanced Queuing (AQ)

Why do I get java.security.AccessControlException when using JMS MessageListeners from java stored procedures inside Oracle8i JServer

[ Previous book | Next book ]

Enterprise Manager Messages Manual

VXN-1006: Security exception accessing property oem.BootHost, and no such applet parameter was found.

[ Previous book | Next book ]

Error Messages

Network Security Messages (NZE)

NNF-01012 DCE generic security failure

NNF-01103 DS_C_SECURITY_ERROR

ORA-02004 security violation

ORA-09270 szalloc: error allocating memory for security

ORA-28108 circular row level security policies detected

TNS-00294 Connection Manager: Security is enabled, you cannot STOP the Interchange

TNS-00295 Navigator: Security is enabled, you cannot STOP the Navigator

TNS-01025 Security string

[ Previous book | Next book ]

Message Broker Administration Guide

Logging Security Exceptions

Provider Security Limitations

Security Exceptions


[Back to top]

Index Entries about 'security'

The index entries show related terms, and identify the most important places where your subject is mentioned.
AN AS SE TA HT SQ AD SA EN OS &L NE DA GE OR TR AP AU SY BE SI

Index Entries

<security-role> element (Enterprise JavaBeans Developer's Guide and Reference)
     [entry #2] (Enterprise JavaBeans Developer's Guide and Reference)
     [entry #3] (Enterprise JavaBeans Developer's Guide and Reference)
     [entry #4] (Enterprise JavaBeans Developer's Guide and Reference)
<security-role-mapping> element (Enterprise JavaBeans Developer's Guide and Reference)
<security-role-ref> element (Enterprise JavaBeans Developer's Guide and Reference)
     [entry #2] (Enterprise JavaBeans Developer's Guide and Reference)
addCertChain(byte[]) - oracle.security.ssl.OracleSSLCredential.addCertChain(byte[]) (Advanced Security Administrator's Guide)
addCertChain(String) - oracle.security.ssl.OracleSSLCredential.addCertChain(java.lang.String) (Advanced Security Administrator's Guide)
addTrustedCert(byte[]) - oracle.security.ssl.OracleSSLCredential.addTrustedCert(byte[]) (Advanced Security Administrator's Guide)
addTrustedCert(String) - oracle.security.ssl.OracleSSLCredential.addTrustedCert(java.lang.String) (Advanced Security Administrator's Guide)
Advanced Security option. See Oracle Advanced Security. (Getting to Know Oracle8i)
ANO (Oracle Advanced Security) (JDBC Developer's Guide and Reference)
ASO (Oracle Advanced Security) (JDBC Developer's Guide and Reference)
authentication (security) (JDBC Developer's Guide and Reference)
benefits of Oracle Advanced Security (Advanced Security Administrator's Guide)
data security (SQL*Plus User's Guide and Reference)
enhancing security with (Concepts)
Enterprise Security Manager (Enterprise Manager Concepts Guide)
enterprise user security (Net8 Administrator's Guide)
getCipherSuite() - oracle.security.ssl.OracleSSLSession.getCipherSuite() (Advanced Security Administrator's Guide)
getCipherSuite() - oracle.security.ssl.SSLSocketSession.getCipherSuite() (Advanced Security Administrator's Guide)
getCreationTime() - oracle.security.ssl.OracleSSLSession.getCreationTime() (Advanced Security Administrator's Guide)
getCreationTime() - oracle.security.ssl.SSLSocketSession.getCreationTime() (Advanced Security Administrator's Guide)
getDefaultCipherSuites() - oracle.security.ssl.OracleSSLServerSocketFactoryImpl.getDefaultCipherSuites() (Advanced Security Administrator's Guide)
getDefaultCipherSuites() - oracle.security.ssl.OracleSSLSocketFactoryImpl.getDefaultCipherSuites() (Advanced Security Administrator's Guide)
getId() - oracle.security.ssl.OracleSSLSession.getId() (Advanced Security Administrator's Guide)
getId() - oracle.security.ssl.SSLSocketSession.getId() (Advanced Security Administrator's Guide)
getLastAccessedTime() - oracle.security.ssl.OracleSSLSession.getLastAccessedTime() (Advanced Security Administrator's Guide)
getLastAccessedTime() - oracle.security.ssl.SSLSocketSession.getLastAccessedTime() (Advanced Security Administrator's Guide)
getNegotiatedProtocolVersion() - oracle.security.ssl.OracleSSLSession.getNegotiatedProtocolVersion() (Advanced Security Administrator's Guide)
getPeerCertificateChain() - oracle.security.ssl.OracleSSLSession.getPeerCertificateChain() (Advanced Security Administrator's Guide)
getPeerCertificateChain() - oracle.security.ssl.SSLSocketSession.getPeerCertificateChain() (Advanced Security Administrator's Guide)
getPeerHost() - oracle.security.ssl.OracleSSLSession.getPeerHost() (Advanced Security Administrator's Guide)
getPeerHost() - oracle.security.ssl.SSLSocketSession.getPeerHost() (Advanced Security Administrator's Guide)
getPeerRawCertificateChain() - oracle.security.ssl.OracleSSLSession.getPeerRawCertificateChain() (Advanced Security Administrator's Guide)
getSessionContext() - oracle.security.ssl.OracleSSLSession.getSessionContext() (Advanced Security Administrator's Guide)
getSessionContext() - oracle.security.ssl.SSLSocketSession.getSessionContext() (Advanced Security Administrator's Guide)
getSupportedCipherSuites() - oracle.security.ssl.OracleSSLServerSocketFactoryImpl.getSupportedCipherSuites() (Advanced Security Administrator's Guide)
getSupportedCipherSuites() - oracle.security.ssl.OracleSSLSocketFactoryImpl.getSupportedCipherSuites() (Advanced Security Administrator's Guide)
getValue(String) - oracle.security.ssl.OracleSSLSession.getValue(java.lang.String) (Advanced Security Administrator's Guide)
getValue(String) - oracle.security.ssl.SSLSocketSession.getValue(java.lang.String) (Advanced Security Administrator's Guide)
getValueNames() - oracle.security.ssl.OracleSSLSession.getValueNames() (Advanced Security Administrator's Guide)
getValueNames() - oracle.security.ssl.SSLSocketSession.getValueNames() (Advanced Security Administrator's Guide)
HTTP security (Oracle Servlet Engine User's Guide)
authentication and authorization (Oracle Servlet Engine User's Guide)
Declaring A Security Servlet (Oracle Servlet Engine User's Guide)
Declaring Permissions (Oracle Servlet Engine User's Guide)
Mechanics of Creating a Security Servlet (Oracle Servlet Engine User's Guide)
Mechanics of protecting a resource (Oracle Servlet Engine User's Guide)
The Mechanics of Permissions (Oracle Servlet Engine User's Guide)
Trouble Shooting (Oracle Servlet Engine User's Guide)
httpSecurity (Oracle Servlet Engine User's Guide)
Oracle Advanced Security (Oracle Call Interface Programmer's Guide)
     [entry #2] (Getting to Know Oracle8i)
     [entry #3] (Application Developer's Guide - Fundamentals)
CyberSAFE authentication method (Net8 Administrator's Guide)
DCE Integration (Net8 Administrator's Guide)
described (Net8 Administrator's Guide)
DES_40 encryption (Net8 Administrator's Guide)
features of (Net8 Administrator's Guide)
Identix authentication method (Net8 Administrator's Guide)
integrated security and directory services (Getting to Know Oracle8i)
Kerberos authentication method (Net8 Administrator's Guide)
MD5 checksumming (Net8 Administrator's Guide)
Network Security (Net8 Administrator's Guide)
RADIUS (Getting to Know Oracle8i)
RADIUS authentication method (Net8 Administrator's Guide)
RC4_128 encryption (Net8 Administrator's Guide)
RC4_40 encryption (Net8 Administrator's Guide)
RC4_56 encryption (Net8 Administrator's Guide)
SecurID authentication method (Net8 Administrator's Guide)
Single Sign-On (Net8 Administrator's Guide)
SSL (Getting to Know Oracle8i)
SSL authentication method (Net8 Administrator's Guide)
support by JDBC (JDBC Developer's Guide and Reference)
support by OCI drivers (JDBC Developer's Guide and Reference)
support by Thin driver (JDBC Developer's Guide and Reference)
Oracle Advanced Security option (Getting to Know Oracle8i)
Oracle Enterprise Security Manager (Concepts)
     [entry #2] (Getting to Know Oracle8i)
     [entry #3] (Enterprise Manager Concepts Guide)
Oracle Security Management (Enterprise Manager Concepts Guide)
     [entry #2] (Enterprise Manager Administrator's Guide)
Oracle Security Server (Getting to Know Oracle8i)
     [entry #2] (Getting to Know Oracle8i)
     [entry #3] (Getting to Know Oracle8i)
OracleSecurityAdmins group (Documentation Addendum)
     [entry #2] (Documentation Addendum)
     [entry #3] (Net8 Administrator's Guide)
     [entry #4] (Net8 Administrator's Guide)
     [entry #5] (Documentation Addendum)
     [entry #6] (Documentation Addendum)
oraListenerSecurityLevel variable (Enterprise Manager SNMP Support Reference Guide)
OSS. See Oracle Security Server. (Getting to Know Oracle8i)
SASL. See Simple Authentication and Security Layer (SASL). (Internet Directory Administrator's Guide)
security (Concepts)
     [entry #2] (Concepts)
     [entry #3] (Recovery Manager User's Guide and Reference)
     [entry #4] (Replication)
accessing a database (Administrator's Guide)
administrator of (Administrator's Guide)
administrator privileges (Concepts)
application context (Application Developer's Guide - Fundamentals)
application developers and (Administrator's Guide)
application enforcement of (Concepts)
auditing (Concepts)
     [subentry #2] (Concepts)
auditing policies (Administrator's Guide)
auditing user actions (Concepts)
authentication (JDBC Developer's Guide and Reference)
     [subentry #2] (Message Broker Administration Guide)
authentication of users (Administrator's Guide)
BFILEs (Application Developer's Guide - Large Objects (LOBs))
     [subentry #2] (Application Developer's Guide - Large Objects (LOBs))
BFILEs using SQL DDL (Application Developer's Guide - Large Objects (LOBs))
BFILEs using SQL DML (Application Developer's Guide - Large Objects (LOBs))
book recommendations (Java Developer's Guide)
changing password (SQL*Plus User's Guide and Reference)
CORBA (Java Developer's Guide)
data (Administrator's Guide)
     [subentry #2] (Concepts)
database security (Administrator's Guide)
database users and (Administrator's Guide)
definer rights (Concepts)
     [subentry #2] (Concepts)
deleting audit data (Concepts)
described (Concepts)
discretionary access control (Concepts)
     [subentry #2] (Concepts)
distributed databases (Distributed Database Systems)
centralized user management (Distributed Database Systems)
domains (Concepts)
     [subentry #2] (Concepts)
dynamic predicates (Concepts)
EJB (Java Developer's Guide)
embedded web reports (SQL*Plus User's Guide and Reference)
encryption (JDBC Developer's Guide and Reference)
enforcement in application (Application Developer's Guide - Fundamentals)
enforcement in database (Application Developer's Guide - Fundamentals)
enforcement mechanisms (Concepts)
establishing policies (Administrator's Guide)
features of Oracle8i (Application Developer's Guide - Fundamentals)
fine-grained access control (Concepts)
     [subentry #2] (Application Developer's Guide - Fundamentals)
for different clients (Internet Directory Administrator's Guide)
for multimaster replication (Replication Management API Reference)
trusted vs. untrusted (Replication Management API Reference)
general users (Administrator's Guide)
in LDAP Version 3 (Internet Directory Administrator's Guide)
integrity (JDBC Developer's Guide and Reference)
invoker rights (Concepts)
     [subentry #2] (Concepts)
Java 2 (Java Developer's Guide)
JDBC (Java Developer's Guide)
JVM (Java Developer's Guide)
level of (Administrator's Guide)
LSNRCTL utility (Net8 Administrator's Guide)
message queues (Concepts)
multi-byte characters
in role names (Administrator's Guide)
in role passwords (Administrator's Guide)
NAMESCTL utility (Net8 Administrator's Guide)
network (Java Developer's Guide)
operating system resources (Java Developer's Guide)
Oracle Advanced Security support (JDBC Developer's Guide and Reference)
overview (JDBC Developer's Guide and Reference)
passwords (Concepts)
policies
implementing (Concepts)
policy for applications (Application Developer's Guide - Fundamentals)
     [subentry #2] (Application Developer's Guide - Fundamentals)
PRODUCT_USER_PROFILE table (SQL*Plus User's Guide and Reference)
Recovery Manager (Recovery Manager User's Guide and Reference)
roles (Application Developer's Guide - Fundamentals)
Secure Sockets Layer (SSL) (Message Broker Administration Guide)
SSL parameters for different clients (Internet Directory Administrator's Guide)
table- or view-based (Application Developer's Guide - Fundamentals)
threats and countermeasures (Application Developer's Guide - Fundamentals)
within Oracle Internet Directory environment (Internet Directory Administrator's Guide)
Security (Application Developer's Guide - Advanced Queuing (AQ))
RESTRICT (SQL*Plus User's Guide and Reference)
     [subentry #2] (SQL*Plus User's Guide and Reference)
Trouble Shooting (Oracle Servlet Engine User's Guide)
security (Net8 Administrator's Guide)
     [entry #2] (Net8 Administrator's Guide)
     [entry #3] (Message Broker Administration Guide)
     [entry #4] (Internet Directory Administrator's Guide)
     [entry #5] (Integration Server Overview)
     [entry #6] (Java Developer's Guide)
     [entry #7] (Java Developer's Guide)
accessing a database (Administrator's Guide)
administrator of (Administrator's Guide)
administrator privileges (Concepts)
application context (Application Developer's Guide - Fundamentals)
application developers and (Administrator's Guide)
application enforcement of (Concepts)
auditing (Concepts)
     [subentry #2] (Concepts)
auditing policies (Administrator's Guide)
auditing user actions (Concepts)
authentication (JDBC Developer's Guide and Reference)
     [subentry #2] (Message Broker Administration Guide)
authentication of users (Administrator's Guide)
BFILEs (Application Developer's Guide - Large Objects (LOBs))
     [subentry #2] (Application Developer's Guide - Large Objects (LOBs))
BFILEs using SQL DDL (Application Developer's Guide - Large Objects (LOBs))
BFILEs using SQL DML (Application Developer's Guide - Large Objects (LOBs))
book recommendations (Java Developer's Guide)
changing password (SQL*Plus User's Guide and Reference)
CORBA (Java Developer's Guide)
data (Administrator's Guide)
     [subentry #2] (Concepts)
database security (Administrator's Guide)
database users and (Administrator's Guide)
definer rights (Concepts)
     [subentry #2] (Concepts)
deleting audit data (Concepts)
described (Concepts)
discretionary access control (Concepts)
     [subentry #2] (Concepts)
distributed databases (Distributed Database Systems)
centralized user management (Distributed Database Systems)
domains (Concepts)
     [subentry #2] (Concepts)
dynamic predicates (Concepts)
EJB (Java Developer's Guide)
embedded web reports (SQL*Plus User's Guide and Reference)
encryption (JDBC Developer's Guide and Reference)
enforcement in application (Application Developer's Guide - Fundamentals)
enforcement in database (Application Developer's Guide - Fundamentals)
enforcement mechanisms (Concepts)
establishing policies (Administrator's Guide)
features of Oracle8i (Application Developer's Guide - Fundamentals)
fine-grained access control (Concepts)
     [subentry #2] (Application Developer's Guide - Fundamentals)
for different clients (Internet Directory Administrator's Guide)
for multimaster replication (Replication Management API Reference)
trusted vs. untrusted (Replication Management API Reference)
general users (Administrator's Guide)
in LDAP Version 3 (Internet Directory Administrator's Guide)
integrity (JDBC Developer's Guide and Reference)
invoker rights (Concepts)
     [subentry #2] (Concepts)
Java 2 (Java Developer's Guide)
JDBC (Java Developer's Guide)
JVM (Java Developer's Guide)
level of (Administrator's Guide)
LSNRCTL utility (Net8 Administrator's Guide)
message queues (Concepts)
multi-byte characters
in role names (Administrator's Guide)
in role passwords (Administrator's Guide)
NAMESCTL utility (Net8 Administrator's Guide)
network (Java Developer's Guide)
operating system resources (Java Developer's Guide)
Oracle Advanced Security support (JDBC Developer's Guide and Reference)
overview (JDBC Developer's Guide and Reference)
passwords (Concepts)
policies
implementing (Concepts)
policy for applications (Application Developer's Guide - Fundamentals)
     [subentry #2] (Application Developer's Guide - Fundamentals)
PRODUCT_USER_PROFILE table (SQL*Plus User's Guide and Reference)
Recovery Manager (Recovery Manager User's Guide and Reference)
roles (Application Developer's Guide - Fundamentals)
Secure Sockets Layer (SSL) (Message Broker Administration Guide)
SSL parameters for different clients (Internet Directory Administrator's Guide)
table- or view-based (Application Developer's Guide - Fundamentals)
threats and countermeasures (Application Developer's Guide - Fundamentals)
within Oracle Internet Directory environment (Internet Directory Administrator's Guide)
Security (Oracle Servlet Engine User's Guide)
     [entry #2] (Oracle Servlet Engine User's Guide)
RESTRICT (SQL*Plus User's Guide and Reference)
     [subentry #2] (SQL*Plus User's Guide and Reference)
Trouble Shooting (Oracle Servlet Engine User's Guide)
security (Java Stored Procedures Developer's Guide)
     [entry #2] (Distributed Database Systems)
accessing a database (Administrator's Guide)
administrator of (Administrator's Guide)
administrator privileges (Concepts)
application context (Application Developer's Guide - Fundamentals)
application developers and (Administrator's Guide)
application enforcement of (Concepts)
auditing (Concepts)
     [subentry #2] (Concepts)
auditing policies (Administrator's Guide)
auditing user actions (Concepts)
authentication (JDBC Developer's Guide and Reference)
     [subentry #2] (Message Broker Administration Guide)
authentication of users (Administrator's Guide)
BFILEs (Application Developer's Guide - Large Objects (LOBs))
     [subentry #2] (Application Developer's Guide - Large Objects (LOBs))
BFILEs using SQL DDL (Application Developer's Guide - Large Objects (LOBs))
BFILEs using SQL DML (Application Developer's Guide - Large Objects (LOBs))
book recommendations (Java Developer's Guide)
changing password (SQL*Plus User's Guide and Reference)
CORBA (Java Developer's Guide)
data (Administrator's Guide)
     [subentry #2] (Concepts)
database security (Administrator's Guide)
database users and (Administrator's Guide)
definer rights (Concepts)
     [subentry #2] (Concepts)
deleting audit data (Concepts)
described (Concepts)
discretionary access control (Concepts)
     [subentry #2] (Concepts)
distributed databases (Distributed Database Systems)
centralized user management (Distributed Database Systems)
domains (Concepts)
     [subentry #2] (Concepts)
dynamic predicates (Concepts)
EJB (Java Developer's Guide)
embedded web reports (SQL*Plus User's Guide and Reference)
encryption (JDBC Developer's Guide and Reference)
enforcement in application (Application Developer's Guide - Fundamentals)
enforcement in database (Application Developer's Guide - Fundamentals)
enforcement mechanisms (Concepts)
establishing policies (Administrator's Guide)
features of Oracle8i (Application Developer's Guide - Fundamentals)
fine-grained access control (Concepts)
     [subentry #2] (Application Developer's Guide - Fundamentals)
for different clients (Internet Directory Administrator's Guide)
for multimaster replication (Replication Management API Reference)
trusted vs. untrusted (Replication Management API Reference)
general users (Administrator's Guide)
in LDAP Version 3 (Internet Directory Administrator's Guide)
integrity (JDBC Developer's Guide and Reference)
invoker rights (Concepts)
     [subentry #2] (Concepts)
Java 2 (Java Developer's Guide)
JDBC (Java Developer's Guide)
JVM (Java Developer's Guide)
level of (Administrator's Guide)
LSNRCTL utility (Net8 Administrator's Guide)
message queues (Concepts)
multi-byte characters
in role names (Administrator's Guide)
in role passwords (Administrator's Guide)
NAMESCTL utility (Net8 Administrator's Guide)
network (Java Developer's Guide)
operating system resources (Java Developer's Guide)
Oracle Advanced Security support (JDBC Developer's Guide and Reference)
overview (JDBC Developer's Guide and Reference)
passwords (Concepts)
policies
implementing (Concepts)
policy for applications (Application Developer's Guide - Fundamentals)
     [subentry #2] (Application Developer's Guide - Fundamentals)
PRODUCT_USER_PROFILE table (SQL*Plus User's Guide and Reference)
Recovery Manager (Recovery Manager User's Guide and Reference)
roles (Application Developer's Guide - Fundamentals)
Secure Sockets Layer (SSL) (Message Broker Administration Guide)
SSL parameters for different clients (Internet Directory Administrator's Guide)
table- or view-based (Application Developer's Guide - Fundamentals)
threats and countermeasures (Application Developer's Guide - Fundamentals)
within Oracle Internet Directory environment (Internet Directory Administrator's Guide)
security customization (Oracle Servlet Engine User's Guide)
     [entry #2] (Oracle Servlet Engine User's Guide)
security defaults (Oracle Servlet Engine User's Guide)
security domains (Concepts)
     [entry #2] (Concepts)
enabled roles and (Concepts)
tablespace quotas (Concepts)
Security Enforcement (Integration Server Overview)
security enhancements (Getting to Know Oracle8i)
     [entry #2] (Getting to Know Oracle8i)
application development (Getting to Know Oracle8i)
fine-grained access control (Getting to Know Oracle8i)
integrated security and directory services (Getting to Know Oracle8i)
multi-tier authentication and authorization (Getting to Know Oracle8i)
native authentication on Windows NT (Getting to Know Oracle8i)
Security HTTP (Oracle Servlet Engine User's Guide)
security level (SQL*Plus User's Guide and Reference)
security login (Parallel Server Setup and Configuration Guide)
     [entry #2] (Enterprise Manager Configuration Guide)
Security Management (Enterprise Manager Concepts Guide)
     [entry #2] (Enterprise Manager Administrator's Guide)
Security Model (Integration Server Overview)
security servle (Oracle Servlet Engine User's Guide)
Security with Queues (Application Developer's Guide - Advanced Queuing (AQ))
SecurityManager class (Java Developer's Guide)
SecurityPermission (Java Developer's Guide)
     [entry #2] (Java Developer's Guide)
     [entry #3] (Java Developer's Guide)
     [entry #4] (Java Developer's Guide)
SECURITY_AUTHENTICATION property (Enterprise JavaBeans Developer's Guide and Reference)
     [entry #2] (Enterprise JavaBeans Developer's Guide and Reference)
     [entry #3] (CORBA Developer's Guide and Reference)
SECURITY_CREDENTIALS property (Enterprise JavaBeans Developer's Guide and Reference)
     [entry #2] (CORBA Developer's Guide and Reference)
     [entry #3] (Enterprise JavaBeans Developer's Guide and Reference)
SECURITY_PRINCIPAL property (Enterprise JavaBeans Developer's Guide and Reference)
     [entry #2] (Enterprise JavaBeans Developer's Guide and Reference)
     [entry #3] (CORBA Developer's Guide and Reference)
SECURITY_ROLE property (Enterprise JavaBeans Developer's Guide and Reference)
     [entry #2] (Enterprise JavaBeans Developer's Guide and Reference)
     [entry #3] (CORBA Developer's Guide and Reference)
Simple Authentication and Security Layer (SASL) (Internet Directory Administrator's Guide)
SQL92_SECURITY initialization parameter (Reference)
     [entry #2] (Getting to Know Oracle8i)
system-based security (Replication)
table- or view-based security (Application Developer's Guide - Fundamentals)
tracing security exceptions (Message Broker Administration Guide)
Transport Layer Security (TLS) (Internet Directory Administrator's Guide)
trusted security (Replication Management API Reference)
     [entry #2] (Replication Management API Reference)

[Back to top]

Bibliography

The links on this page lead to many different books. This section lists PDF files that you can download and print, if you want to do further reading. This section also identifies the relevant chapters that you can print out, rather than printing the entire book.

PDF FileMajor Topics to Print
Administrator's Guide
  • Establishing Security Policies
  • System Security Policy
Advanced Security Administrator's Guide
  • Data Encryption and Integrity Parameters
  • Data Encryption and Integrity Parameters
  • Encryption and Integrity Level Settings:
  • Encryption and Integrity Selected Lists
  • Parameters for Clients and Servers using CyberSafe Authentication
  • sqlnet.ora File Parameters
  • Parameters for Clients and Servers using Kerberos Authentication
  • Parameters for Clients and Servers using SecurID Authentication
  • sqlnet.ora File Parameters
  • Authentication Parameters
  • Cipher Suites
  • SSL Version
  • SSL Client Authentication
  • Wallet Location
  • Integrating Authentication Devices Using RADIUS
  • Customizing the RADIUS Challenge-Response User Interface
  • Status Information
  • Structural Object Classes
  • Attributes
  • Access Controls
  • Oracle Implementation of Java SSL
  • OracleSSLCredential
  • OracleSSLProtocolVersion
  • OracleSSLServerSocket
  • OracleSSLServerSocketFactory
  • OracleSSLServerSocketFactoryImpl
  • OracleSSLSession
  • OracleSSLSocketFactory
  • OracleSSLSocketFactoryImpl
  • SSLSocketSession
  • X509CertificateImpl
  • Configuring Multiple Authentication Methods
  • Configuring Oracle8i for External Authentication
  • Configuring Identix Biometric Authentication
  • Overview
  • Prerequisites
  • Configuring Data Encryption and Integrity
  • Configuring Data Encryption and Integrity
  • Configuring Encryption and Integrity Parameters Using Net8 Assistant
  • Configuring CyberSafe Authentication
  • Connecting to an Oracle Database in DCE
  • Configuring DCE for Oracle DCE Integration
  • DCE and Non-DCE Interoperability
  • Overview of Oracle DCE Integration
  • Configuring Entrust-Enabled SSL Authentication
  • Entrust Authentication Process
  • Enabling Entrust Authentication
  • Configuring Entrust on the Client
  • Configuring Entrust on the Server
  • Glossary
  • Introduction to Oracle Advanced Security
  • Security Threats
  • Authentication
  • Oracle Advanced Security Architecture
  • Thin JDBC Support
  • About the Java Implementation
  • Configuring Kerberos Authentication
  • Utilities for the Kerberos Authentication Adapter
  • Using Oracle Enterprise Login Assistant
  • Managing Enterprise User Security
  • Overview of Enterprise User Security
  • About Directories
  • Elements of Enterprise User Security Management
  • Overview of Enterprise User Security Management
  • The Enterprise User Security Process
  • Shared Schemas
  • Task 3: Install and Configure the Database
  • Task 4: Configure the Database for SSL
  • Task 5: Create and Configure the Wallet
  • Task 8: Configure an Enterprise Domain
  • Task 10: Log In as the Enterprise User
  • Troubleshooting Enterprise User Login
  • Configuring Oracle8i for Oracle DCE Integration
  • DCE Address Parameters
  • Task 3: Set up DCE Integration External Roles
  • Introduction
  • Configuring Authentication Methods
  • Abbreviations and Acronyms
  • Configuring RADIUS Authentication
  • RADIUS Overview
  • RADIUS Authentication Modes
  • Synchronous Authentication Mode
  • Challenge-Response (Asynchronous) Authentication Mode
  • Configuring SecurID Authentication
  • Using SecurID Authentication
  • Logging On to the Oracle Server
  • Logging on When the SecurID Card is in Next Code Mode
  • Configuring Secure Socket Layer Authentication
  • Architecture of SSL in an Oracle Environment
  • SSL Beyond an Oracle Environment
  • SSL Combined with Other Authentication Methods
  • Architecture: Oracle Advanced Security and SSL
  • Using SSL with Other Authentication Methods
  • Task 2: Configure SSL on the Client
  • Using Oracle Enterprise Security Manager
  • Task 4: Log Into the Directory
  • Navigating Oracle Enterprise Security Manager
  • Administering Enterprise Databases, Domains, and Users
  • Administering Enterprise Domains
  • Administering Enterprise Users
  • Managing Security Administrators
  • Using Oracle Wallet Manager
  • Managing Wallets
  • Using Auto Login
  • Managing Certificates
  • Managing User Certificates
  • Managing Trusted Certificates
Application Developer's Guide - Advanced Queuing (AQ)
  • Security with 8.0 and 8.1 Compatible Queues
  • Privileges and Access Control
  • Frequently Asked Questions
Application Developer's Guide - Fundamentals
  • Establishing Security Policies
  • Introduction to Security Policies
  • Ways to Use Application Context with Fine Grained Access Control
Concepts
  • Introduction to the Oracle Server
  • Database Security
  • Security Mechanisms
  • Benefits of Procedures
  • Compiling Views and PL/SQL Program Units
  • Controlling Database Access
  • Multi-Tier Authentication and Authorization
  • Privileges, Roles, and Security Policies
  • Introduction to Privileges
  • View Security Topics
  • Procedure Security Topics
  • Roles
  • Fine-Grained Access Control
  • Distributed Database Administration
  • Distributed Database Security
CORBA Developer's Guide and Reference
  • Retrieving the JNDI InitialContext
  • Invoking CORBA Objects From Applets
  • IIOP Security
  • AuroraCertificateManager Class
  • Server-Side Authentication
Distributed Database Systems
  • Distributed Database Security
Enterprise JavaBeans Developer's Guide and Reference
  • Retrieving the JNDI InitialContext
  • Invoking EJB Objects From Applets
  • IIOP Security
  • AuroraCertificateManager Class
  • Server-Side Authentication
  • Enterprise JavaBeans Descriptor
  • Application Assembler Section
  • Defining Mappings
Enterprise Manager Administrator's Guide
  • Security Management
Enterprise Manager Concepts Guide
  • Common Services
  • Job Scheduling System
  • DBA Management Pack Functionality and Wizards
  • Security Management
  • Integrated Applications
  • Glossary
Enterprise Manager Messages Manual
Enterprise Manager SNMP Support Reference Guide
  • oraListenerTable
Error Messages
  • Network Security Messages (NZE)
Getting to Know Oracle8i
  • Documentation Titles
  • Networking and Security
  • Glossary
Integration Server Overview
  • Key Objectives for OIS
  • Directory Services and LDAP, a Technical Overview
Java Tools Reference
  • Session Namespace Tools
  • Security Management
JDBC Developer's Guide and Reference
  • Applet Basics
  • Advanced Topics
  • JDBC Client-Side Security Features
  • JDBC Support for Oracle Advanced Security
Message Broker Administration Guide
  • Logging and Troubleshooting
  • Runtime Exceptions
  • Security Components
  • LDAP Server Security
  • Provider Security
  • Network Security Overview
  • Oracle Message Broker Security Administration
  • Using the Oracle Message Broker Security Service
Net8 Administrator's Guide
  • Glossary
Oracle Servlet Engine User's Guide
  • Security
  • Security HTTP Administration
  • The Tools
PL/SQL User's Guide and Reference
  • Advantages of PL/SQL
Reference
  • Initialization Parameters
Replication Management API Reference
  • Security Options
  • Security Setup for Multimaster Replication
  • Trusted vs. Untrusted Security
  • Security Setup for Snapshot Replication
SQL*Plus User's Guide and Reference
  • Security
  • Glossary