Oracle Advanced Security Administrator's Guide
Release 8.1.5

A67766-01

Library

Product

Contents

Index

Prev Next


Preface

The Oracle Advanced Security option provides enhanced security and authentication to your Net8 network, as well as integration with a Distributed Computing Environment (DCE). This Guide provides generic information on all these features of the Oracle Advanced Security option.

This Preface discusses the following topics:

What This Guide Contains

This guide contains generic information on how to configure your already-existing Net8 network to use the Oracle Advanced Security option. Use it in conjunction with the guide that describes how to install and configure the Oracle Advanced Security option on your particular platform.

You can install and configure the Oracle Advanced Security option with other Oracle networking products and configure everything at once, or you can add the Oracle Advanced Security option to an already existing network.

How This Manual Is Organized

This manual is divided into two parts:

Each part describes a different set of Oracle Advanced Security option features.

Part I: Oracle Advanced Security Features

Chapter 1, "Introduction to Oracle Advanced Security"--This chapter provides an overview of the security and single sign-on features of the Oracle Advanced Security option. These features include:

This chapter also includes a brief overview of the authentication methods available with this release.

Chapter 2, "Configuring Encryption and Checksumming"--This chapter tells you how to configure encryption and checksumming into your existing Net8 release 8.1.5 network.

Chapter 3, "Configuring RADIUS Authentication"--This chapter tells you how to configure Oracle for use with RADIUS (Remote Authentication Dial-In User Service). It gives an overview of how RADIUS works within an Oracle environment, tells you how to enable RADIUS authentication and accounting, and introduces the challenge-response user interface which third party vendors can customize.

Chapter 4, "Configuring CyberSafe Authentication"--This chapter discusses how to configure Oracle for use with CyberSafe, and provides a brief overview of steps to configure CyberSafe to authenticate Oracle users.

Chapter 5, "Configuring Kerberos Authentication"--This chapter discusses how to configure Oracle for use with MIT Kerberos, and provides a brief overview of steps to configure Kerberos to authenticate Oracle users.

Chapter 6, "Configuring SecurID Authentication"--This chapter discusses how to configure the SecurID authentication adapter in combination with the Oracle server and Oracle clients. It includes system requirements and known limitations. It also contains troubleshooting information if you experience problems while configuring the SecurID authentication adapter.


Note:

For a complete list of Oracle Advanced Security option error messages see the Oracle Network Products Troubleshooting Guide.  


Chapter 7, "Configuring Identix Biometric Authentication"--This chapter describes how to configure and use the Oracle Biometric authentication adapter, which enables the use of the Identix fingerprint authentication device.

Chapter 8, "Configuring DCE GSSAPI Authentication"--This chapter describes how to configure the Oracle DCE GSSAPI authentication adapter to provide DCE authentication even if you are not using other DCE services in your network.

Chapter 9, "Configuring SSL Authentication"--This chapter discusses the SSL feature of the Oracle Advanced Security option. It explains how to configure SSL and how to use the Oracle Wallet Manager to manage wallets and trustpoints.

Chapter 10, "Choosing and Combining Authentication Methods"--This chapter describes how to use conventional username/password authentication even if you have configured another authentication service. It also discusses how to configure your network to use one or more authentication services in your network using the Oracle Advanced Security option and how to set up more than one authentication service on a client or on a server.

Part II: Oracle Advanced Security and Oracle DCE Integration

Chapter 11, "Overview of Oracle DCE Integration"--This chapter provides a brief discussion of OSF's DCE and Oracle's DCE Integration.

Chapter 12, "Configuring DCE for Oracle DCE Integration"--This chapter describes what you need to do to configure DCE to use Oracle DCE Integration. It also describes how to configure the DCE CDS naming adapter.

Chapter 13, "Configuring Oracle for Oracle DCE Integration"--This chapter describes the DCE parameters that you need to add to the SQL*Net or Net8 configuration files to enable clients and servers to access Oracle servers in the DCE environment. It also describes some Oracle Server configuration that you need to perform, such as setting up DCE groups to map to external roles. Additionally, it describes how to configure clients to use the DCE CDS naming adapter.

Chapter 14, "Connecting to an Oracle Database in DCE"--This chapter discusses how to connect to an Oracle database in a DCE environment.

Chapter 15, "DCE and Non-DCE Interoperability"--This chapter discusses how clients outside of DCE can access Oracle databases using another protocol such as TCP/IP.

Appendices

Appendix A, "Encryption and Checksumming Parameters"--This appendix lists and describes encryption and checksumming configuration parameters of the Oracle Advanced Security option.

Appendix B, "Authentication Parameters"--This appendix lists and describes authentication configuration file parameters of the Oracle Advanced Security option.

Appendix C, "Integrating Authentication Devices Using RADIUS"--This appendix explains how third party vendors of authentication devices can customize this graphical user interface used in RADIUS challenge-response authentication.

Notational Conventions

The following syntax conventions are used in this guide:

Italic Font  

Italic characters indicate that the parameter, variable, or expression in the command syntax must be replaced by a value that you provide. Italics may also indicate emphasis or the first mention of a technical term.  

Monospace Font  

Monospace font indicates something the computer displays.
Note: In some cases, brackets surround certain words (for example, <pin><passcode>) to more clearly separate words in a command.  

Bolded Monospace Font  

Bolded monospace font indicates:

  • Terms defined in the Glossary

  • Text you need to enter exactly as shown.
    Note: In some cases, angle brackets surround certain words (for example, <pin><passcode>) to more clearly separate words in a command.

 

Punctuation  

Punctuation other than brackets and vertical bars must be typed as shown.  

[ ]  

Brackets enclose optional items. Do not type the brackets.  

( )  

Parentheses enclose all SQL*Net and Net8 Keyword-Value pairs in connect descriptors. They must be entered as part of the connect descriptor, as in (KEYWORD=value).  

|  

A vertical bar represents a choice of two or more options. You must type one of the options separated by the vertical bar. Do not type the vertical bar.  

UPPERCASE  

Uppercase characters within the text represent command names and parameters.  

Related Publications

To install and configure Oracle Advanced Security option software on your particular platform, refer to the Oracle platform-specific documentation.

In addition, see the following documents for detailed information about Oracle network products that applies across platforms:

For information on roles and privileges, see:

For third-party vendor documentation on security and single sign-on features see:

For information on MIT Kerberos see:

For additional information about the OSF Distributed Computing Environment (DCE), refer to the following OSF documents published by Prentice Hall, Inc.:

For information about Identix products, refer to the following Identix documentation.

Client side documentation:

Server side documentation:




Prev

Next
Oracle
Copyright © 1999 Oracle Corporation.

All Rights Reserved.

Library

Product

Contents

Index