User's Manual

How To Configure Data Encryption and Integrity
Conguring Network Data Encryption and Integrity for Oracle Servers and Clients 3-11
8. Repeat this procedure to configure encryption on the other system. The
sqlnet.ora file on the two systems should contain the following entries:
On the server:
SQLNET.ENCRYPTION_SERVER = [accepted | rejected | requested | required]
SQLNET.ENCRYPTION_TYPES_SERVER = (valid_encryption_algorithm [,valid_
encryption_algorithm])
On the client:
SQLNET.ENCRYPTION_CLIENT = [accepted | rejected | requested | required]
SQLNET.ENCRYPTION_TYPES_CLIENT = (valid_encryption_algorithm [,valid_
encryption_algorithm])
Valid encryption algorithms and their associated legal values are summarized by
Table 3–2:
Configuring Integrity on the Client and the Server
Use Oracle Net Manager to configure data integrity on the client and on the server
(See "Starting Oracle Net Manager" on page 2-2):
Table 3–2 Valid Encryption Algorithms
Algorithm Name Legal Value
RC4 256-bit key RC4_256
RC4 128-bit key RC4_128
RC4 56-bit key RC4_56
RC4 40-bit key RC4_40
AES 256-bit key AES256
AES 192-bit key AES192
AES 128-bit key AES128
3-key 3DES 3DES168
2-key 3DES 3DES112
DES 56-bit key DES
DES 40-bit key DES40