User's Manual
How To Configure Data Encryption and Integrity
Configuring Network Data Encryption and Integrity for Oracle Servers and Clients 3-13
6. Choose File > Save Network Configuration. The sqlnet.ora file is updated.
7. Repeat this procedure to configure integrity on the other system. The
sqlnet.ora file on the two systems should contain the following entries:
■ On the server:
SQLNET.CRYPTO_CHECKSUM_SERVER = [accepted | rejected | requested |
required]
SQLNET.CRYPTO_CHECKSUM_TYPES_SERVER = (valid_crypto_checksum_algorithm
[,valid_crypto_checksum_algorithm])
■ On the client:
SQLNET.CRYPTO_CHECKSUM_CLIENT = [accepted | rejected | requested |
required]
SQLNET.CRYPTO_CHECKSUM_TYPES_CLIENT = (valid_crypto_checksum_algorithm
[,valid_crypto_checksum_algorithm])
Valid integrity algorithms and their associated legal values are displayed by
Table 3–3:
Table 3–3 Valid Integrity Algorithms
Algorithm Name Legal Values
MD5 MD5
SHA-1 SHA1