User's Manual
vi
2 Configuration and Administration Tools Overview
Network Encryption and Strong Authentication Configuration Tools.................................... 2-2
Oracle Net Manager..................................................................................................................... 2-2
Oracle Advanced Security Kerberos Adapter Command-Line Utilities.............................. 2-5
Public Key Infrastructure Credentials Management Tools........................................................ 2-6
Oracle Wallet Manager................................................................................................................ 2-6
orapki Utility............................................................................................................................... 2-12
Enterprise User Security Configuration and Management Tools............................................ 2-13
Database Configuration Assistant............................................................................................ 2-13
Enterprise Security Manager and Enterprise Security Manager Console.......................... 2-14
Oracle Net Configuration Assistant......................................................................................... 2-32
User Migration Utility................................................................................................................ 2-33
Duties of a Security Administrator/DBA..................................................................................... 2-34
Duties of an Enterprise User Security Administrator/DBA ..................................................... 2-35
Part II Network Data Encryption and Integrity
3 Configuring Network Data Encryption and Integrity for Oracle Servers and
Clients
Oracle Advanced Security Encryption............................................................................................ 3-1
About Encryption......................................................................................................................... 3-2
Advanced Encryption Standard................................................................................................. 3-2
DES Algorithm Support............................................................................................................... 3-2
Triple-DES Support ..................................................................................................................... 3-2
RSA RC4 Algorithm for High Speed Encryption..................................................................... 3-3
Oracle Advanced Security Data Integrity...................................................................................... 3-3
Data Integrity Algorithms Supported ....................................................................................... 3-4
Diffie-Hellman Based Key Management....................................................................................... 3-4
Authentication Key Fold-in......................................................................................................... 3-5
How To Configure Data Encryption and Integrity....................................................................... 3-5
About Activating Encryption and Integrity.............................................................................. 3-6
About Negotiating Encryption and Integrity........................................................................... 3-6
Setting the Encryption Seed (Optional)..................................................................................... 3-8
Configuring Encryption and Integrity Parameters Using Oracle Net Manager................. 3-9