Corporation Network Router User Manual
xviii
List of Figures
1–1 Encryption .............................................................................................................................. 1-5
1–2 Strong Authentication with Oracle Authentication Adapters........................................ 1-8
1–3 How a Network Authentication Service Authenticates a User...................................... 1-9
1–4 Centralized User Management with Enterprise User Security..................................... 1-13
1–5 Oracle Advanced Security in an Oracle Networking Environment ............................ 1-15
1–6 Oracle Net with Authentication Adapters....................................................................... 1-16
2–1 Oracle Advanced Security Profile in Oracle Net Manager.............................................. 2-4
2–2 Oracle Wallet Manager User Interface............................................................................... 2-7
2–3 Certificate Request Information Displayed in Oracle Wallet Manager Right Pane .... 2-9
2–4 Directory Server Login Window....................................................................................... 2-17
2–5 Enterprise Security Manager User Interface.................................................................... 2-18
2–6 Enterprise Security Manager Databases Tabbed Window............................................ 2-20
2–7 Enterprise Security Manager Console Login Page......................................................... 2-23
2–8 ESM Console URL Window............................................................................................... 2-24
2–9 Enterprise Security Manager Console User Interface .................................................... 2-25
2–10 Enterprise Security Manager Console Users Subtab...................................................... 2-26
2–11 Enterprise Security Manager Console Group Subtab.................................................... 2-28
2–12 Enterprise Security Manager Console Edit Group Page................................................ 2-29
2–13 Enterprise Security Manager Console Realm Configuration Tabbed Window......... 2-30
2–14 Opening Page of Oracle Net Configuration Assistant................................................... 2-33
3–1 Oracle Advanced Security Encryption Window............................................................. 3-10
3–2 Oracle Advanced Security Integrity Window................................................................. 3-12
5–1 RADIUS in an Oracle Environment.................................................................................... 5-2
5–2 Synchronous Authentication Sequence.............................................................................. 5-4
5–3 Asynchronous Authentication Sequence........................................................................... 5-6
5–4 Oracle Advanced Security Authentication Window...................................................... 5-10
5–5 Oracle Advanced Security Other Params Window........................................................ 5-12
6–1 Oracle Advanced Security Authentication Window (Kerberos).................................... 6-6
6–2 Oracle Advanced Security Other Params Window (Kerberos)...................................... 6-7
7–1 SSL in Relation to Other Authentication Methods......................................................... 7-11
7–2 SSL Cipher Suites Window................................................................................................ 7-19
7–3 Oracle Advanced Security SSL Window (Server)........................................................... 7-20
7–4 Oracle Advanced Security SSL Window (Server)........................................................... 7-22
7–5 Oracle Advanced Security SSL Window (Client)........................................................... 7-26
7–6 Oracle Advanced Security SSL Window (Client)........................................................... 7-29
7–7 Oracle Advanced Security SSL Window with Certificate Revocation Checking Selected
................................................................................................................................................ 7-38
9–1 Oracle Advanced Security Authentication Window........................................................ 9-3
11–1 Enterprise User Security and the Oracle Security Architecture ................................... 11-4
11–2 Example of Enterprise Roles............................................................................................ 11-13