Corporation Network Router User Manual
xxi
List of Tables
1–1 Authentication Methods and System Requirements ..................................................... 1-17
2–1 Oracle Wallet Manager Navigator Pane Objects............................................................. 2-8
2–2 Oracle Wallet Manager Toolbar Buttons ........................................................................ 2-10
2–3 Oracle Wallet Manager Wallet Menu Options............................................................... 2-10
2–4 Oracle Wallet Manager Operations Menu Options....................................................... 2-11
2–5 Oracle Wallet Manager Help Menu Options ................................................................. 2-12
2–6 Enterprise User Security Tools Summary........................................................................ 2-13
2–7 Enterprise Security Manager Authentication Methods................................................ 2-17
2–8 Enterprise Security Manager Navigator Pane Folders ................................................. 2-19
2–9 Enterprise Security Manager File Menu Options.......................................................... 2-21
2–10 Enterprise Security Manager Operations Menu Options............................................. 2-21
2–11 Enterprise Security Manager Help Menu Options........................................................ 2-21
2–12 Enterprise Security Manager Console User Subtab Buttons........................................ 2-27
2–13 Realm Configuration Tabbed Window Fields............................................................... 2-30
2–14 Common Security Administrator/DBA Configuration and Administrative Tasks. 2-34
2–15 Common Enterprise User Security Administrator Configuration and Administrative
Tasks...................................................................................................................................... 2-36
3–1 Encryption and Data Integrity Negotiations..................................................................... 3-8
3–2 Valid Encryption Algorithms............................................................................................ 3-11
3–3 Valid Integrity Algorithms................................................................................................. 3-13
4–1 ORACLE.NET.ENCRYPTION_CLIENT Parameter Attributes..................................... 4-4
4–2 ORACLE.NET.ENCRYPTION_TYPES_CLIENT Parameter Attributes....................... 4-5
4–3 ORACLE.NET.CRYPTO_CHECKSUM_CLIENT Parameter Attributes ...................... 4-5
4–4 ORACLE.NET.CRYPTO_CHEKSUM_TYPES_CLIENT Parameter Attributes........... 4-6
5–1 RADIUS Authentication Components.............................................................................. 5-3
5–2 RADIUS Configuration Parameters ................................................................................. 5-21
6–1 Options for the okinit Utility............................................................................................ 6-11
6–2 Options for the oklist Utility............................................................................................. 6-12
7–1 Oracle Advanced Security Cipher Suites........................................................................ 7-18
8–1 KeyUsage Values................................................................................................................... 8-5
8–2 Oracle Wallet Manager Import of User Certificates to an Oracle Wallet...................... 8-5
8–3 Oracle Wallet Manager Import of Trusted Certificates to an Oracle Wallet................ 8-6
8–4 PKI Wallet Encoding Standards........................................................................................ 8-15
8–5 Certificate Request: Fields and Descriptions.................................................................. 8-21
8–6 Available Key Sizes............................................................................................................. 8-22
10–1 DCE Address Parameters and Definitions..................................................................... 10-8
10–2 Setting Up External Role Syntax Components.............................................................. 10-13
11–1 Enterprise User Security Authentication: Selection Criteria....................................... 11-10
11–2 Administrative Groups in a Realm Oracle Context.................................................... 11-18