Corporation Network Router User Manual
Configuration and Administration Tools Overview 2-1
2
Configuration and Administration Tools
Overview
Configuring advanced security features for an Oracle database includes configuring
encryption, integrity (checksumming), and strong authentication methods for
Oracle Net Services. Strong authentication method configuration can include
third-party software, as is the case for Kerberos or RADIUS, or it may entail
configuring and managing a public key infrastructure, as is required for Secure
Sockets Layer (SSL). In addition, an Oracle database can be configured to
interoperate with an LDAP directory, such as Oracle Internet Directory, to enable
Enterprise User Security, a feature that enables you to store and manage database
users in a centralized directory.
Such diverse advanced security features require a diverse set of tools with which to
configure and administer them. This chapter introduces the tools used to configure
and administer advanced security features for an Oracle database in the following
topics:
■ Network Encryption and Strong Authentication Configuration Tools
■ Public Key Infrastructure Credentials Management Tools
■ Enterprise User Security Configuration and Management Tools
■ Duties of a Security Administrator/DBA
■ Duties of an Enterprise User Security Administrator/DBA