EasyManua.ls Logo

Oracle Database B10772-01 - Valid Encryption Algorithms

Default Icon
518 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
How To Configure Data Encryption and Integrity
Conguring Network Data Encryption and Integrity for Oracle Servers and Clients 3-11
8. Repeat this procedure to configure encryption on the other system. The
sqlnet.ora file on the two systems should contain the following entries:
On the server:
SQLNET.ENCRYPTION_SERVER = [accepted | rejected | requested | required]
SQLNET.ENCRYPTION_TYPES_SERVER = (valid_encryption_algorithm [,valid_
encryption_algorithm])
On the client:
SQLNET.ENCRYPTION_CLIENT = [accepted | rejected | requested | required]
SQLNET.ENCRYPTION_TYPES_CLIENT = (valid_encryption_algorithm [,valid_
encryption_algorithm])
Valid encryption algorithms and their associated legal values are summarized by
Table 3–2:
Configuring Integrity on the Client and the Server
Use Oracle Net Manager to configure data integrity on the client and on the server
(See "Starting Oracle Net Manager" on page 2-2):
Table 3–2 Valid Encryption Algorithms
Algorithm Name Legal Value
RC4 256-bit key RC4_256
RC4 128-bit key RC4_128
RC4 56-bit key RC4_56
RC4 40-bit key RC4_40
AES 256-bit key AES256
AES 192-bit key AES192
AES 128-bit key AES128
3-key 3DES 3DES168
2-key 3DES 3DES112
DES 56-bit key DES
DES 40-bit key DES40

Table of Contents

Related product manuals