EasyManua.ls Logo

Oracle Database B10772-01 - Valid Integrity Algorithms

Default Icon
518 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
How To Configure Data Encryption and Integrity
Conguring Network Data Encryption and Integrity for Oracle Servers and Clients 3-13
6. Choose File > Save Network Configuration. The sqlnet.ora file is updated.
7. Repeat this procedure to configure integrity on the other system. The
sqlnet.ora file on the two systems should contain the following entries:
On the server:
SQLNET.CRYPTO_CHECKSUM_SERVER = [accepted | rejected | requested |
required]
SQLNET.CRYPTO_CHECKSUM_TYPES_SERVER = (valid_crypto_checksum_algorithm
[,valid_crypto_checksum_algorithm])
On the client:
SQLNET.CRYPTO_CHECKSUM_CLIENT = [accepted | rejected | requested |
required]
SQLNET.CRYPTO_CHECKSUM_TYPES_CLIENT = (valid_crypto_checksum_algorithm
[,valid_crypto_checksum_algorithm])
Valid integrity algorithms and their associated legal values are displayed by
Table 3–3:
Table 3–3 Valid Integrity Algorithms
Algorithm Name Legal Values
MD5 MD5
SHA-1 SHA1

Table of Contents

Related product manuals