EasyManua.ls Logo

Oracle Database B10772-01 - List of Tables

Default Icon
518 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
xxi
List of Tables
1–1 Authentication Methods and System Requirements ..................................................... 1-17
2–1 Oracle Wallet Manager Navigator Pane Objects ............................................................. 2-8
2–2 Oracle Wallet Manager Toolbar Buttons ........................................................................ 2-10
2–3 Oracle Wallet Manager Wallet Menu Options............................................................... 2-10
2–4 Oracle Wallet Manager Operations Menu Options....................................................... 2-11
2–5 Oracle Wallet Manager Help Menu Options ................................................................. 2-12
2–6 Enterprise User Security Tools Summary........................................................................ 2-13
2–7 Enterprise Security Manager Authentication Methods................................................ 2-17
2–8 Enterprise Security Manager Navigator Pane Folders ................................................. 2-19
2–9 Enterprise Security Manager File Menu Options.......................................................... 2-21
2–10 Enterprise Security Manager Operations Menu Options............................................. 2-21
2–11 Enterprise Security Manager Help Menu Options........................................................ 2-21
2–12 Enterprise Security Manager Console User Subtab Buttons........................................ 2-27
2–13 Realm Configuration Tabbed Window Fields ............................................................... 2-30
2–14 Common Security Administrator/DBA Configuration and Administrative Tasks. 2-34
2–15 Common Enterprise User Security Administrator Configuration and Administrative
Tasks...................................................................................................................................... 2-36
3–1 Encryption and Data Integrity Negotiations..................................................................... 3-8
3–2 Valid Encryption Algorithms ............................................................................................ 3-11
3–3 Valid Integrity Algorithms................................................................................................. 3-13
4–1 ORACLE.NET.ENCRYPTION_CLIENT Parameter Attributes ..................................... 4-4
4–2 ORACLE.NET.ENCRYPTION_TYPES_CLIENT Parameter Attributes ....................... 4-5
4–3 ORACLE.NET.CRYPTO_CHECKSUM_CLIENT Parameter Attributes ...................... 4-5
4–4 ORACLE.NET.CRYPTO_CHEKSUM_TYPES_CLIENT Parameter Attributes........... 4-6
5–1 RADIUS Authentication Components.............................................................................. 5-3
5–2 RADIUS Configuration Parameters ................................................................................. 5-21
6–1 Options for the okinit Utility ............................................................................................ 6-11
6–2 Options for the oklist Utility............................................................................................. 6-12
7–1 Oracle Advanced Security Cipher Suites........................................................................ 7-18
8–1 KeyUsage Values................................................................................................................... 8-5
8–2 Oracle Wallet Manager Import of User Certificates to an Oracle Wallet...................... 8-5
8–3 Oracle Wallet Manager Import of Trusted Certificates to an Oracle Wallet ................ 8-6
8–4 PKI Wallet Encoding Standards........................................................................................ 8-15
8–5 Certificate Request: Fields and Descriptions.................................................................. 8-21
8–6 Available Key Sizes............................................................................................................. 8-22
10–1 DCE Address Parameters and Definitions ..................................................................... 10-8
10–2 Setting Up External Role Syntax Components.............................................................. 10-13
11–1 Enterprise User Security Authentication: Selection Criteria....................................... 11-10
11–2 Administrative Groups in a Realm Oracle Context .................................................... 11-18

Table of Contents

Related product manuals