Oracle Advanced Security: Integrity
The Integrity tab enables you to configure data integrity for the authentication methods. Data integrity is the comparison of data sent over the connection as seen by both client and server.
Note: Use the SSL tab to configure Cipher Suites for the Secure Sockets Layer (SSL).
Integrity
Select either the Server or Client check box to indicate whether the computer you are currently configuring is a Client or a Server. The Server option does not apply to the servers to which this computer connects.
Checksum Level
Select a checksum level. The four possible checksum levels are:
Element |
Description |
accepted |
Service will be active if the other side of the connection specifies either "required" or "requested", and there is a compatible algorithm available on the other side; it will otherwise be inactive. |
Service must not be active, and the connection will fail if the other side specifies "required". | |
requested |
Service will be active if the other side of the connection specifies either "accepted", "required", or "requested", and there is a compatible algorithm available on the other side; it will otherwise be inactive. |
required | Service must be active, and the connection will fail if the other side specifies "rejected", or if there is no compatible algorithm on the other side. |
Available Methods list
Displays the integrity algorithms, used to create checksums. There are two such methods:
Algorithm Name |
Legal Values |
Secure Hash Algorithm (SHA-1) |
SHA1 |
Message Digest 5 (MD5) |
MD5 |
Selected Methods list
Displays the algorithms selected. The order of the algorithms in the list determines the order in which they are used.
Related Topics
Copyright © 1996, 2009, Oracle and/or its affiliates. All rights reserved.
Oracle is a registered trademark of Oracle Corporation and/or its affiliates.
Other names may be trademarks of their respective owners.