Fork me on GitHub

Oracle Advanced Security: Integrity

Oracle Advanced Security: Integrity

The Integrity tab enables you to configure data integrity for the authentication methods. Data integrity is the comparison of data sent over the connection as seen by both client and server.

Note: Use the SSL tab to configure Cipher Suites for the Secure Sockets Layer (SSL).

Integrity

Select either the Server or Client check box to indicate whether the computer you are currently configuring is a Client or a Server. The Server option does not apply to the servers to which this computer connects.

Checksum Level

Select a checksum level. The four possible checksum levels are:

Element

Description

accepted

Service will be active if the other side of the connection specifies either "required" or "requested", and there is a compatible algorithm available on the other side; it will otherwise be inactive.

rejected

Service must not be active, and the connection will fail if the other side specifies "required".
requested

Service will be active if the other side of the connection specifies either "accepted", "required", or "requested", and there is a compatible algorithm available on the other side; it will otherwise be inactive.  

required Service must be active, and the connection will fail if the other side specifies "rejected", or if there is no compatible algorithm on the other side.

Available Methods list

Displays the integrity algorithms, used to create checksums. There are two such methods:

Algorithm Name

Legal Values

Secure Hash Algorithm (SHA-1)

SHA1

Message Digest 5 (MD5)

MD5

Selected Methods list

Displays the algorithms selected. The order of the algorithms in the list determines the order in which they are used.

Related Topics

Oracle Net Services Overview

-------------本文结束感谢您的阅读-------------
坚持原创技术分享,您的支持将鼓励我继续创作!