Fork me on GitHub

Oracle Advanced Security: Authentication

Oracle Advanced Security: Authentication

The Authentication tab enables you to select and prioritize authentication methods. Following is a list of authentication methods supported by Oracle Advanced Security.

KERBEROS5

Provides support for secure, single sign-on capabilities in a distributed environment with secret key cryptography. Passwords are stored in a central repository, making password theft from the network impossible. Kerberos also provides database link authentication and enhanced PC security.

CYBERSAFE

A Kerberos-based authentication server that provides secure authentication based on key management and shared secrets. The Challenger has password checking and authentication with token security cards.

NTS

Allows operating system authentication to be performed between a client and an Oracle server on Windows NT. The Windows NT Native authentication method enables database user authentication through Windows NT. This enables client computers to make secure connections to an Oracle database on a Windows NT server. A secure connection is when a Windows NT client user name is retrieved on a Windows NT server through the Windows NT Native authentication method. The Windows NT server then permits the user name to perform the database actions on the server.

RADIUS

Supports any authentication method that complies with the RADIUS standard, including token cards and smart cards. A RADIUS server passes information between the Oracle server and the designated authentication servers. From the user's perspective, the entire authentication process takes place seamlessly and transparently.

< button

Choose to move a selected authentication method from the Available Methods list to the Selected Methods list.

> button

Choose to move a selected authentication method from the Selected Methods to the Available Methods list.

Promote button

Choose to move a selected authentication method up in the Selected Methods list. Client/Server negotiation will attempt to use the authentication methods in the order in which they are listed. Oracle Net will first use the authentication at the top of the list. If it cannot use the first method, it uses the second method, and so on.

Demote button

Choose to move a selected authentication method down in the Selected Methods list.

Note: If you have configured the TCP/IP with SSL protocol, the Secure Sockets Layer (SSL) will be configured by default. Any authentication method you choose in this tab will override authentication features of SSL. Use the SSL tab to configure additional SSL options. If you are using the TCP/IP with SSL protocol, do not use any of the other authentication methods. The Selected Methods list must be empty.

For more information, see Windows NT documentation or Oracle Advanced Security Administrator's Guide.

Related Topics

Oracle Net Services Overview

-------------本文结束感谢您的阅读-------------
坚持原创技术分享,您的支持将鼓励我继续创作!