Skip Headers

Oracle9i Security Overview
Release 2 (9.2)

Part Number A96582-01
Go To Documentation Library
Home
Go To Product List
Book List
Go To Table Of Contents
Contents

Master Index

Feedback

Go to previous page

Index

A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  R  S  T  U  V  W  X 


A

access
unauthorized, 1-14
access control
described, 1-6
directory, 5-7
least privilege, 9-4
Oracle Connection Manager, 9-55
access control lists (ACLs), 6-3
administration
delegation of, 5-8, 9-49
enterprise user, 9-53
application context
accessed globally, 9-18
accessed locally, 9-17
initialized externally, 9-17
initialized globally, 9-18
overview, 9-16
secure, 9-15
virtual private database (VPD), 9-17
application security
directory-based, 5-8
policies, 9-13
requirements, 1-15
secure application role, 9-21
auditing
customizable, 7-3, 9-5
fine-grained, 7-3, 9-21
in multitier systems, 7-4
introduction, 7-2
multitier applications, 9-23
security requirements, 7-2
authentication, 9-26
application user proxy authentication, 9-18
biometric, 9-37
CyberSafe, 4-4, 9-36
DCE, 4-7, 9-38
described, 1-6, 4-2, 9-4
directory, 5-5
Entrust/PKI, 8-8, 9-36
Kerberos, 4-4
methods, 8-7, 9-4, 9-33
multitier, 6-5
password-authenticated users, 6-5
password-based, 4-2
PKI certificate-based, 4-7, 8-5
PKI methods, 8-7, 9-34
proxy, 3-8, 4-8, 9-9
RADIUS protocol, 4-4, 9-36
SecurID, 9-37
smart cards, 4-6, 9-37
SSL, 8-7, 9-35
strong, 4-3, 9-33
token cards, 4-5, 9-37
authorization
biometrics, 4-7
described, 1-6
directory, 5-7, 5-8
multitier, 6-5
proxy, 4-8
availability
Real Application Clusters, 9-8
security factors, 1-7, 2-12, 9-6

B

backup and recovery, 9-7
Baltimore Technologies, 9-34
biometric authorization, 4-7, 9-37

C

certificate authorities, 9-34
introduction, 8-5
certificates
contents, 8-6
introduction, 8-5
support for multiple, 9-45
trusted, 8-6, 9-42
X.509 Version 3, 8-7
checksums, 9-29, 9-49
algorithms, 3-6
SSL, 9-29
confidentiality, 1-5
connection
management, 9-55
multitier, 3-3
connection pooling, 4-9, 9-18
credentials
secure storage, 8-8
CyberSafe ActiveTrust, 4-4
CyberSafe authentication, 4-4, 9-36

D

data
deep data protection, 9-12
encryption of stored, 2-10
Data Encryption Standard (DES), 2-11, 3-5, 9-6, 9-28
database links
current user, 9-41
DBMS_OBFUSCATION_TOOLKIT, 9-6
directory security
administrative roles, 5-12
application security, 5-8, 9-41
domains and roles, 5-10
discretionary access control (DAC)
least privilege, 9-4
Distributed Computing Environment (DCE)
authentication, 4-7, 9-38

E

encryption
algorithms, 2-11, 3-5
for network transmission, 3-4, 9-27
stored data, 2-10, 9-6
enterprise roles, 2-5, 9-53
enterprise user security
features, 9-39
global roles, 2-5
graphical user interfaces, 9-40
introduction, 6-1, 6-2
privilege administration, 6-3
enterprise users
password authenticated, 6-5, 9-40
Entrust certificates, 9-42
Entrust Profile, 9-35
Entrust/PKI authentication, 8-8, 9-35

F

failover, 9-8
Federal Information Processing Standard 140-1 (FIPS), 9-24
fine-grained access control
facilitating VPD, 9-19
per-user, 9-20
fine-grained auditing, 7-3, 9-21
firewalls, 3-7, 9-56, 9-57

G

GTE CyberTrust certificates, 9-42, 9-43

H

hashing, password, 5-6

I

integrity
checking, 3-6
database mechanisms, 2-11, 9-3
described, 1-6
directory, 9-49
entity integrity enforcement, 9-3
Oracle Advanced Security features, 9-29
referential, 2-11, 9-3
Internet
access control, 9-57
data access increased, 1-9
hosted system security, 1-11, 9-13
increased data availability, 1-9
large user communities, 1-10
scalability of security, 1-10, 9-13
security challenges, 1-8
security features, 9-12
security requirements, 1-8

J

Java
class execution, 9-23
security implementation, 9-23
Java Database Connectivity (JDBC)
application user proxy authentication, 9-11
encryption, 9-31
JDBC-OCI driver, 3-9, 9-10, 9-30
network security, 3-8
supported drivers, 9-30
Thin driver, 3-9, 9-31
Java Secure Socket Extension (JSSE), 9-32
Java virtual machine (JVM), 9-23
java.lang.SecurityManager, 9-23

K

Kerberos authentication, 4-4, 9-36
Kerberos Single Sign-On, 4-4

L

label based access control
introduction, 2-9
Oracle Label Security, 9-47
LDAP
application security, 5-8
compliance, 9-51
delegation of administration, 5-8
directory access controls, 5-7
introduction, 5-3
Oracle Internet Directory, 9-43
security features, 5-4
server instance architecture, 9-51
single sign-on, 9-39
lightweight sessions, 4-9
Login Server, 4-11

M

MD4 hashing scheme, 5-6, 9-50
MD5 Checksum, 3-6, 5-6, 9-6, 9-29, 9-49
Microsoft Active Directory, 9-41
multitier systems
auditing, 7-4, 9-23
authentication, 6-5
proxy authentication, 4-8, 9-10
security, 3-8
single sign-on, 4-11

N

network security
database enforced, 3-4
encryption, 3-4
firewalls, 3-7
Java Database Connectivity (JDBC), 3-8
managing privileges, 2-7
multitier connection management, 3-3
Oracle Advanced Security features, 9-27
PKI, 8-9
Secure Sockets Layer, 3-6
valid node checking, 3-3
VPD database enforced access, 9-58

O

Oracle Advanced Security, 9-24, 9-26
authentication, 9-33
PKI implementation, 9-42
Oracle Call Interface (OCI)
JDBC driver, 9-10
JDBC-OCI driver, 3-9
PKI, 9-42
Oracle Connection Manager, 3-3
firewall support, 9-57
firewalls, 9-56
security features, 9-55
Oracle Enterprise Login Assistant, 9-35, 9-43
Oracle Enterprise Security Manager, 9-41, 9-44, 9-45
Oracle Internet Directory, 9-43
architecture, 9-52
components, 9-50
enterprise user administration, 9-53
security benefits, 9-49
security features, 9-48
Oracle Java SSL, 9-32
Oracle Label Security, 9-20, 9-47
Oracle Net Firewall Proxy, 9-57
Oracle Net Services, 9-27
protocol support, 9-55
security features, 9-54
Oracle Password Protocol, 9-32
Oracle Policy Manager, 9-20
Oracle Wallet Manager, 8-8, 9-32, 9-35, 9-43, 9-45
Oracle wallets, 9-43
Oracle9i Application Server
SSL encryption, 9-30

P

partitioning, 9-19
virtual private database (VPD), 9-19
passwords
authentication, 4-2
authentication of enterprise users, 6-5, 9-40
protection in directory, 5-6, 9-50
security risks, 1-13
PKCS #12 containers, 9-45
PKCS#10 certificates, 9-43
policy function, 9-59
privacy of communications, 1-5
privileges
enterprise administration, 6-3
least, 9-4
managing, 2-3
network facilities, 2-7
roles to manage, 2-4
schema object, 2-2, 2-3
stored procedures to manage, 2-6
system, 2-2
views to manage, 2-7
profiles
user, 9-6
protocol conversion, 9-55
proxy authentication, 3-8, 4-8, 9-9
application user, 9-11, 9-18
directory, 9-10
expanded credential, 9-10
Kerberos and CyberSafe, 9-36
proxy authorization, 4-8
Public Key Certificate Standard #12 (PKCS#12), 8-8
Public Key Certificate Standards (PKCS), 9-34
public key infrastructure (PKI)
advantages, 8-3
authentication, 4-7, 9-34
authentication methods, 8-7
certificate-based authentication, 8-5
components, 8-3, 9-42
cryptography, 8-4
interoperability, 9-44
introduction, 8-1
network security, 8-9
Oracle Advanced Security, 9-42
Oracle implementation, 9-46
security features, 8-2
single sign-on, 8-9
supported vendors, 9-34

R

RADIUS protocol
authentication, 4-4, 9-36
smart cards, 9-37
supported vendors, 9-36
RADIUS-compliant smart cards, 4-6
RADIUS-compliant token cards, 4-5
RC4 encryption algorithm, 2-11, 3-5, 9-28
Real Application Clusters
availability, 9-8
referential integrity, 9-3
replication, advanced, 9-7
resource limitation, 9-6
roles
database, 2-4
directory administration, 5-12
enterprise, 2-5, 6-5
global, 2-5
managing privileges, 2-4
secure application, 2-6
secure application role, 9-21
types of, 9-5
row level security
introduction, 2-8
RSA certificates, 9-42, 9-43
RSA Data Security RC4, 3-5, 9-28
RSA SecurID tokens, 9-37

S

scalability
security, 1-15, 9-18
schema objects
privileges on, 2-3
secure application roles, 2-6, 9-21, 9-59
Secure Hash Algorithm (SHA), 3-6, 5-6, 9-29, 9-49
Secure Sockets Layer (SSL), 9-42
authentication, 8-7, 9-35
checksums, 9-29
encryption, 9-29
network security, 3-6
Oracle Internet Directory, 9-49
single sign-on, 9-43
SecurID token cards, 9-37
security
administration team, 1-18
application, 9-13
application context, 9-16
application user proxy authentication, 9-18
auditing, 7-2
availability, 1-7, 2-12
credentials, storage, 8-8
database, 2-2
database integrity mechanisms, 2-11
deep data protection, 9-12
directory authentication, 5-5
directory-based, 5-8, 9-41
enterprise user, 6-2
firewalls, 3-7
good practices, 2-13
hosted systems, 1-11
integrity, 1-6
Internet, 1-8, 1-10, 9-12, 9-13
Java Beans, 9-25
Java implementation, 9-23
label based access control, 2-9
LDAP features, 5-4
multitier systems, 1-15, 3-8
myths, 1-2
network, 9-27
Oracle Advanced Security, 9-24
Oracle Internet Directory, 9-48
Oracle Label Security, 9-47
Oracle Net Services, 9-54
Oracle9i Enterprise Edition, 9-12
Oracle9i Standard Edition, 9-2
password protection, 1-13, 5-6
personnel dimension, 1-4
physical dimension, 1-4
PKI, 8-1
privileges, 2-2
procedural dimension, 1-4
requirements, 1-15
row level, 2-8
scalability, 1-15, 9-18
scope of issues, 1-3
secure application role, 9-21
security directory integrity, 5-2
shared schemas, 6-4
single sign-on, 4-10, 6-6
strong authentication, 4-3
technical dimension, 1-4
threats and countermeasures, 1-12, 1-16
virtual private database (VPD), 2-9
SecurityManager class, 9-23
sessions
lightweight, 4-9
multiplexing, 9-56
shared schemas
Oracle Internet Directory, 9-53
security features, 6-4, 9-41
single sign-on
Entrust-based, 9-35, 9-39
implementations, 4-10, 9-38
introduction, 6-6
multitier, 4-11
Oracle Enterprise Login Assistant, 9-43
PKI, 8-9, 9-38, 9-39
server-based, 4-10
Single Sockets Layer (SSL)
current user database links, 9-41
smart cards, 4-6, 9-37
storage
secure credentials, 8-8
secure data, 1-5
stored data encryption, 1-5
stored program units
managing privileges, 2-6, 9-5

T

tables
privileges on, 2-3
TCP.EXCLUDED_NODES parameter, 9-58
TCP.INVITED_NODES parameter, 9-58
TCP.VALIDNODE_CHECKING parameter, 9-58
token cards, 9-37
benefits, 4-5
Triple DES (3DES), 2-11, 3-5, 9-6, 9-28, 9-45

U

UNIX hashing scheme, 5-6
user models, 9-20
users
authentication of, 9-4

V

valid node checking, 3-3, 9-58
VeriSign, 9-34, 9-42, 9-43
views
complex and dynamic, 2-9
managing privileges, 2-7, 9-5
virtual private database (VPD), 9-19
application context, 9-17
database enforced network access, 9-58
how it works, 9-15
introduction, 2-9
network security, 3-4
Oracle Label Security, 9-20, 9-47
Oracle Policy Manager, 9-20
overview, 9-14
user models, 9-20

W

wallets, 9-43
encryption, 9-45

X

X.509 Version 3 certificates, 8-7, 9-9, 9-10, 9-34, 9-35, 9-43, 9-45

Go to previous page
Oracle
Copyright © 2001, 2002 Oracle Corporation.

All Rights Reserved.
Go To Documentation Library
Home
Go To Product List
Book List
Go To Table Of Contents
Contents

Master Index

Feedback