Index
A B C D E F G H I J K L M N O P R S T U V W X
A
- access
- unauthorized, 1-14
- access control
- described, 1-6
- directory, 5-7
- least privilege, 9-4
- Oracle Connection Manager, 9-55
- access control lists (ACLs), 6-3
- administration
- delegation of, 5-8, 9-49
- enterprise user, 9-53
- application context
- accessed globally, 9-18
- accessed locally, 9-17
- initialized externally, 9-17
- initialized globally, 9-18
- overview, 9-16
- secure, 9-15
- virtual private database (VPD), 9-17
- application security
- directory-based, 5-8
- policies, 9-13
- requirements, 1-15
- secure application role, 9-21
- auditing
- customizable, 7-3, 9-5
- fine-grained, 7-3, 9-21
- in multitier systems, 7-4
- introduction, 7-2
- multitier applications, 9-23
- security requirements, 7-2
- authentication, 9-26
- application user proxy authentication, 9-18
- biometric, 9-37
- CyberSafe, 4-4, 9-36
- DCE, 4-7, 9-38
- described, 1-6, 4-2, 9-4
- directory, 5-5
- Entrust/PKI, 8-8, 9-36
- Kerberos, 4-4
- methods, 8-7, 9-4, 9-33
- multitier, 6-5
- password-authenticated users, 6-5
- password-based, 4-2
- PKI certificate-based, 4-7, 8-5
- PKI methods, 8-7, 9-34
- proxy, 3-8, 4-8, 9-9
- RADIUS protocol, 4-4, 9-36
- SecurID, 9-37
- smart cards, 4-6, 9-37
- SSL, 8-7, 9-35
- strong, 4-3, 9-33
- token cards, 4-5, 9-37
- authorization
- biometrics, 4-7
- described, 1-6
- directory, 5-7, 5-8
- multitier, 6-5
- proxy, 4-8
- availability
- Real Application Clusters, 9-8
- security factors, 1-7, 2-12, 9-6
B
- backup and recovery, 9-7
- Baltimore Technologies, 9-34
- biometric authorization, 4-7, 9-37
C
- certificate authorities, 9-34
- introduction, 8-5
- certificates
- contents, 8-6
- introduction, 8-5
- support for multiple, 9-45
- trusted, 8-6, 9-42
- X.509 Version 3, 8-7
- checksums, 9-29, 9-49
- algorithms, 3-6
- SSL, 9-29
- confidentiality, 1-5
- connection
- management, 9-55
- multitier, 3-3
- connection pooling, 4-9, 9-18
- credentials
- secure storage, 8-8
- CyberSafe ActiveTrust, 4-4
- CyberSafe authentication, 4-4, 9-36
D
- data
- deep data protection, 9-12
- encryption of stored, 2-10
- Data Encryption Standard (DES), 2-11, 3-5, 9-6, 9-28
- database links
- current user, 9-41
- DBMS_OBFUSCATION_TOOLKIT, 9-6
- directory security
- administrative roles, 5-12
- application security, 5-8, 9-41
- domains and roles, 5-10
- discretionary access control (DAC)
- least privilege, 9-4
- Distributed Computing Environment (DCE)
- authentication, 4-7, 9-38
E
- encryption
- algorithms, 2-11, 3-5
- for network transmission, 3-4, 9-27
- stored data, 2-10, 9-6
- enterprise roles, 2-5, 9-53
- enterprise user security
- features, 9-39
- global roles, 2-5
- graphical user interfaces, 9-40
- introduction, 6-1, 6-2
- privilege administration, 6-3
- enterprise users
- password authenticated, 6-5, 9-40
- Entrust certificates, 9-42
- Entrust Profile, 9-35
- Entrust/PKI authentication, 8-8, 9-35
F
- failover, 9-8
- Federal Information Processing Standard 140-1 (FIPS), 9-24
- fine-grained access control
- facilitating VPD, 9-19
- per-user, 9-20
- fine-grained auditing, 7-3, 9-21
- firewalls, 3-7, 9-56, 9-57
G
- GTE CyberTrust certificates, 9-42, 9-43
H
- hashing, password, 5-6
I
- integrity
- checking, 3-6
- database mechanisms, 2-11, 9-3
- described, 1-6
- directory, 9-49
- entity integrity enforcement, 9-3
- Oracle Advanced Security features, 9-29
- referential, 2-11, 9-3
- Internet
- access control, 9-57
- data access increased, 1-9
- hosted system security, 1-11, 9-13
- increased data availability, 1-9
- large user communities, 1-10
- scalability of security, 1-10, 9-13
- security challenges, 1-8
- security features, 9-12
- security requirements, 1-8
J
- Java
- class execution, 9-23
- security implementation, 9-23
- Java Database Connectivity (JDBC)
- application user proxy authentication, 9-11
- encryption, 9-31
- JDBC-OCI driver, 3-9, 9-10, 9-30
- network security, 3-8
- supported drivers, 9-30
- Thin driver, 3-9, 9-31
- Java Secure Socket Extension (JSSE), 9-32
- Java virtual machine (JVM), 9-23
- java.lang.SecurityManager, 9-23
K
- Kerberos authentication, 4-4, 9-36
- Kerberos Single Sign-On, 4-4
L
- label based access control
- introduction, 2-9
- Oracle Label Security, 9-47
- LDAP
- application security, 5-8
- compliance, 9-51
- delegation of administration, 5-8
- directory access controls, 5-7
- introduction, 5-3
- Oracle Internet Directory, 9-43
- security features, 5-4
- server instance architecture, 9-51
- single sign-on, 9-39
- lightweight sessions, 4-9
- Login Server, 4-11
M
- MD4 hashing scheme, 5-6, 9-50
- MD5 Checksum, 3-6, 5-6, 9-6, 9-29, 9-49
- Microsoft Active Directory, 9-41
- multitier systems
- auditing, 7-4, 9-23
- authentication, 6-5
- proxy authentication, 4-8, 9-10
- security, 3-8
- single sign-on, 4-11
N
- network security
- database enforced, 3-4
- encryption, 3-4
- firewalls, 3-7
- Java Database Connectivity (JDBC), 3-8
- managing privileges, 2-7
- multitier connection management, 3-3
- Oracle Advanced Security features, 9-27
- PKI, 8-9
- Secure Sockets Layer, 3-6
- valid node checking, 3-3
- VPD database enforced access, 9-58
O
- Oracle Advanced Security, 9-24, 9-26
- authentication, 9-33
- PKI implementation, 9-42
- Oracle Call Interface (OCI)
- JDBC driver, 9-10
- JDBC-OCI driver, 3-9
- PKI, 9-42
- Oracle Connection Manager, 3-3
- firewall support, 9-57
- firewalls, 9-56
- security features, 9-55
- Oracle Enterprise Login Assistant, 9-35, 9-43
- Oracle Enterprise Security Manager, 9-41, 9-44, 9-45
- Oracle Internet Directory, 9-43
- architecture, 9-52
- components, 9-50
- enterprise user administration, 9-53
- security benefits, 9-49
- security features, 9-48
- Oracle Java SSL, 9-32
- Oracle Label Security, 9-20, 9-47
- Oracle Net Firewall Proxy, 9-57
- Oracle Net Services, 9-27
- protocol support, 9-55
- security features, 9-54
- Oracle Password Protocol, 9-32
- Oracle Policy Manager, 9-20
- Oracle Wallet Manager, 8-8, 9-32, 9-35, 9-43, 9-45
- Oracle wallets, 9-43
- Oracle9i Application Server
- SSL encryption, 9-30
P
- partitioning, 9-19
- virtual private database (VPD), 9-19
- passwords
- authentication, 4-2
- authentication of enterprise users, 6-5, 9-40
- protection in directory, 5-6, 9-50
- security risks, 1-13
- PKCS #12 containers, 9-45
- PKCS#10 certificates, 9-43
- policy function, 9-59
- privacy of communications, 1-5
- privileges
- enterprise administration, 6-3
- least, 9-4
- managing, 2-3
- network facilities, 2-7
- roles to manage, 2-4
- schema object, 2-2, 2-3
- stored procedures to manage, 2-6
- system, 2-2
- views to manage, 2-7
- profiles
- user, 9-6
- protocol conversion, 9-55
- proxy authentication, 3-8, 4-8, 9-9
- application user, 9-11, 9-18
- directory, 9-10
- expanded credential, 9-10
- Kerberos and CyberSafe, 9-36
- proxy authorization, 4-8
- Public Key Certificate Standard #12 (PKCS#12), 8-8
- Public Key Certificate Standards (PKCS), 9-34
- public key infrastructure (PKI)
- advantages, 8-3
- authentication, 4-7, 9-34
- authentication methods, 8-7
- certificate-based authentication, 8-5
- components, 8-3, 9-42
- cryptography, 8-4
- interoperability, 9-44
- introduction, 8-1
- network security, 8-9
- Oracle Advanced Security, 9-42
- Oracle implementation, 9-46
- security features, 8-2
- single sign-on, 8-9
- supported vendors, 9-34
R
- RADIUS protocol
- authentication, 4-4, 9-36
- smart cards, 9-37
- supported vendors, 9-36
- RADIUS-compliant smart cards, 4-6
- RADIUS-compliant token cards, 4-5
- RC4 encryption algorithm, 2-11, 3-5, 9-28
- Real Application Clusters
- availability, 9-8
- referential integrity, 9-3
- replication, advanced, 9-7
- resource limitation, 9-6
- roles
- database, 2-4
- directory administration, 5-12
- enterprise, 2-5, 6-5
- global, 2-5
- managing privileges, 2-4
- secure application, 2-6
- secure application role, 9-21
- types of, 9-5
- row level security
- introduction, 2-8
- RSA certificates, 9-42, 9-43
- RSA Data Security RC4, 3-5, 9-28
- RSA SecurID tokens, 9-37
S
- scalability
- security, 1-15, 9-18
- schema objects
- privileges on, 2-3
- secure application roles, 2-6, 9-21, 9-59
- Secure Hash Algorithm (SHA), 3-6, 5-6, 9-29, 9-49
- Secure Sockets Layer (SSL), 9-42
- authentication, 8-7, 9-35
- checksums, 9-29
- encryption, 9-29
- network security, 3-6
- Oracle Internet Directory, 9-49
- single sign-on, 9-43
- SecurID token cards, 9-37
- security
- administration team, 1-18
- application, 9-13
- application context, 9-16
- application user proxy authentication, 9-18
- auditing, 7-2
- availability, 1-7, 2-12
- credentials, storage, 8-8
- database, 2-2
- database integrity mechanisms, 2-11
- deep data protection, 9-12
- directory authentication, 5-5
- directory-based, 5-8, 9-41
- enterprise user, 6-2
- firewalls, 3-7
- good practices, 2-13
- hosted systems, 1-11
- integrity, 1-6
- Internet, 1-8, 1-10, 9-12, 9-13
- Java Beans, 9-25
- Java implementation, 9-23
- label based access control, 2-9
- LDAP features, 5-4
- multitier systems, 1-15, 3-8
- myths, 1-2
- network, 9-27
- Oracle Advanced Security, 9-24
- Oracle Internet Directory, 9-48
- Oracle Label Security, 9-47
- Oracle Net Services, 9-54
- Oracle9i Enterprise Edition, 9-12
- Oracle9i Standard Edition, 9-2
- password protection, 1-13, 5-6
- personnel dimension, 1-4
- physical dimension, 1-4
- PKI, 8-1
- privileges, 2-2
- procedural dimension, 1-4
- requirements, 1-15
- row level, 2-8
- scalability, 1-15, 9-18
- scope of issues, 1-3
- secure application role, 9-21
- security directory integrity, 5-2
- shared schemas, 6-4
- single sign-on, 4-10, 6-6
- strong authentication, 4-3
- technical dimension, 1-4
- threats and countermeasures, 1-12, 1-16
- virtual private database (VPD), 2-9
- SecurityManager class, 9-23
- sessions
- lightweight, 4-9
- multiplexing, 9-56
- shared schemas
- Oracle Internet Directory, 9-53
- security features, 6-4, 9-41
- single sign-on
- Entrust-based, 9-35, 9-39
- implementations, 4-10, 9-38
- introduction, 6-6
- multitier, 4-11
- Oracle Enterprise Login Assistant, 9-43
- PKI, 8-9, 9-38, 9-39
- server-based, 4-10
- Single Sockets Layer (SSL)
- current user database links, 9-41
- smart cards, 4-6, 9-37
- storage
- secure credentials, 8-8
- secure data, 1-5
- stored data encryption, 1-5
- stored program units
- managing privileges, 2-6, 9-5
T
- tables
- privileges on, 2-3
- TCP.EXCLUDED_NODES parameter, 9-58
- TCP.INVITED_NODES parameter, 9-58
- TCP.VALIDNODE_CHECKING parameter, 9-58
- token cards, 9-37
- benefits, 4-5
- Triple DES (3DES), 2-11, 3-5, 9-6, 9-28, 9-45
U
- UNIX hashing scheme, 5-6
- user models, 9-20
- users
- authentication of, 9-4
V
- valid node checking, 3-3, 9-58
- VeriSign, 9-34, 9-42, 9-43
- views
- complex and dynamic, 2-9
- managing privileges, 2-7, 9-5
- virtual private database (VPD), 9-19
- application context, 9-17
- database enforced network access, 9-58
- how it works, 9-15
- introduction, 2-9
- network security, 3-4
- Oracle Label Security, 9-20, 9-47
- Oracle Policy Manager, 9-20
- overview, 9-14
- user models, 9-20
W
- wallets, 9-43
- encryption, 9-45
X
- X.509 Version 3 certificates, 8-7, 9-9, 9-10, 9-34, 9-35, 9-43, 9-45