Valid Integrity Algorithms - Oracle Database B10772-01 Administrator's Manual

Database
Table of Contents

Advertisement

Choose File > Save Network Configuration. The sqlnet.ora file is updated.
6.
Repeat this procedure to configure integrity on the other system. The
7.
sqlnet.ora file on the two systems should contain the following entries:
On the server:
SQLNET.CRYPTO_CHECKSUM_SERVER = [accepted | rejected | requested |
required]
SQLNET.CRYPTO_CHECKSUM_TYPES_SERVER = (valid_crypto_checksum_algorithm
[,valid_crypto_checksum_algorithm])
On the client:
SQLNET.CRYPTO_CHECKSUM_CLIENT = [accepted | rejected | requested |
required]
SQLNET.CRYPTO_CHECKSUM_TYPES_CLIENT = (valid_crypto_checksum_algorithm
[,valid_crypto_checksum_algorithm])
Valid integrity algorithms and their associated legal values are displayed by
Table
3–3:
Table 3–3 Valid Integrity Algorithms
Algorithm Name
MD5
SHA-1
Configuring Network Data Encryption and Integrity for Oracle Servers and Clients 3-13
Legal Values
MD5
SHA1
How To Configure Data Encryption and Integrity

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Oracle Database B10772-01 and is the answer not in the manual?

Subscribe to Our Youtube Channel

This manual is also suitable for:

Database advanced security 10g release 1

Table of Contents