Choose File > Save Network Configuration. The sqlnet.ora file is updated.
6.
Repeat this procedure to configure integrity on the other system. The
7.
sqlnet.ora file on the two systems should contain the following entries:
On the server:
SQLNET.CRYPTO_CHECKSUM_SERVER = [accepted | rejected | requested |
required]
SQLNET.CRYPTO_CHECKSUM_TYPES_SERVER = (valid_crypto_checksum_algorithm
[,valid_crypto_checksum_algorithm])
On the client:
SQLNET.CRYPTO_CHECKSUM_CLIENT = [accepted | rejected | requested |
required]
SQLNET.CRYPTO_CHECKSUM_TYPES_CLIENT = (valid_crypto_checksum_algorithm
[,valid_crypto_checksum_algorithm])
Valid integrity algorithms and their associated legal values are displayed by
Table
3–3:
Table 3–3 Valid Integrity Algorithms
Algorithm Name
MD5
SHA-1
Configuring Network Data Encryption and Integrity for Oracle Servers and Clients 3-13
Legal Values
MD5
SHA1
How To Configure Data Encryption and Integrity
Need help?
Do you have a question about the Oracle Database B10772-01 and is the answer not in the manual?