Oracle Database B10772-01 Administrator's Manual page 314

Database
Table of Contents

Advertisement

Enterprise User Security Configuration Overview
Regardless of the authentication method you choose—password, SSL, or
Kerberos—you must still create the global database objects and configure the
identity management realm as described.
The primary difference between configuration for the various authentication types
lies with network connection configuration. You must consider the following three
connections:
Enterprise User Security supports many combinations of authentication types
between databases, directories, and clients. The three most common
implementations of Enterprise User Security, which will be described in this
chapter, use the following authentication methods for client/database and
database/directory connections:
Primarily, your network environment—whether all clients, databases, and
directories reside within the same network behind a firewall, or are distributed
across several networks and perhaps exposed to the Internet—determines what
authentication type you choose for Enterprise User Security network connections.
Security and integrity of enterprise data depend on secure network connections.
Secondarily, the configuration complexity, additional software, and ongoing
maintenance required by more rigorous authentication types, such as SSL and
Kerberos, should also be considered when choosing which "flavor" of Enterprise
User Security to use.
Figure 12–1
step-by-step process with decision points based on your implementation and how
your users are authenticated. Note that the steps which are represented with broken
lines are optional steps in the configuration process.
12-2 Oracle Database Advanced Security Administrator's Guide
Client-to-database
Database-to-directory
Database-to-database (current user database links can be secured by SSL only)
Passwords for both connections
SSL for both connections
Kerberos for client/database connections and passwords for database/directory
connections
shows the configuration process for Enterprise User Security. It is a

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Oracle Database B10772-01 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Database advanced security 10g release 1

Table of Contents