peer identity
SSL connect sessions are between a particular client and a particular server. The
identity of the peer may have been established as part of session setup. Peers are
identified by
X.509 certificate
chains.
PEM
The Internet Privacy-Enhanced Mail protocols standard, adopted by the Internet
Architecture Board to provide secure electronic mail over the Internet. The PEM
protocols provide for encryption, authentication, message integrity, and key
management. PEM is an inclusive standard, intended to be compatible with a wide
range of key-management approaches, including both symmetric and public-key
schemes to encrypt data-encrypting keys. The specifications for PEM come from
four Internet Engineering Task Force (IETF) documents: RFCs 1421, 1422, 1423, and
1424.
PKCS #10
An RSA Security, Inc., Public-Key Cryptography Standards (PKCS) specification
that describes a syntax for certification requests. A certification request consists of a
distinguished name, a public key, and optionally a set of attributes, collectively
signed by the entity requesting certification. Certification requests are referred to as
certificate requests in this manual. See
certificate request
PKCS #11
An RSA Security, Inc., Public-Key Cryptography Standards (PKCS) specification
that defines an application programming interface (API), called Cryptoki, to devices
which hold cryptographic information and perform cryptographic operations. See
PCMCIA cards
PKCS #12
An RSA Security, Inc., Public-Key Cryptography Standards (PKCS) specification
that describes a transfer syntax for storing and transferring personal authentication
credentials—typically in a format called a wallet.
PKI
See
public key infrastructure (PKI)
plaintext
Message text that has not been encrypted.
Glossary-18
Need help?
Do you have a question about the Oracle Database B10772-01 and is the answer not in the manual?
Questions and answers