mathematically related, it is generally viewed as computationally infeasible to
derive the private key from the public key. Public and private keys are used only
with asymmetric encryption algorithms, also called public-key encryption
algorithms, or public-key cryptosystems. Data encrypted with either a public key or
a private key from a
key pair
can be decrypted with its associated key from the
key-pair. However, data encrypted with a public key cannot be decrypted with the
same public key, and data enwrapped with a private key cannot be decrypted with
the same private key.
RADIUS
Remote Authentication Dial-In User Service (RADIUS) is a client/server protocol
and software that enables remote access servers to communication with a central
server to authenticate dial-in users and authorize their access to the requested
system or service.
realm
1. Short for
identity management
realm. 2. A Kerberos object. A set of clients and
servers operating under a single key distribution center/ticket-granting service
(KDC/TGS). Services (see kservice) in different realms that share the same name
are unique.
realm Oracle Context
An
that is part of an
in Oracle Internet
Oracle Context
identity management realm
Directory.
registry
A Windows repository that stores configuration information for a computer.
remote computer
A computer on a network other than the local computer.
root key certificate
See
trusted certificate
schema
1. Database schema: A named collection of objects, such as tables, views, clusters,
procedures, packages, attributes,
classes, and their corresponding matching
object
rules, which are associated with a particular user. 2. LDAP directory schema: The
collection of attributes, object classes, and their corresponding matching rules.
Glossary-20
Need help?
Do you have a question about the Oracle Database B10772-01 and is the answer not in the manual?