JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Fusion Middleware Administration Guide for Oracle Unified Directory 11g Release 1 (11.1.1)
search filter icon
search icon

Document Information


1.  Starting and Stopping the Server

2.  Configuring the Server Instance

3.  Configuring the Proxy Components

4.  Configuring Security Between Clients and Servers

5.  Configuring Security Between the Proxy and the Data Source

How the Proxy Manages Secure Connections

Modes of Secure Connection

The always Secure Mode

The never Secure Mode

The user Secure Mode

Configuring Security Between the Proxy and Data Source Using dsconfig

To Configure Security Between the Proxy and Directory Servers Using dsconfig

Configurable LDAP Extension Properties Relevant to Security

StartTLS and the Proxy

Setting Access Control Using Network Group Criteria

6.  Managing Oracle Unified Directory With Oracle Directory Services Manager

7.  Managing Directory Data

8.  Replicating Directory Data

9.  Controlling Access To Data

10.  Managing Users and Groups With dsconfig

11.  Managing Password Policies

12.  Managing Directory Schema

13.  Monitoring Oracle Unified Directory

14.  Tuning Performance

15.  Advanced Administration

Chapter 5

Configuring Security Between the Proxy and the Data Source

Security configuration between the proxy and the remote LDAP servers can be configured as follows:

For security management, network groups can be enabled to classify incoming client connections. You can use network groups to restrict operations that can be performed based on how the connection has been classified. Use this functionality, for example, to restrict access to clients that connect from a specified IP address only. For more information, see Configuring Network Groups With dsconfig.

For secure client authentication between the proxy and remote LDAP servers, the certificate of the proxy must be imported into the truststore of each remote LDAP server. In this case, for Oracle Unified Directory proxy, a keystore is mandatory. The keystore must be configured manually. For details, see Configuring Key Manager Providers.

The security of Oracle Unified Directory proxy does not bypass the back-end ACI.