Go to main content
1/19
Contents
Title and Copyright Information
Preface
Conventions
Documentation Accessibility
1
Introducing Oracle Berkeley DB Security
2
Designing Secure Applications Using Berkeley DB
Supporting Encryption
Considering Additional Security
3
Designing Secure Highly Available (HA) Applications
Enabling Secure Sockets Layer (SSL) for the Replication Manager
4
Authenticating Berkeley DB SQLite User
Authenticating Berkeley DB SQL Keystore-Based User
Authenticating Berkeley DB SQL User (without Keystore)
5
Configuring Security for Distributed Applications with Berkeley DB
Using Berkeley DB Server Configuration Files
Configuring the Server
Enabling SSL for the Server
Connecting to a Server with SSL
Scripting on this page enhances content navigation, but does not change the content in any way.