Database Security Guide Managing Strong Authentication Part V Managing Strong Authentication Part V describes how to manage strong authentication. Introduction to Strong AuthenticationStrong authentication supports tools such as Secure Sockets Layer (SSL) to verify the identities of users who log in to the database. Strong Authentication Administration ToolsYou can use a set of strong authentication administration tools for native network encryption and public key infrastructure credentials. Configuring Kerberos AuthenticationKerberos is a trusted third-party authentication system that relies on shared secrets and presumes that the third party is secure. Configuring Secure Sockets Layer AuthenticationYou can configure Oracle Database to use Secure Sockets Layer authentication. Configuring RADIUS AuthenticationRADIUS is a client/server security protocol widely used to enable remote authentication and access. Customizing the Use of Strong AuthenticationYou can configure multiple authentication methods under Oracle Database native network encryption and strong authentication.