This is a text description of cfig0002.gif, which is an image of the Integrity tab in the Oracle Advanced Security profile region of Oracle Net Manager Manager. Use this window to configure cryptographic checksumming for data integrity.
This window has the following fields which you can use to configure cryptographic checksumming:
Integrity (a list from which you can choose either CLIENT or SERVER)
Checksum Level (a list from which you can choose one of the following: REQUESTED, REQUIRED, ACCEPTED, or REJECTED)
In the lower half of the window, you can choose the Selected Methods of checksumming you want to use from the Available Methods list. SHA-1 and MD5 display as available checksum algorithms. Select a checksumming method from the Available Methods list on the left, then click a right arrow and the checksumming method populates the Selected Methods list on the right side of the window. To remove a checksumming method from the Selected Methods list, you can click a left arrow and the checksumming method moves back to the Available Methods list.