Part V Managing Strong Authentication
Part V describes how to manage strong authentication.
- Introduction to Strong Authentication
Strong authentication supports tools such as Secure Sockets Layer (SSL) to verify the identities of users who log in to the database.
- Strong Authentication Administration Tools
You can use a set of strong authentication administration tools for native network encryption and public key infrastructure credentials.
- Configuring Kerberos Authentication
Kerberos is a trusted third-party authentication system that relies on shared secrets and presumes that the third party is secure.
- Configuring Secure Sockets Layer Authentication
You can configure Oracle Database to use Secure Sockets Layer authentication.
- Configuring RADIUS Authentication
RADIUS is a client/server security protocol widely used to enable remote authentication and access.
- Customizing the Use of Strong Authentication
You can configure multiple authentication methods under Oracle Database native network encryption and strong authentication.