Secure Protocols
SSH Protocol
Secure Shell (SSH) protocol allows secure connections between (remote) devices using public key cryptography (PKC).
Oracle Security Technology Standards-approved SSH cipher suites (key exchange, symmetric encryption, MAC, host key algorithms) are used by Enterprise Back Office products when negotiating connections to customer or third-party SFTP services.
Supported Cipher Suite
-
Reporting and Analytics starting from 20.1.15 release.
-
Inventory Management starting from 9.1.37 release.
New cipher additions in these releases are noted with an asterisk (*).
Category | Cipher/Algorithm (Alternate) Names |
---|---|
Key Exchange (KEX) |
|
Server Host Key Algorithms |
|
Symmetric Encryption |
|
Message Authentication Code (MAC) |
|
Weak, Deprecated Cipher Suites
-
Reporting and Analytics releases from 20.1 to 20.1.14
-
Inventory Management releases from 9.1 to 9.1.36
These ciphers will not be supported in future releases.
Category | Cipher/Algorithm (Alternate) Names |
---|---|
Key Exchange (KEX) |
|
Server Host Key Algorithms |
|
Symmetric Encryption |
|
Message Authentication Code (MAC) |
|
Parent topic: Security Considerations