Oracle Database enables strong authentication with Oracle authentication adapters, which support various third-party authentication services, including SSL with digital certificates. Password authentication is the most common means of authentication. To ensure network security in distributed environments, it is necessary to authenticate the user and check his credentials. tProperty(OracleConnection.CONNECTION_PROPERTY_THIN_NET_CHECKSUM_LEVEL, "REQUIRED") You can test this JDBC example code on your own system, but note that you'll need to change the lines where we create our url and conn objects to reflect your own database configuration. If you're interested, you can download the Java source code for our Query1.java program. tProperty(OracleConnection.CONNECTION_PROPERTY_THIN_NET_CHECKSUM_TYPES, "( MD5, SHA1, SHA256, SHA384 or SHA512 )") Download our example JDBC select program. The following code snippet shows how to calculate the checksum using any of the algorithms mentioned previously: This protects the communicated data from attacks, such as data modification, deleted packets, and replay attacks. Starting from Oracle Database 12 c Release 1 (12.1), the SHA-2 list of hashing algorithms are also supported and Oracle Advanced Security uses the following hashing algorithms to generate the secure message digest and includes it with each message sent across a network: To ensure data integrity during transmission, Oracle Advanced Security generates a cryptographically secure message digest. Some of the supported encryption algorithms are RC4, DES, 3DES, and AES. Sensitive information communicated over enterprise networks and the Internet can be protected by using encryption algorithms, which transform information into a form that can be deciphered only with a decryption key. Oracle Advanced Security provides the following security features:
0 Comments
Leave a Reply. |