The Encryption tab enables you to configure encryption parameters for the selected authentication methods.
|
Note: Use the SSL tab to configure cipher suites for the Secure Sockets Layer (SSL). |
From the list, select the computer you are currently configuring: either Client or Server.
Encryption Type
Select a value to specify the client or server behavior when negotiating encryption and integrity. The four possible encryption types are:
Service will be active if the other side of the connection specifies either "required" or "requested", and there is a compatible algorithm available on the other side; it will otherwise be inactive. | |
Service must not be active, and the connection will fail if the other side specifies "required". | |
Service will be active if the other side of the connection specifies either "accepted", "required", or "requested", and there is a compatible algorithm available on the other side; it will otherwise be inactive. | |
Service must be active, and the connection will fail if the other side specifies "rejected", or if there is no compatible algorithm on the other side. |
Enter an encryption seed, a random string of up to between 10 and 70 characters, in the Encryption Seed field. The encryption seed is used to generate cryptographic keys. This is required when either encryption or integrity is enabled.
Available Methods/Selected Methods list
Displays the authentication methods available for selection and the encryption methods selected. The order of the methods in the list determines preferred order for negotiation.
Use the left-arrow button (<) and the right-arrow button (>) to move a selected encryption algorithm between lists. The following encryption algorithms are supported by Oracle Advanced Security:
RC4_256 |
256 bit key size |
3DES168 |
Triple DES with a three-key (168 bit) option |
RC4_128 |
128 bit key size |
3DES112 |
Triple DES with a two-key (112 bit) option |
RC4_56 |
56 bit key size |
DES |
Standard 56 bit key size |
RC4_40 |
40 bit key size |
DES40 |
40 bit key size |