Tài liệu Oracle Security Server Guide 2.0.3 - Pdf 84

Oracle

Security Server Guide
Release 2.0.3
June, 1997
Part No. A54088-01
Oracle Security Server Guide
Part No. A54088-01
Release 2.0.3
Copyright © 1997 Oracle Corporation
All rights reserved. Printed in the U.S.A
Primary Author: Kendall Scott
Contributing Authors: Mary Ann Davidson, Gilbert Gonzalez, John Heimann, Patricia Markee, Rick
Wessman
Contributors: Quan Dinh, Jason Durbin, Gary Gilchrist, Wendy Liau, Bob Porporato, Andy Scott, Andre
Srinivasan, Juliet Tran, Sandy Venning
The Programs that this manual accompanies are not intended for use in any nuclear, aviation, mass
transit, medical, or other inherently dangerous applications. It shall be licensee's responsibility to take
all appropriate fail-safe, back up, redundancy and other measures to ensure the safe use of such appli-
cations if the Programs are used for such purposes, and Oracle disclaims liability for any damages
caused by such use of the Programs.
These Programs contain proprietary information of Oracle Corporation; they are provided under a license
agreement containing restrictions on use and disclosure and are also protected by copyright patent and
other intellectual property law. Reverse engineering of the software is prohibited.
The information contained in this document is subject to change without notice. If you find any problems
in the documentation, please report them to us in writing. Oracle Corporation does not warrant that this
document is error free.
If the associated Programs are delivered to a U.S. Government Agency of the Department of Defense, then
they are delivered with Restricted Rights and the following legend is applicable:
Restricted Rights Legend Programs delivered subject to the DOD FAR Supplement are 'commercial
computer software' and use, duplication and disclosure of the Programs shall be subject to the licensing


the Oracle Security Server Manager, a management tool that an administrator
uses to configure the framework.

the Oracle Cryptographic Toolkit, a programmer’s toolkit. This toolkit contains a
set of application programming interfaces (APIs) that enable application pro-
grams to access cryptographic functions, such as generating and verifying digital
signatures. These APIs, available via the Oracle Call Interface (OCI) and PL/SQL,
can be used to provide assurance to a wide variety of applications, such as elec-
tronic mail and electronic commerce. For more information on the Oracle Crypto-
graphic Toolkit, see the Oracle Cryptographic Toolkit Programmer’s Guide.
ii
Intended Audience
Oracle Security Server Guide is designed as the basic document to help security sys-
tem administrators understand, manage, and configure the Oracle Security Server.
Oracle Security Server Guide is available in HTML format for viewing through a Web
browser. It can also be ordered in hardcopy (paper) format.
Structure
This manual contains four chapters, a glossary, and a bibliography:
Conventions
The following conventions are used in this manual:
Chapter 1 Describes basic concepts associated with the Oracle Security
Server.
Chapter 2 Provides a description of the architecture and operation of the Ora-
cle Security Server.
Chapter 3 Details how a security administrator initializes the Oracle Security
Server.
Chapter 4 Details how the security administrator uses the Oracle Security
Server Manager to define elements to the Oracle Security Server.
Glossary Defines security-related terms that appear within this manual.

Reader’s Comment Form, which we encourage you to use to tell us what you like
and dislike about this manual or other Oracle manuals. If the form is not available,
please use one of the following addresses or the FAX number.
Oracle Network Products Documentation Manager
Oracle Corporation
500 Oracle Parkway
Redwood City, CA 94065
U.S.A.
E-Mail:
FAX: 415-506-7200
iv
v
Contents
1 Oracle Security Server Concepts
Introduction ......................................................................................................................................... 1-2
Basic Concepts..................................................................................................................................... 1-2
Cryptography................................................................................................................................ 1-2
Digital Signatures ......................................................................................................................... 1-6
Certification Authority (CA)....................................................................................................... 1-8
Certificates ..................................................................................................................................... 1-8
Certificate Revocation Lists (CRLs) ......................................................................................... 1-10
Oracle–Specific Features.................................................................................................................. 1-10
Authentication ............................................................................................................................ 1-10
Oracle Security Server Certificates........................................................................................... 1-11
Oracle Security Server Digital Signatures............................................................................... 1-11
Distinguished Names (DNs)..................................................................................................... 1-12
Public/Private Key Pairs........................................................................................................... 1-12
Global Intranet Authentication and Authorization................................................................... 1-13
Identities, Certificates, and Roles ............................................................................................. 1-13
Authentication of Entities.......................................................................................................... 1-13

Servers................................................................................................................................................. 4-14
Creating a Server......................................................................................................................... 4-14
Deleting a Server......................................................................................................................... 4-15
vii
Server Authorizations...................................................................................................................... 4-15
Defining a Server Authorization .............................................................................................. 4-15
Deleting a Server Authorization............................................................................................... 4-16
Granting and Revoking Server Authorizations ..................................................................... 4-17
Enterprise Authorizations............................................................................................................... 4-18
Defining an Enterprise Authorization..................................................................................... 4-18
Deleting an Enterprise Authorization ..................................................................................... 4-19
Adding and Deleting Server Authorizations for an Enterprise Authorization................. 4-19
Nesting Enterprise Authorizations.......................................................................................... 4-21
Granting and Revoking an Enterprise Authorization........................................................... 4-22
Glossary
Bibliography
Index
viii
ix
Figures
1–1 Message With Attached Digital Signature......................................................................... 1-7
1–2 Certificate................................................................................................................................ 1-9
2–1 Oracle Security Server Operations...................................................................................... 2-3
3–1 Oracle Security Server Manager Window ......................................................................... 3-4
3–2 Identity Window for Root User........................................................................................... 3-6
3–3 Create Server Window for Sample Server......................................................................... 3-7
3–4 Server Authorization Window for Sample Server Authorization ................................. 3-8
3–5 Enterprise Authorization Window for Sample Enterprise Authorization ................... 3-9
3–6 Server Authorizations for Typical Enterprise Authorization ....................................... 3-10
3–7 Identity Window for Sample User.................................................................................... 3-12


Oracle–Specific Features

Global Intranet Authentication and Authorization
Introduction
1-2 Oracle Security Server Guide
Introduction
The Oracle Security Server is a security product that supports centralized authoriza-
tion and distributed authentication in an Oracle environment. Authentication pro-
vides assurance that the alleged identity of a party who wishes to access one or
more Oracle database servers is valid. Authorization assures that a given party can
only operate according to privileges that have been defined for that party by an
administrator.
The Oracle Security Server is bundled with Oracle8 Server for use on any platform
that supports that product. However, the Oracle Security Server can be used with
an Oracle7 Server as well.
Basic Concepts
Cryptography
Introduction
Cryptography is the science of providing security for information through the
reversible transformation of data. It is a science of great antiquity. (Julius Caesar
used a simple letter substitution cipher that still bears his name.) The development
of digital computing revolutionized cryptography, and made today’s highly com-
plex and secure cryptographic systems possible.
A modern cryptographic system contains an algorithm and one or more keys. A
cryptographic algorithm (also known as a cipher) is a general procedure for trans-
forming data from plaintext (a usable, readable form) to ciphertext (a protected
form) and back again. The former process is called encryption; the latter, decryp-
tion. The keys are variable parameters of the algorithm. In order to transform a
given piece of plaintext into ciphertext, or ciphertext into plaintext, one needs both

new key for each communications session if they wish to establish a secure session.
These centralized private–key servers are often the “Achilles heel” of a communica-
tions system, since a single failure can compromise the entire system.
Public-Key Cryptography
In 1976, Whitfield Diffie and Martin Hellman proposed a new type of crypto-
graphic algorithm, referred to as “public key,” which greatly facilitates key distribu-
tion in a large user community.
In public-key cryptography (also known as “asymmetric” cryptography), the key
used to encrypt plaintext into ciphertext is different from the key that decrypts
ciphertext into plaintext. Each person gets a pair of keys: a public key and a pri-
vate key. The public key is published, while the private key is kept secret.
The keys are related in that a message encrypted with the public key can only be
decrypted with the corresponding private key, and a message encrypted with a pri-
vate key can only be decrypted with the corresponding public key. Furthermore,
the keys are designed so that the private key cannot, for all practical purposes, be
deduced from the public key. For instance, cryptanalysis of the most famous pub-
lic–key algorithm, RSA, requires the cryptanalyst to factor numbers that contain in
excess of 100 digits each; the difficulty in factoring numbers of that magnitude is
well–known in the computer science community.
Basic Concepts
1-4 Oracle Security Server Guide
Confidentiality
Public–key cryptography provides confidentiality or data secrecy. For example: If
Alice wishes to send a message to Bob that only Bob can read, she encrypts the mes-
sage with Bob’s public key, and Bob subsequently decrypts the message with his
private key. Since only Bob has the private key that can decrypt the message, only
Bob can read it. Anyone else wishing to send an encrypted message to Bob must
also use his public key for encryption.
Authentication
Public–key cryptography can also be used in authentication of senders of informa-

Each party uses the other party’s public key to encrypt the session key half.
Basic Concepts
Oracle Security Server Concepts 1-5

Each party transmits its encrypted session key half to the other party.

Each party uses its private key to recover the half of the session key that it did
not generate.

The two parties use the full session key with the private–key algorithm in
exchanging data.
In addition to the speed advantages that this provides over public–key cryptogra-
phy, it is also better than private–key cryptography on its own, because key man-
agement is simplified and the keys are more secure.
Benefits of Public-Key Cryptography
Public–key cryptography simplifies key distribution by eliminating the need to
share private keys. Holders of public keys can safely conduct business with parties
whom they never see and with whom they had no previous relationship. In
essence, the public–key encryption system becomes an effective substitute for
face–to–face commerce.
Since private keys are only known to the owning party, public–key authentication
eliminates the need for a server that manages the private keys for all the parties in a
system. This eliminates all single points of failure, and considerably reduces and
simplifies the management of keys. Keys can be used for longer periods of time
than those used in secret–key encryption systems because private keys are never
shared. Since the security for private keys is one of the most critical issues in any
cryptographic system, simplifying private–key management not only simplifies the
system, but it also makes it an order of magnitude more secure than previous secu-
rity technologies.
Please note that although the Oracle Security Server uses cryptographic mecha-

Given a message digest, it is hard to determine the message.

Given a message, it is hard to find another message for which the function
would produce the same message digest.
Second, the sender uses its private key to encrypt the message digest.
Thus, to sign something, in this context, means to create a message digest and
encrypt it with a private key.
Basic Concepts
Oracle Security Server Concepts 1-7
Figure 1–1 shows a typical E–mail message and what the associated digital signa-
ture might look like.
Figure 1–1 Message With Attached Digital Signature
The receiver of a message can verify that message via a comparable two–step pro-
cess:

Apply the same one–way hash function that the sender used to the body of the
received message. This will result in a message digest.

Use the sender’s public key to decrypt the received message digest.
If the newly computed message digest matches the one that was transmitted, the
message was not altered in transit, and the receiver can be certain that it came from
the expected sender.
mQCNAy89iJMAAAEEALrXJQpVmkTCtjp5FrkCvceFzydiEq2xGgoBvDUOn
PVvope9VA4Lw2wDAbZDD5oucpGg8I1E4luvHVsfF0mpk2JzzWE1hVxWv4
qSbCryUU5iSneFGPBI5D3nue4wC3XbvQmvYYp5LR6r2eyHU3ktazHzgK11U
tCFNaWNoZWxsZSBMb3Z1IDxsb3Z1QGlpY2hlbGx1Lm9yZz4=
=UPJB
NT Crack version 2 has been released.
massive optimization in speed in the new version justifies a new release.
I apologize for how soon it follows the initial release, but I think that a

Oracle Security Server Concepts 1-9
Figure 1–2 shows the format of a typical certificate.
Figure 1–2 Certificate
The elements of this certificate are as follows:

Version is 0 or 1. (This is 0 within Oracle Security Server certificates. See the
subsection “Oracle Security Server Certificates,” which appears later in this
chapter, for more information.)

Serial Number is the unique identifier for a given certificate.

Algorithm Identifier identifies which cryptographic algorithm the CA used to
sign the certificate and also provides any necessary parameters.

Issuer is the name of the CA.

Period of Validity indicates the date range over which the certificate is valid.
This is the range between the date of creation and the expiration date specified
by the person who requested the certificate.

Subject is the name of the entity to which the certificate belongs.
Version
Serial Number
Algorithm Identifier
o Algorithm
o Parameters
Issuer
Period of Validity
o Not Before Date
o Not After Date

The CA no longer wants to certify the given subject (because, for instance, the
subject is a user who is no longer employed by the company).
A party retrieving a certificate from the CA can check one or more CRLs to see
whether that certificate has been revoked. Note, though, that since checking a CRL
incurs significant overhead, users may want to make these checks only for docu-
ments that are especially important, or they may want to limit themselves to peri-
odic checks of CRLs.
Oracle–Specific Features
The Oracle Security Server conforms to a number of security industry and Oracle
standards to facilitate interfaces with other products and systems.
Authentication
The Oracle Security Server supports a version of SKEME as its authentication proto-
col. (A paper about SKEME, written by Hugo Krawczyk of IBM [Krawczyk], is
available at />Oracle–Specific Features
Oracle Security Server Concepts 1-11
Oracle Security Server Certificates
The Oracle Security Server supports X.509 version 1 certificates. (The 0 in the Ver-
sion area of the certificate, as described in the section “Certificates” that appears
earlier in this chapter, refers to version 1. Future releases of the Oracle Security
Server will support version 3 certificates, which correspond with the value 1 for
Version.)
Three documents define the standards for X.509 certificates.

The original X.509 document [X.509] provides the formal definition of these cer-
tificates and the type of certificate revocation list (CRL) that the Oracle Security
Server will be implementing in the future.

The X.509 “amendments” document [X.509A] defines amendments to X.509
that future versions of the Oracle Security Server will address.


more restricted format, as defined by the following template:
DN = ([Country,] [Organization,] [OrganizationUnit,] [State,] [Locality,] CommonName)
Within this template, each DN must have a Common Name, and all of the other val-
ues are optional.
Table 1–1 provides an example of the information that one would enter in defining
a DN for an entity that will be doing business with the Oracle Security Server.
Public/Private Key Pairs
The Oracle Security Server generates public/private key pairs using an RSA Data
Security Inc. TIPEM library function. (See />TIPEM/.)
Note:
The order in which these values appear within a DN is
important with regard to defining global users (see “Authorization
of Entities” later in this chapter) to an Oracle8 Server.
Table 1–1 User-Entered Information for Certificates
FIELD NAME USER-ENTERED INFORMATION
Country (C) US
Organization (O) Oracle Corporation
Organizational Unit (OU) Network Management Products
State (ST) California
Locality (L) Belmont
Common Name (CN) Lisa
Global Intranet Authentication and Authorization
Oracle Security Server Concepts 1-13
Global Intranet Authentication and Authorization
The Oracle Security Server enables the use of public–key cryptographic technolo-
gies for Oracle and non–Oracle products. This technology provides:

centrally defined identities, certificates, and roles—all of which enhance the
support of single sign–on—and centralized administrative control over the gen-
eration and revocation of private keys and certificates for subjects


Nhờ tải bản gốc

Tài liệu, ebook tham khảo khác

Music ♫

Copyright: Tài liệu đại học © DMCA.com Protection Status