Skip Headers
Oracle® Security Developer Tools Reference
10g Release 2 (10.1.2)
B15975-01
  Go To Documentation Library
Home
Go To Product List
Solution Area
Go To Table Of Contents
Contents

Previous
Previous
 

Index

A  C  D  E  F  H  I  J  K  L  M  O  P  R  S  T  W  X 

A

algorithms, 3.1
asymmetric, 1.1.1.2
Diffie-Hellman, 2.3.6
hash, 1.1.1.3
key agreement, 2.3.6
message digest, 2.3.5.1
signature, 2.3.4
symmetric, 1.1.1.1

C

certificate authority, 1.2.2
ciphers, 2.3.3
symmetric, 2.3.3.1
CMP, 1.2.4, 7.1.1
CMS, 1.2.4
authenticated data, 5.3.2.8
constructing objects, 5.3.2
detached objects, 5.3.2.5.3
digested data, 5.3.2.4
encrypted data, 5.3.2.6
enveloped data, 5.3.2.7
object types, 5.3.1
reading objects, 5.3.2.1.2
signed data, 5.3.2.5
CRMF, 7.1.1
cryptography, 1.1
algorithms, 1.1.1

D

DER, 8.4.1
digital certificates, 4
DTD, 8

E

ECC, 1.6.1
ECDSA, 2.3.2.1
Elliptic Curve Cryptography, 1.6.1
Elliptic Curve Digital Signature Algorithm, 2.3.2.1
Enhanced Security Services, 6.3.3.9

F

federation, 1.5
FIM, 11.1

H

HMAC, 2.3.5.2, 3.1, 5.3.2.8

I

identity provider, 1.5

J

Java API Reference
Oracle CMS, 5.4
Oracle Crypto, 2.4
Oracle Liberty SDK 1.1, 11.2.3
Oracle Liberty SDK 1.2, 11.3.3
Oracle PKI SDK CMP, 7.1.3
Oracle PKI SDK LDAP, 7.4.3
Oracle PKI SDK OCSP, 7.2.3
Oracle PKI SDK TSP, 7.3.3
Oracle SAML, 9.4
Oracle Security Engine, 4.4
Oracle S/MIME, 6.4
Oracle Web Services Security, 10.4
JCE, 3

K

key agreement, 2.3.6, 5.3.2.7.4
key encryption, 5.3.2.7.5
key pairs
generating, 2.3.2.1
key transport, 5.3.2.7.3

L

LDAP, 1.2.4, 7.4
Liberty Alliance, 11
Liberty protocol
authentication context, 11.2.2.2.4
authorization request, 11.2.2.1.1
authorization response, 11.2.2.1.2
base message class, 11.2.2.2.6
federation termination notification, 11.2.2.1.3
logout request, 11.2.2.1.4
logout response, 11.2.2.1.5
register name ID request, 11.2.2.1.6
register name ID response, 11.2.2.1.7

M

MAC, 1.1, 1.6.6, 2.3.1.1, 2.3.5.2, 5.3.2.8
Message Authentication Code, 1.1, 2.3.1.1, 5.3.2.8
message digests, 2.3.5

O

OCSP, 1.2.4, 7.2.1
Oracle CMS, 1.6.3, 5, 5
developing applications with, 5.3
environment setup, 5.2
features and benefits, 5.1, 5.1
system requirements, 5.2.1
Oracle Crypto, 1.6.1
core classes, 2.3
environment setup, 2.2
features and benefits, 2.1
supported algorithms, 2.1
Oracle JCE Provider, 1.6.6, 3
environment setup, 3.2
features and benefits, 3.1
supported algorithms, 3.1
Oracle Liberty SDK, 1.6.10, 11
core classes, 11.2.2.1
features and benefits, 11.1
initialization, 11.2.2.2.1
supporting classes, 11.2.2.2
Oracle Liberty SDK 1.1
environment setup, 11.2
Oracle PKI SDK, 1.6.5, 7
Oracle PKI SDK CMP, 1.6.5.4, 7.1
environment setup, 7.1.2
features and benefits, 7.1.1
Oracle PKI SDK LDAP, 1.6.5.1, 7.4
environment setup, 7.4.2
features and benefits, 7.4.1
Oracle PKI SDK OCSP, 1.6.5.3, 7.2
environment setup, 7.2.2
features and benefits, 7.2.1
Oracle PKI SDK TSP, 1.6.5.2, 7.3
environment setup, 7.3.2
features and benefits, 7.3.1
Oracle SAML, 1.6.8, 9
core classes, 9.3
environment setup, 9.2
features and benefits, 9.1
supporting classes, 9.3.2
Oracle Security Developer Tools
dependencies, 1.6
Oracle Security Engine, 1.6.2, 4
core classes, 4.3, 4.3
environment setup, 4.2, 4.2
features and benefits, 4.1
Java API Reference, 4.4
packages, 4.1.1
Oracle S/MIME, 1.6.4, 6
environment setup, 3.2, 6.2
features and benefits, 6.1
supporting classes, 6.3.2
Oracle Web Services Security, 1.6.9, 10
core classes, 10.3.1
environment setup, 10.2
features and benefits, 10.1
packages, 10.1.1
supporting classes, 10.3.2
Oracle XML Security, 1.6.7, 8
core classes, 8.3.1
environment setup, 8.2
features and benefits, 8.1
supported algorithms, 8.4.2
supporting classes, 8.3.2

P

password based encryption, 2.3.3.3
PBE objects
generating, 2.3.3.3
PEM, 8.4.1
PKCS 10 certificate requests, 4.3.3
PKCS#12, 8.4.1
PKCS#7, 8.4.1
PKI, 7
and CMP, 1.2.4
and CMS, 1.2.4
and LDAP, 1.2.4
and OCSP, 1.2.4
and S/MIME, 1.2.4
and TSP, 1.2.4
benefits, 1.2.5
digital certificates, 1.2.3
key pairs, 1.2.1
principal, 1.5
PRNG, 2.3.7
seeding, 2.3.7.1
pseudo-random numbers, 2.3.7
public key infrastructure, 1.2

R

RSA ciphers, 2.3.3.2
generating, 2.3.3.2

S

SAML, 1.4, 9
and XML security, 1.4.2.3
assertion element, 9.3.1.2
profiles, 1.4.2.2
request and response cycle, 1.4.2.1
request element, 9.3.1.3
response element, 9.3.1.4
signatures, 2.3.4
single sign-on, 1.5
S/MIME, 1.2.4
new message, 6.3.1.3
SOAP, 1.3
SSO, 11.1
symmetric ciphers
generating, 2.3.3.1
symmetric key pairs
generating, 2.3.2.2

T

TSP, 1.2.4, 7.3

W

WSS, 1.3, 10
security elements, 10.3.1.1
SOAP message, 10.3.1.2

X

X500, 4.3.1
X.500 names, 4.3.1, 4.3.2
X509, 1.2.4, 3.1
X.509 certificates, 4.3.4
XKMS, 8
XML, 8
cipher data, 8.3.1.8
encryption, 8.3.1.5
key encryption, 8.3.1.6
security requirements, 8
signature creation, 8.3.1.1, 8.3.1.2, 8.3.1.3
signature verification, 8.3.1.2, 8.3.1.3
XML security
common questions, 8.4