3/46
List of Figures
3-1 Password Change Life Cycle
3-2 Multitier Authentication
4-1 Common Uses for Roles
5-1 Roles Granted to Application Users and Invoker's Right Program Unit
5-2 Security Context in Which Invoker's Right Program Unit IR Is Executed
5-3 Roles Granted to Application Users and Definer's Rights Program Unit
5-4 Security Context in Which Definer's Right Program Unit DR Is Executed
9-1 Location of Application Context in LDAP Directory Information Tree
15-1 Strong Authentication with Oracle Authentication Adapters
15-2 How a Network Authentication Service Authenticates a User
15-3 Oracle Network Encryption and Strong Authentication Architecture
15-4 Oracle Net Services with Authentication Adapters
18-1 Secure Sockets Layer in Relation to Other Authentication Methods
19-1 RADIUS in an Oracle Environment
19-2 Synchronous Authentication Sequence
19-3 Asynchronous Authentication Sequence
22-1 Auditing Proxy Users
22-2 Auditing Client Identifier Information Across Sessions
Scripting on this page enhances content navigation, but does not change the content in any way.