Oracle Fusion Middleware Developing Applications with Oracle ?· [1]Oracle® Fusion Middleware Developing…

Download Oracle Fusion Middleware Developing Applications with Oracle ?· [1]Oracle® Fusion Middleware Developing…

Post on 12-Sep-2018

215 views

Category:

Documents

0 download

Embed Size (px)

TRANSCRIPT

<ul><li><p>[1] Oracle Fusion MiddlewareDeveloping Applications with Oracle Security Developer Tools </p><p>12c (12.1.3) </p><p>E51602-02</p><p>September 2014</p><p>Provides reference information about the Oracle Security Developer Tools.</p></li><li><p>Oracle Fusion Middleware Developing Applications with Oracle Security Developer Tools, 12c (12.1.3) </p><p>E51602-02</p><p>Copyright 2013, 2014, Oracle and/or its affiliates. All rights reserved.</p><p>Primary Author: Vinaye Misra</p><p>Contributing Author: Divyanshu Singh, Abhay Yadav</p><p>This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited.</p><p>The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing.</p><p>If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable:</p><p>U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government.</p><p>This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherently dangerous applications, including applications that may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerous applications.</p><p>Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.</p><p>Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group.</p><p>This software or hardware and documentation may provide access to or information on content, products, and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content, products, and services. Oracle Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services.</p></li><li><p>iii</p><p>Contents</p><p>Preface .............................................................................................................................................................. xvii</p><p>Intended Audience................................................................................................................................... xviiDocumentation Accessibility .................................................................................................................. xviiRelated Documents .................................................................................................................................. xviiConventions ............................................................................................................................................. xviii</p><p> What's New in Oracle Security Developer Tools?................................................................. xix</p><p>Updates in September 2014 Documentation Refresh for 12c (12.1.3) ................................................ xixNew Features in 12c (12.1.3) .................................................................................................................... xixNew Features in 11g Release 1 (11.1.1.7.0) ............................................................................................ xxNew Features in 11g Release 1 (11.1.1.6.0) ............................................................................................ xxNew Features for Release 11g (11.1.1) .................................................................................................... xxOracle SAML Changes.............................................................................................................................. xx</p><p>1 Introduction to Oracle Security Developer Tools</p><p>1.1 About Cryptography.................................................................................................................. 1-11.1.1 Types of Cryptographic Algorithms................................................................................. 1-21.1.1.1 About Symmetric Cryptographic Algorithms ......................................................... 1-21.1.1.2 About Asymmetric Cryptographic Algorithms....................................................... 1-31.1.1.3 Understanding Hash Functions ................................................................................. 1-31.1.2 Additional Cryptography Resources................................................................................ 1-31.2 About Public Key Infrastructure (PKI) .................................................................................... 1-31.2.1 Understanding Key Pairs ................................................................................................... 1-41.2.2 About the Certificate Authority......................................................................................... 1-41.2.3 What are Digital Certificates? ............................................................................................ 1-41.2.4 Related PKI Standards ........................................................................................................ 1-41.2.5 Benefits of PKI ...................................................................................................................... 1-61.3 About Web Services Security .................................................................................................... 1-61.4 About SAML................................................................................................................................ 1-71.4.1 Understanding SAML Assertions ..................................................................................... 1-71.4.2 Understanding SAML Requests and Responses............................................................. 1-81.4.2.1 About the SAML Request and Response Cycle ....................................................... 1-81.4.2.2 About SAML Protocol Bindings and Profiles........................................................... 1-91.4.2.3 How SAML Integrates with XML Security............................................................... 1-91.5 About Identity Federation ...................................................................................................... 1-10</p></li><li><p>iv</p><p>1.6 About Oracle Security Developer Tools ............................................................................... 1-101.6.1 Understanding Toolkit Architecture.............................................................................. 1-101.6.2 About Supported Standards ........................................................................................... 1-131.6.3 About Oracle Crypto........................................................................................................ 1-141.6.4 About Oracle Security Engine......................................................................................... 1-141.6.5 About Oracle CMS............................................................................................................ 1-151.6.6 About Oracle S/MIME..................................................................................................... 1-151.6.7 About the Oracle PKI SDK .............................................................................................. 1-151.6.7.1 About Oracle PKI LDAP SDK ................................................................................. 1-151.6.7.2 About Oracle PKI TSP SDK...................................................................................... 1-161.6.7.3 About Oracle PKI OCSP SDK .................................................................................. 1-161.6.7.4 About Oracle PKI CMP SDK ................................................................................... 1-161.6.8 About Oracle XML Security ............................................................................................ 1-161.6.9 About Oracle SAML ......................................................................................................... 1-171.6.10 About Oracle Web Services Security ............................................................................. 1-171.6.11 About Oracle Liberty SDK............................................................................................... 1-171.6.12 About Oracle XKMS ......................................................................................................... 1-171.6.13 About Oracle JWT............................................................................................................. 1-181.7 References ................................................................................................................................. 1-18</p><p>2 Migrating to the JCE Framework </p><p>2.1 About The JCE Framework ....................................................................................................... 2-12.2 Understanding JCE Keys ........................................................................................................... 2-22.2.1 Converting an Existing Key Object to a JCE Key Object................................................ 2-22.3 Working with JCE Certificates .................................................................................................. 2-42.3.1 Switching to a JCE Certificate ............................................................................................ 2-42.4 Working with JCE Certificate Revocation Lists (CRLs) ........................................................ 2-52.5 Using JCE Keystores ................................................................................................................... 2-52.5.1 Working with standard KeyStore-type Wallets .............................................................. 2-52.5.2 Working with PKCS12 and PKCS8 Wallets ..................................................................... 2-62.6 The Oracle JCE Provider Java API Reference ......................................................................... 2-6</p><p>3 Oracle Crypto </p><p>3.1 About Oracle Crypto Features and Benefits ........................................................................... 3-13.1.1 About the Oracle Crypto Packages .................................................................................. 3-23.2 Setting Up Your Oracle Crypto Environment ........................................................................ 3-23.2.1 Understanding System Requirements for Oracle Crypto.............................................. 3-23.2.2 Setting the CLASSPATH Environment Variable ............................................................ 3-23.2.2.1 Setting the CLASSPATH on Windows...................................................................... 3-23.2.2.2 Setting the CLASSPATH on UNIX ........................................................................... 3-23.3 Understanding and Using Core Classes and Interfaces........................................................ 3-33.3.1 About the Key Classes ........................................................................................................ 3-33.3.1.1 The oracle.security.crypto.core.Key Interface .......................................................... 3-33.3.1.2 The oracle.security.crypto.core.PrivateKey Interface.............................................. 3-33.3.1.3 The oracle.security.crypto.core.PublicKey Interface ............................................... 3-33.3.1.4 The oracle.security.crypto.core.SymmetricKey Class ............................................. 3-33.3.2 Using the Key Generation Classes .................................................................................... 3-3</p></li><li><p>v</p><p>3.3.2.1 Using the oracle.security.crypto.core.KeyPairGenerator Class ............................. 3-43.3.2.2 Using the oracle.security.crypto.core.SymmetricKeyGenerator Class ................. 3-43.3.3 Using Cipher Classes........................................................................................................... 3-53.3.3.1 Using Symmetric Ciphers ........................................................................................... 3-53.3.3.2 Using the RSA Cipher.................................................................................................. 3-63.3.3.3 Using Password Based Encryption ............................................................................ 3-73.3.4 Using the Signature Classes ............................................................................................... 3-73.3.5 Using Message Digest Classes ........................................................................................... 3-83.3.5.1 Using the oracle.security.crypto.core.MessageDigest Class .................................. 3-83.3.5.2 Using the oracle.security.crypto.core.MAC Class ................................................... 3-93.3.6 Using the Key Agreement Class ........................................................................................ 3-93.3.7 Using Pseudo-Random Number Generator Classes .........................................</p></li></ul>