The Oracle PKI LDAP SDK Java API Reference Example Programs

Oracle PKI SDK 7-9 6. Click OK.

7.4.2.2.2 Setting the

CLASSPATH on Unix On Unix, set your CLASSPATH environment variable to include the full path and file name of all the required jar and class files. For example: setenv CLASSPATH CLASSPATH:ORACLE_HOMEmodulesoracle.osdt_11.1.1osdt_core.jar: ORACLE_HOMEmodulesoracle.osdt_11.1.1osdt_cert.jar: ORACLE_HOMEmodulesoracle.osdt_11.1.1osdt_ldap.jar

7.4.3 The Oracle PKI LDAP SDK Java API Reference

The Oracle PKI LDAP SDK Java API reference Javadoc is available at: Oracle Fusion Middleware PKI SDK LDAP Java API Reference for Oracle Security Developer Tools

7.4.4 Example Programs

For example programs using the Oracle Security Developer Tools, see the Oracle Technology Network Web Site at http:www.oracle.comtechnologysample_codeproductsid_ mgmtindex.html . 7-10 Oracle Fusion Middleware Reference for Oracle Security Developer Tools 8 Oracle XML Security 8-1 8 Oracle XML Security XML security refers to standard security requirements of XML documents such as confidentiality, integrity, message authentication, and non-repudiation. The need for digital signature and encryption standards for XML documents prompted the World Wide Web Consortium W3C to put forth an XML Signature standard and an XML Encryption standard. This chapter describes key features and benefits of Oracle XML Security, and explains how to set up your environment to use Oracle XML Security. This chapter contains these topics: ■ Oracle XML Security Features and Benefits ■ Setting Up Your Oracle XML Security Environment ■ How Data is Signed ■ How Data is Verified ■ How Data is Encrypted ■ How Data is Decrypted ■ About Element Wrappers in the Oracle Security Developer Tools XML APIs ■ How to Sign Data with the Oracle XML Security API ■ How to Verify Signatures with the Oracle XML Security API ■ How to Encrypt Data with the Oracle XML Security API ■ How to Decrypt Data with the Oracle XML Security API ■ Common XML Security Questions ■ Best Practices ■ The Oracle XML Security Java API Reference ■ Example Programs See Also: The following resources provide more information about XML and XML standards: ■ W3Cs Recommendation for XML Signatures ■ W3Cs Recommendation for XML Encryption Links to these resources are available in Appendix A, References . 8-2 Oracle Fusion Middleware Reference for Oracle Security Developer Tools

8.1 Oracle XML Security Features and Benefits

Oracle Security Developer Tools provide a complete implementation of XML Signature and XML Encryption specification.

8.1.1 Supported Algorithms

Oracle Security Developer Tools provide a complete implementation of the XML Signature and XML Encryption specifications, and support these algorithms: Signature Algorithms ■ DSA with SHA1 ■ RSA with SHA1 ■ HMAC-SHA1 Digest Algorithms ■ MD5 ■ SHA1 ■ SHA256 ■ SHA512 Transforms ■ Canonicalization – Canonical XML 1.0, Canonical XML 1.1, exclusive Canonical XML 1.0, all forms are supported with and without comments ■ XSLT ■ XPath Filter ■ XPath Filter 2.0 ■ Base64 Decode ■ Enveloped Signature ■ Decrypt Transform Data Encryption Algorithms ■ AES-128 in CBC mode ■ AES-192 in CBC mode ■ AES-256 in CBC mode ■ DES EDE in CBC mode Key Encryption and Key Wrapping Algorithms ■ RSAES-OAEP-ENCRYPT with MGF1 ■ RSAES-PKCS1-v1_5 ■ AES-128 Key Wrap ■ AES-192 Key Wrap ■ AES-256 Key Wrap ■ DES-EDE Key Wrap