Margaret Rouse is an award-winning technical writer and teacher known for her ability to explain complex technical subjects simply to a non-technical, business audience. Over…
A credential store is a library of security data. A credential store can hold public key certificates, username and password combinations, or tickets.
Credentials are utilized at the time of authentication, when subjects are populated with principals, and also during authorization, when identifying the actions the subjects are able to perform.
Oracle Platform Security Services (OPSS) consists of the Credential Store Framework (CSF). The CSF is a collection of APIs that applications can utilize for creating, reading, updating, and managing credentials securely. A standard application of the credential store is the storage of credentials (user names and passwords) to gain access to some external systems, such as an LDAP-based repository or a database.
In the credential store framework (CSF), a credential is determined by a key name and a map name.
Usually, the map name corresponds to an application's name, and all credentials having the same map name outline a logical set of credentials, like the credentials utilized by the application. The combination of key name and map name should be unique for every entry in the credential store.
The default credential store is Oracle Wallet. For a production environment, an LDAP-based Oracle Internet Directory is ideal to be used as a credential store. Also, it is recommended to use Oracle Wallet for storing X.509 certificates.
The storage of end-user digital certificates are not supported by the credential stores. Furthermore, the credentials can be provisioned, recovered, customized, or erased, but only by a user with relevant administration rights.
In order to access the credential store and carry out the operations, the CSF API is used. The CSF includes the following features:
Techopedia’s editorial policy is centered on delivering thoroughly researched, accurate, and unbiased content. We uphold strict sourcing standards, and each page undergoes diligent review by our team of top technology experts and seasoned editors. This process ensures the integrity, relevance, and value of our content for our readers.
Margaret is an award-winning technical writer and teacher known for her ability to explain complex technical subjects to a non-technical business audience. Over the past twenty years, her IT definitions have been published by Que in an encyclopedia of technology terms and cited in articles by the New York Times, Time Magazine, USA Today, ZDNet, PC Magazine, and Discovery Magazine. She joined Techopedia in 2011. Margaret's idea of a fun day is helping IT and business professionals learn to speak each other’s highly specialized languages.
What is Differential Privacy? Differential privacy is a mathematical framework for determining a quantifiable and adjustable level of privacy protection....
Margaret RouseTechnology Expert
What are Tactics, Techniques, and Procedures (TTPs)? Tactics, techniques, and procedures (TTPs) are the strategic plans, methodologies, and actions an...
What is a Security Posture? Security posture definition refers to the ability an organization has to protect its information technology...
Trending NewsLatest GuidesReviewsTerm of the Day