Learn about Replication Server support for third-party, network-based security mechanisms.
With network-based security, users are authenticated—the process of verifying that users are who they say they are—by the security system at login. They receive a credential that can be presented to remote servers in lieu of a password. As a result, users have seamless access to the components of the replication system through a single login.
Replication Server version 12 and later supports MIT Kerberos version 5 or later, CyberSafe Kerberos version 5 Security Server, and Transarc DCE version 1.1 Security Server. Depending on which of these security mechanisms you choose, you can select one or more of these features to secure data transmission:
Unified login – enables the user to log in to components of the replication system with a single credential issued by the security mechanism.
Confidentiality – enables the sending and receiving of encrypted data.
Integrity – ensures that data has not been tampered with.
Replay detection – verifies that data has not been intercepted.
Origin check – verifies the source of each data packet.
Out-of-sequence detection – checks that data packets are received in the order sent.
The security mechanism allows Replication Server to establish secure connections with other Replication Servers, with Adaptive Server, and with other data servers that support the Kerberos or DCE security mechanism and certain Replication Server requirements. You choose the method or methods to secure data transmission between them.