EMS logo

Produkt Navigation

Data Pump for Oracle

Unsere Partnerschaften

Microsoft Certified Partner
Oracle Certified Partner
Embarcadero Technology Partner

EMS Data Pump for Oracle

Online Bedienungsanleitung

SSH tunneling options


SSH (Secure Shell Host) protocol is used to heighten computer security when working with Unix systems on the Internet. SSH uses several encryption algorithms of different reliability. The spread of SSH is also related to the fact that a number of *nix operating systems (e.g. FreeBSD) include SSH server in their standard distributions. To learn more about SSH, please visit http://openssh.org.

 

The SSH tunneling feature of Data Pump is a means of ensuring secure connection to Oracle servers when working over insecure connection channels. You can also use SSH tunnel to get access to the remote Oracle servers when port 3306 is closed for external connections for some reasons.

 

The connection via SSH tunnel works in the following way.

First, a connection is established and the process of authentication between SSH client built in Data Pump and remote Oracle server is performed. Then all incoming and outgoing information between the application and Oracle is transmitted through SSH server with the help of a communication port (regularly port 22), and SSH server transfers this information directly to Oracle server.

 

To setup the connection via SSH tunnel, input the following values in the corresponding fields:

  • SSH host name is the name of the host where SSH server is running
  • SSH port indicates the port where SSH server is activated
  • SSH user name stands for the user on the machine where SSH server is running (Note: it is a Linux/Windows user, not a user of Oracle server)
  • SSH password is the Linux/Windows user password

 

Appendix - SSH tunneling options

 

 

CheckBox Use Private Key for authentication

If the SSH encryption is enabled on the SSH server, a user can generate a pair of cryptographic keys (the Private key and the Public key). The Public key is placed on the SSH server, and the Private key is the part you keep secret inside a secure box that can only be opened with the correct passphrase (or an empty string as the passphrase). When you wish to access the remote system, you open the secure box with your passphrase (if any), and use the private key to authenticate yourself with the Public key on the remote Linux computer.

 

SSH Key file

Specify the location (the secure box) of the Private key file on your local machine.

Supported Private Key file formats are:

OpenSSH

Putty

SSH.com

Note that you need to trust your local machine not to scrape your passphrase or a copy of your Private key file while it is out of its secure box.

 

SSH Private Key - Passphrase