Part V describes how to manage strong authentication.
Introduction to Strong Authentication
Strong authentication supports tools such as Secure Sockets Layer (SSL) to verify the identities of users who log in to the database.
Strong Authentication Administration Tools
You can use a set of strong authentication administration tools for network encryption and public key infrastructure credentials.
Configuring Kerberos Authentication
Kerberos is a trusted third-party authentication system that relies on shared secrets and presumes that the third party is secure.