Oracle RDBMS 11g Standard Edition: Various Errors After Implementing Kerberos, Native Encryption, TCPS/SSL, or RADIUS
(Doc ID 1930944.1)
Last updated on MARCH 07, 2019
Applies to:Oracle Database Cloud Schema Service - Version N/A and later
Oracle Cloud Infrastructure - Database Service - Version N/A and later
Oracle Database Backup Service - Version N/A and later
Oracle Database Cloud Service - Version N/A and later
Oracle Database - Standard Edition - Version 184.108.40.206 to 220.127.116.11 [Release 11.2]
Information in this document applies to any platform.
Using Oracle Database Server 11gR2 Standard Edition,
after implementing various legacy Advanced Security Option (ASO) features (e.g. Kerberos, Native Encryption, TCPS/SSL, RADIUS),
various errors are received when connecting via the listener:
ORA-12657: No algorithms installed
ORA-12649: Unknown encryption or data integrity algorithm
ORA-12637: Packet receive failed
TNS-12557: TNS:protocol adapter not loadable
TNS-12560: TNS:protocol adapter error
TNS-00527: Protocol Adapter not loadable
The Oracle documentation specifies:
This is true from a licensing point of view. Technically, the 11gR2 Standard Edition (SE) binaries are not linked with SSL, Kerberos and Radius adapters; these adapters are not enabled out-of-the-box on 11gR2 Standard Edition.
To compare, here is the output from an 11gR2 Standard Edition installation running on Linux:
(Note the lines reading "Kerberos v5 authentication" and "RADIUS authentication", which do not appear in the Standard Edition output.)
To view full details, sign in with your My Oracle Support account.
Don't have a My Oracle Support account? Click to get started!
In this Document
Oracle Native Network Encryption: