Skip Headers
Oracle® Health Sciences Cohort Explorer Secure Installation and Configuration Guide
Release 1.0

E24988-02
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Index
Index
Go to Feedback page
Contact Us

Go to previous page
Previous
Go to next page
Next
PDF · Mobi · ePub

2 Installing the Oracle Health Sciences Cohort Explorer Schema

This chapter describes a secure installation of the Oracle Health Sciences Cohort Explorer (OHSCE) schema on either a Windows or Unix platform.

It includes the following sections:

The Master Install script is provided in the media pack.

A successful installation of the OHSCE schema creates the OHSCE data mart and seed data for OHSCE.

Security Guidelines for Database Objects and Database Options

This section describes Oracle Health Sciences Cohort Explorer database objects and database options.

About Oracle Health Sciences Cohort Explorer Database Objects

The Oracle Health Sciences Cohort Explorer contains database objects. Use DDL scripts and PL/SQL procedures and functions to create database objects; and DML scripts to create seed data.

While installing and configuring Oracle Database Server, follow the guidelines in Oracle® Database 2 Day + Security Guide 11g Release 2 (11.2).

Oracle Database Options

The Oracle Database has options that provide additional security features. Oracle Health Sciences Cohort Explorer may include data that falls under HIPAA guidelines in the United States and similar guidelines elsewhere. These features can help comply with those guidelines.

Database Vault

Oracle Health Sciences Cohort Explorer includes data that may fall under HIPAA or other regulations outside the United States. These data are highly sensitive and only those with a need to know should have access to it. To prevent DBAs and others from seeing the data, it is recommended that Oracle Database Vault be used to limit access to the HDWF schema to the HDWF user to prevent DBAs and other "superuser" accounts from accessing the data. Note that Database Vault requires a separate license.

Oracle Audit Vault

Oracle Audit Vault automates the audit collection, monitoring, and reporting process, turning audit data into a key security resource for detecting unauthorized activity. Consider using this feature to satisfy compliance regulations such as SOX, PCI, and HIPAA, and to mitigate security risks. Note that Oracle Audit Vault requires a separate license.

Transparent Data Encryption

Transparent Data Encryption is one of the three components of the Oracle Advanced Security option for Oracle Database 11g Release 2 Enterprise Edition. It provides transparent encryption of stored data to support your compliance efforts. If you employ Transparent Data Encryption, applications do not have to be modified and continue to work seamlessly as before. Data is automatically encrypted when it is written to disk and automatically decrypted when accessed by the application. Key management is built in, eliminating the complex task of creating, managing and securing encryption keys. Note that Transparent Data Encryption requires a separate license.

Prerequisites for Creating the Schema

You must ensure the following:

Installation Files

Installation requires the following files:

Installing the Schema

Install and verify the installation of the schema:

  1. Copy all the files listed in Installation Files to the database server. Ensure that the files are placed in the same folder.

    Important:

    You must install OHSCE on the same instance as the Oracle Health Sciences CDC database.
  2. Start SQLPLUS® in /nolog mode.

  3. Execute the install_cxe.sql script using following command.

      SQL>@install_cxe.sql  <CDM schema user name>
    < CDM schema user password>
    < Database Instance>
    < GTMETA user password >
    < SCESCHEMA user password > 
    < HDM schema user  name>
    < HDM schema user password>
    < Database Instance>
    < Index tablespace name>
    

    The script installs the OHSCE database, creates a view in the HDWF schema and then integrates OHSCE with the CDC schema.

  4. Review the install_cxe.log file that is created in the same folder after the installation.

  5. Log into each schema as the schema owner to verify that all packages, stored procedures, functions, triggers, and views are valid in each of the OHSCE,HDWF, SCESCHEMA and GTMETA schemas.

  6. Log in to SQL Developer with the OHSCE schema and verify the following:

    • All objects are created in the schema.

    • All records are correctly inserted into the C_LOAD_PARAM, C_LOAD_DATES, C_LOAD_DE_IDENTIFY and C_COHORT_PROCEDURE_TYPE tables.

  7. Log in to the HDWF schema and verify that the HDM_CD_REPOSITORY_HIER_V view is created there.