Go to main content
1/8
Contents
Title and Copyright Information
Preface
Documentation Accessibility
Related Documentation
1
Overview
Oracle Key Manager Overview
General Security Principles
2
Secure Installation and Configuration
Understanding Your Environment
Recommended Deployment Topologies
Installing a Key Management Appliance
Installing a KMA in a Rack
Securing the ILOM of a KMA
Securing the OpenBoot PROM or BIOS of a KMA
Configuring the First KMA in an OKM Cluster
Considerations When Defining Key Split Credentials
Considerations When Defining Additional OKM Users
Adding Additional KMAs to the OKM Cluster
Considerations When Configuring KMAs
Characteristics of Hardened KMAs
TCP/IP Connections and the KMA
3
Security Features
Potential Threats
Objectives of the Security Features
Primary Security Features
Authentication
Access Control
Users and Role-Based Access Control
Quorum Protection
Audits
Other Security Features
Secure Communication
Hardware Security Module
AES Key Wrapping
Key Replication
Solaris FIPS 140-2 Security Policies
Software Upgrades
Remote Syslog
Hardware Management Pack
4
Encryption Endpoints
Encryption Endpoint Tools
KMS PKCS#11 Provider
OKM JCE Provider
Management Endpoints
OKM Plug-in for Oracle Enterprise Manager
A
Secure Deployment Checklist
Scripting on this page enhances content navigation, but does not change the content in any way.