Oracle NoSQL Database Security Guide

Legal Notice

Copyright © 2011, 2012, 2013, 2014, 2015 Oracle and/or its affiliates. All rights reserved.

This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited.

The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing.

If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable:

U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government.

This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherently dangerous applications, including applications that may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerous applications.

Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.

Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group.

This software or hardware and documentation may provide access to or information on content, products, and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content, products, and services. Oracle Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services.

4/24/2015


Table of Contents

Preface
Conventions Used in This Book
1. Introducing Oracle NoSQL Database Security
2. Security Configuration
Security Configuration Overview
Configuring Security with Makebootconfig
Configuring Security with Securityconfig
Creating the security configuration
Adding the security configuration
Removing the security configuration
Merging truststore configuration
3. Performing a Secure Oracle NoSQL Database Installation
Single Node Secure Deployment
Adding Security to a New Installation
Adding Security to an Existing Installation
Multiple Node Secure Deployment
Adding Security to a New Installation
Adding Security to an Existing Installation
4. External Password Storage
Oracle Wallet
Password store file
5. Security.xml parameters
Top-level parameters
Transport parameters
6. Encryption
SSL model
SSL communication properties
7. Configuring Authentication
User Management
User Creation
User Modification
User Removal
User Status
User Login
Password Management
Sessions
8. Configuring Authorization
Privileges
System Privileges
Object Privileges
Table Ownership
Privilege Hierarchy
Roles
System Built-in Roles
User-Defined Roles
Managing Roles, Privileges and Users
Role Creation
Role Removal
Role Status
Grant Roles or Privileges
Revoke Roles or Privileges
9. Security Policies
Security Policy Modifications
10. Audit Logging
Security Log Messages
11. Keeping Oracle NoSQL Database Secure
Guidelines for Securing the Configuration
Guidelines for Deploying Secure Applications
Guidelines for Securing the SSL protocol
Guidelines for using JMX securely
Guidelines for Updating Keystore Passwords
Guidelines for Updating the SSL key/certificate
Guidelines for Operating System Security
A. SSL keystore generation
B. KVStore Required Privileges
Privileges for Accessing CLI Commands
Privileges for DDL Commands
Privileges for Accessing KVStore APIs
Privileges for Accessing KVStore TableAPIs
Privileges for Accessing KvLargeObject APIs
C. Third Party Licenses