Prerequisites

Before configuring your Oracle AI Database@Azure environment, it is necessary to understand the prerequisites for your selected encryption method.

Oracle AI Database@Azure provides two primary approaches for transparent data encryption (TDE):
  1. Oracle-managed Key (OMK)
    • Oracle Wallet
  2. Customer-managed Key (CMK)
    • OCI Vault
    • Oracle Key Vault (OKV)
    • Azure Key Vault (AKV)

This section explains the required prerequisites to configure your Oracle AI Database@Azure.

  • Oracle-Managed Keys (OMK) are the default method for securing data encryption in Oracle AI Database@Azure. In Oracle AI Database, data encryption at rest is enabled by transparent data encryption (TDE). When you choose Oracle-Managed Keys, the database system automatically manages all key operations, including key generation, secure storage, and rotation required by TDE. There are no prerequisites or additional configuration steps required to use Oracle-Managed Keys in Oracle AI Database@Azure.

  • There is currently no content for this page. The Oracle AI Database@Azure team intends to add content here, and this placeholder text is provided until that text is added.

    The Oracle AI Database@Azure team is excited about future new features, enhancements, and fixes to this product and this accompanying documentation. We strongly recommend you watch this page for those updates.

  • There is currently no content for this page. The Oracle AI Database@Azure team intends to add content here, and this placeholder text is provided until that text is added.

    The Oracle AI Database@Azure team is excited about future new features, enhancements, and fixes to this product and this accompanying documentation. We strongly recommend you watch this page for those updates.

  • Oracle AI Database@Azure now supports integration with Azure Key Vault. This capability allows you to manage transparent data encryption (TDE) master encryption keys (MEKs) using Azure Key Vault. Previously, TDE master encryption keys can only be stored in a file-based Oracle Wallet, Oracle Cloud Infrastructure (OCI) Vault, or Oracle Key Vault (OKV).

    With this update, you can now store and manage CMKs directly in Azure Key Vault , providing improved key lifecycle control and alignment with your organization’s security policies. To configure Azure Key Vault to encrypt your database, complete the following prerequisite steps.
    1. Create an Azure Key Vault
      1. From the Azure portal, select Key vaults.
      2. Select the Create button.
      3. From the Basics tab of the Create a key vault flow, enter the following information.
        1. From the dropdown list, select your Subscription that you want to use, and then select the Resource group.
        2. Enter a descriptive name in the Key vault name field. The Key vault name must only contain alphanumeric characters and dashes and cannot start with a number. A vault's name must be between 3-24 alphanumeric characters. The name must begin with a letter, end with a letter or digit, and not contain consecutive hyphens.
        3. Select the Region where you want to deploy the key vault.
        4. From the dropdown list, select Pricing tier.
        5. From the Recovery options section, enter the value in the Days to retain deleted vaults field. It can be configured to between 7 to 90 days. Once it has been set, it cannot be changed or removed.
        6. Choose your Purge protection based on your requirements.
        7. Select the Next button.This screenshot shows how to create a key vault.
      4. From the Access configuration tab of the Create a key vault flow, enter the following information.
        1. Choose the Vault access policy option as your Permission model. This option enable you to create users the required permissions.
        2. Choose the Resource access based on your requirementa.
        3. Select the Next button.This screenshot shows how to create a key vault.
      5. From the Networking tab of the Create a key vault flow, enter the following information.
        1. The Enable public access is selected by default. With this option, you can connect to this key vault either publicly, via public IP addresses or service endpoints, or privately, using a private endpoint.
        2. From the Public access section, if you select the Selected networksoption, only networks you choose can access this key vault. If you select the All networks option, traffic from all public networks can access this resource. This is not recommended for private applications or environments.
        3. Under the Private endpoint section, select the + Create a private endpoint button.
          1. From the dropdown list, select your Subscription that you want to use, and then select the Resource group.
          2. Select the Location where you want to create the key vault and the private endpoint.
          3. Enter a descriptive Name for your private endpoint. The name must begin with a letter or number, end with a letter, number or underscore, and may contain only letters, numbers, underscores, periods, or hyphens.
          4. Select Vault as the Target sub-resource.
          5. From the Networking section, select Virtual network and Subnet
          6. In the Private DNS integration section, the Integrate with private DNS zone option is enabled. From the dropdown list, you must select Private DNS Zone.
          7. Select the OK button to save the changes.
          This screenshot shows how to create a key vault.
      6. From the Tags tab of the Create a key vault flow, you can categorize resources. This section is optional.
      7. From the Review + create tab of the Create a key vault flow, you can check the values that you entered from the previous steps. If the validation fails, you must correct any errors before you can start the provisioning process.
      Note

      • Azure Key Vault is only supported in commercial regions.
      • Azure Key Vault is not supported in cross-region Autonomous Data Guard standbys.
    2. Create a Key on Azure Key Vault
      1. From the Azure portal, select Key vaults, and then select the key vault you created in the step 1.
      2. From the left menu, expand the Objects section, and then select Keys.
      3. Select the + Generate/Import button to create a key.
        1. Select the Generate option as your Options.
        2. Enter a descriptive Name for the key. Key names can only contain alphanumeric characters and dashes. The value you provide may be copied globally for the purpose of running the service. The value provided should not include personally identifiable or sensitive information.
        3. Choose the RSA option as your Key type.
        4. Choose the 2048 option as your RSA key size.
        5. If you want to set activation date, select the Set activation date checkbox,, and enter the required information.
        6. If you want to set expiration date, select the Set expiration date checkbox, and enter the required information.
        7. For the Enabled option, select Yes.
        8. Select the Create button to save the changes.This screenshot shows how to create a key vault.
      Note

      • Supported key shapes and sizes are the following:
        • RSA 2048, 3072, and 4096
        • EC-P256, EC-P256K, EC-P384, EC-P521
      • To connect to Azure Key Vault private endpoint from the same VNet, you must activate Advanced Network. For more information, see Delegated Subnet.
    3. Obtain the Azure Key Vault URI
      1. From the Azure portal, select Key vaults, and then select the Name field of the key vault that you want to use.
      2. From the left menu, select Overview, and then note of the Vault URI.This screenshot shows how to obtain Azure Key Vault URI.