Security and Authentication in Autonomous Database

Autonomous Database stores all data in encrypted format in the Oracle Database. Only authenticated users and applications can access the data when they connect to the database.

Connections to Autonomous Database are made via SQL*Net. TCP and TCP with Secure Sockets Layer (SSL) security protocols are supported. TCP with SSL uses certificate-based authentication and SSL security protocol. This ensures that there is no unauthorized access to Autonomous Database and that communications between the client and server are fully encrypted and cannot be intercepted or altered.

Certificate based authentication uses an encrypted key stored in a wallet on both the client (where the application is running) and the server (where your database is running). The key on the client must match the key on the server to make a connection. A wallet contains a collection of files, including the key and other information needed to connect to your database. For more information on connections to Autonomous Database see About Connecting to a Dedicated Autonomous Database.

You do not need to do any manual configuration to encrypt your data and the connections to your database. These are implemented by Autonomous Database.

Autonomous Database uses strong password complexity rules for all users based on Oracle Cloud security standards. For more information on the password complexity rules see Create Database Users.