Table of Contents
- Title and Copyright Information
 - Preface
 - Changes in This Release for Oracle Key Vault
 - 
               
               
                  
                  1
                       Introduction to Oracle Key Vault 
               
                  
               
               
               
- 1.1 About Oracle Key Vault and Key Management
 - 1.2 Benefits of Using Oracle Key Vault
 - 1.3 Oracle Key Vault Use Cases
 - 1.4 Who Should Use Oracle Key Vault
 - 
                     
                     
                        
                        1.5
                            Major Features of Oracle Key Vault
                     
                        
                     
                     
                     
- 1.5.1 Centralized Storage and Management of Security Objects
 - 1.5.2 Management of Key Lifecycle
 - 1.5.3 Reporting and Alerts
 - 1.5.4 Separation of Duties for Oracle Key Vault Users
 - 1.5.5 Support for a Primary-Standby Environment
 - 1.5.6 Persistent Master Encryption Key Cache
 - 1.5.7 Backup and Restore Functionality for Security Objects
 - 1.5.8 Automation of Endpoint Enrollment Using RESTful Services
 - 1.5.9 Key Management Support Using RESTful Services
 - 1.5.10 Support for OASIS Key Management Interoperability Protocol (KMIP)
 - 1.5.11 Database Release and Platform Support
 - 1.5.12 Integration with External Audit and Monitoring Services
 - 1.5.13 Integration of MySQL with Oracle Key Vault
 - 1.5.14 Automatic Storage Management Cluster File System (ACFS) Encryption
 - 1.5.15 Support for Oracle Cloud Database as a Service Endpoints
 - 1.5.16 Oracle Key Vault Hardware Security Module Integration
 
 - 1.6 Oracle Key Vault Interfaces
 - 1.7 Overview of an Oracle Key Vault Deployment
 
 - 
               
               
                  
                  2
                      Oracle Key Vault Concepts 
               
                  
               
               
               
- 2.1 Overview of Oracle Key Vault Concepts
 - 2.2 Oracle Key Vault Deployment Architecture
 - 2.3 Access Control Configuration
 - 2.4 Administrative Roles within Oracle Key Vault
 - 2.5 Naming Guidelines for Objects
 - 2.6 Emergency System Recovery Process
 - 2.7 Root and Support User Accounts
 - 2.8 Endpoint Administrators
 - 2.9 FIPS Mode
 
 - 
               
               
                  
                  3
                      Oracle Key Vault Multi-Master Cluster Concepts
               
                  
               
               
               
- 3.1 Oracle Key Vault Multi-Master Cluster Overview
 - 3.2 Benefits of Oracle Key Vault Multi-Master Clustering
 - 
                     
                     
                        
                        3.3
                            Multi-Master Cluster Architecture
                     
                        
                     
                     
                     
- 3.3.1 Oracle Key Vault Cluster Nodes
 - 3.3.2 Cluster Node Limitations
 - 3.3.3 Cluster Subgroups
 - 3.3.4 Critical Data in Oracle Key Vault
 - 3.3.5 Oracle Key Vault Read-Write Nodes
 - 3.3.6 Oracle Key Vault Read-Only Nodes
 - 3.3.7 Cluster Node Mode Types
 - 3.3.8 Operations Permitted on Cluster Nodes in Different Modes
 
 - 3.4 Building and Managing a Multi-Master Cluster
 - 3.5 Oracle Key Vault Multi-Master Cluster Deployment Scenarios
 - 3.6 Multi-Master Cluster Features
 
 - 
               
               
                  
                  4
                      Oracle Key Vault Installation and Configuration
               
                  
               
               
               
- 4.1 About Oracle Key Vault Installation and Configuration
 - 4.2 Oracle Key Vault Installation Requirements
 - 4.3 Installing and Configuring Oracle Key Vault
 - 4.4 Logging In to the Oracle Key Vault Management Console
 - 
                     
                     
                        
                        4.5
                            Upgrading a Standalone or Primary-Standby Oracle Key Vault Server
                     
                        
                     
                     
                     
- 4.5.1 About Upgrading the Oracle Key Vault Server Software
 - 4.5.2 Step 1: Back Up the Server Before You Upgrade
 - 4.5.3 Step 2: Perform Pre-Upgrade Tasks
 - 4.5.4 Step 3: Upgrade the Oracle Key Vault Server or Server Pair
 - 4.5.5 Step 4: Upgrade the Endpoint Software
 - 4.5.6 Step 5: If Necessary, Remove Old Kernels
 - 4.5.7 Step 6: If Necessary, Add Disk Space to Extend Swap Space
 - 4.5.8 Step 7: If Necessary, Remove SSH-Related DSA Keys
 - 4.5.9 Step 8: Back Up the Upgraded Oracle Key Vault Server
 
 - 
                     
                     
                        
                        4.6
                            Upgrading Oracle Key Vault in a Multi-Master Cluster Environment
                     
                        
                     
                     
                     
- 4.6.1 About Upgrading Oracle Key Vault in a Multi-Master Cluster Environment
 - 4.6.2 Step 1: Perform Pre-Upgrade Tasks
 - 4.6.3 Step 2: If Upgrading from Release 18.1, Run the Pre-Upgrade Script on Each Node
 - 4.6.4 Step 3: Upgrade Each Multi-Master Cluster Node
 - 4.6.5 Step 4: Check the Node Version and the Cluster Version
 - 4.6.6 Rolling Back the Pre-Upgrade Script
 
 - 4.7 Overview of the Oracle Key Vault Management Console
 - 4.8 Performing Actions and Searches
 
 - 
               
               
                  
                  5
                      Managing Oracle Key Vault Multi-Master Clusters
               
                  
               
               
               
- 5.1 About Managing Oracle Key Vault Multi-Master Clusters
 - 5.2 Creating the First (Initial) Node of a Cluster
 - 5.3 Adding a Node to the Cluster
 - 5.4 Terminating the Pairing of a Node
 - 5.5 Disabling a Cluster Node
 - 5.6 Enabling a Disabled Cluster Node
 - 5.7 Deleting a Cluster Node
 - 5.8 Force Deleting a Cluster Node
 - 5.9 Managing Replication Between Nodes
 - 5.10 Cluster Management Information
 - 5.11 Cluster Monitoring Information
 - 5.12 Naming Conflicts and Resolution
 - 5.13 Multi-Master Cluster Deployment Recommendations
 
 - 
               
               
                  
                  6
                      Managing an Oracle Key Vault Primary-Standby Configuration
               
                  
               
               
               
- 
                     
                     
                        
                        6.1
                            Overview of the Oracle Key Vault Primary-Standby Configuration
                     
                        
                     
                     
                     
- 6.1.1 About the Oracle Key Vault Primary-Standby Configuration
 - 6.1.2 Benefits of an Oracle Key Vault Primary-Standby Configuration
 - 6.1.3 Difference Between Primary-Standby Configuration and Multi-Master Cluster
 - 6.1.4 Primary Server Role in a Primary-Standby Configuration
 - 6.1.5 Standby Server Role in a Primary-Standby Configuration
 
 - 6.2 Configuring the Primary-Standby Environment
 - 6.3 Switching the Primary and Standby Servers
 - 6.4 Restoring Primary-Standby After a Failover
 - 6.5 Disabling (Unpairing) the Primary-Standby Configuration
 - 
                     
                     
                        
                        6.6
                            Read-Only Restricted Mode in a Primary-Standby Configuration
                     
                        
                     
                     
                     
- 6.6.1 About Read-Only Restricted Mode in a Primary-Standby Configuration
 - 6.6.2 Primary-Standby with Read-Only Restricted Mode
 - 6.6.3 Primary-Standby without Read-Only Restricted Mode
 - 6.6.4 States of Read-Only Restricted Mode
 - 6.6.5 Enabling Read-Only Restricted Mode
 - 6.6.6 Disabling Read-Only Restricted Mode
 - 6.6.7 Recovering from Read-Only Restricted Mode
 - 6.6.8 Read-Only Restricted Mode Notifications
 
 - 6.7 Best Practices for Using Oracle Key Vault in a Primary-Standby Configuration
 
 - 
                     
                     
                        
                        6.1
                            Overview of the Oracle Key Vault Primary-Standby Configuration
                     
                        
                     
                     
                     
 - 
               
               
                  
                  7
                      Managing Oracle Key Vault Users 
               
                  
               
               
               
- 7.1 Managing User Accounts
 - 7.2 Managing Administrative Roles and User Privileges
 - 7.3 Managing User Passwords
 - 7.4 Managing User Email
 - 
                     
                     
                        
                        7.5
                            Managing User Groups
                     
                        
                     
                     
                     
- 7.5.1 About Managing User Groups
 - 7.5.2 How a Multi-Master Cluster Affects User Groups
 - 7.5.3 Creating a User Group
 - 7.5.4 Adding a User to a User Group
 - 7.5.5 Granting a User Group Access to a Virtual Wallet
 - 7.5.6 Renaming a User Group
 - 7.5.7 Changing a User Group Description
 - 7.5.8 Removing a User from a User Group
 - 7.5.9 Deleting a User Group
 
 
 - 8 Managing Oracle Key Vault Virtual Wallets and Security Objects
 - 
               
               
                  
                  9
                      Managing Oracle Key Vault Endpoints
               
                  
               
               
               
- 9.1 Overview of Managing Endpoints
 - 9.2 Managing Endpoints
 - 9.3 Managing Endpoint Details
 - 9.4 Default Wallets and Endpoints
 - 9.5 Managing Endpoint Access to a Virtual Wallet
 - 
                     
                     
                        
                        9.6
                            Managing Endpoint Groups
                     
                        
                     
                     
                     
- 9.6.1 How a Multi-Master Cluster Affects Endpoint Groups
 - 9.6.2 Creating an Endpoint Group
 - 9.6.3 Modifying Endpoint Group Details
 - 9.6.4 Granting an Endpoint Group Access to a Virtual Wallet
 - 9.6.5 Adding an Endpoint to an Endpoint Group
 - 9.6.6 Removing an Endpoint from an Endpoint Group
 - 9.6.7 Deleting Endpoint Groups
 
 - 9.7 Upgrading Endpoints
 
 - 
               
               
                  
                  10
                      Enrolling Endpoints for Oracle Key Vault 
               
                  
               
               
               
- 10.1 About Endpoint Enrollment and Provisioning
 - 10.2 Finalizing Enrollment and Provisioning
 - 10.3 Environment Variables and Endpoint Provisioning Guidance
 - 10.4 Endpoints That Do Not Use the Oracle Key Vault Client Software
 - 10.5 Transparent Data Encryption Endpoint Management
 - 10.6 Endpoint okvclient.ora Configuration File
 
 - 
               
               
                  
                  11
                      Deploying Oracle Key Vault on an Oracle Cloud Infrastructure VM Compute Instance
               
                  
               
               
               
- 11.1 About Deploying Oracle Key Vault on an Oracle Cloud Infrastructure Compute Instance
 - 11.2 Benefits of Using Oracle Key Vault in Oracle Cloud Infrastructure
 - 
                     
                     
                        
                        11.3
                            Provisioning an Oracle Key Vault Compute Instance
                     
                        
                     
                     
                     
- 11.3.1 About Provisioning an Oracle Key Vault Compute Instance
 - 
                           
                           
                              
                              11.3.2
                                  Launching the Oracle Key Vault Compute Instance
                           
                              
                           
                           
                           
- 11.3.2.1 About Launching the Oracle Key Vault Compute Instance
 - 11.3.2.2 Step 1: Ensure That You Have Prerequisites in Place
 - 11.3.2.3 Step 2: Find the Oracle Key Vault Image
 - 11.3.2.4 Step 3: Launch the Oracle Key Vault VM Compute Instance
 - 11.3.2.5 Step 4: Perform Post-Launch and Post-Installation Tasks
 
 
 - 11.4 General Management of an Oracle Key Vault Compute Instance
 - 11.5 Migrating Oracle Key Vault Deployments Between On-Premises and OCI
 
 - 
               
               
                  
                  12
                      Oracle Database Instances in Oracle Cloud Infrastructure
               
                  
               
               
               
- 12.1 About Managing Oracle Cloud Infrastructure Database Instance Endpoints
 - 12.2 Preparing a Database Instance on OCI to be an Oracle Key Vault Endpoint
 - 
                     
                     
                        
                        12.3
                            Using an SSH Tunnel Between Oracle Key Vault and Database as a Service
                     
                        
                     
                     
                     
- 12.3.1 Creating an SSH Tunnel Between Oracle Key Vault and a DBaaS Instance
 - 12.3.2 Managing a Reverse SSH Tunnel in a Multi-Master Cluster
 - 12.3.3 Managing a Reverse SSH Tunnel in a Primary-Standby Configuration
 - 12.3.4 Viewing SSH Tunnel Configuration Details
 - 12.3.5 Disabling an SSH Tunnel Connection
 - 12.3.6 How the Connection Works if the SSH Tunnel Is Not Active
 - 12.3.7 Deleting an SSH Tunnel Configuration
 
 - 
                     
                     
                        
                        12.4
                            Registering and Enrolling a Database as a Service Instance as an Oracle Key Vault Endpoint
                     
                        
                     
                     
                     
- 12.4.1 About Registering and Enrolling a Database as a Service Instance as an Oracle Key Vault Endpoint
 - 12.4.2 Step 1: Register the Endpoint in the Oracle Key Vault Management Console
 - 12.4.3 Step 2: Prepare the Endpoint Environment
 - 12.4.4 Step 3: Install the Oracle Key Vault Software onto the Endpoint
 - 12.4.5 Step 4: Perform Post-Installation Tasks
 
 - 12.5 Suspending Database Cloud Service Access to Oracle Key Vault
 - 12.6 Resuming Database Cloud Service Access to Oracle Key Vault
 - 12.7 Resuming a Database Endpoint Configured with a Password-Based Keystore
 
 - 
               
               
                  
                  13
                      Oracle Key Vault Administration and Key Management with RESTful Services 
               
                  
               
               
               
- 13.1 About RESTful Services
 - 13.2 Required Privileges for Using RESTful Services
 - 13.3 Enabling RESTful Services
 - 
                     
                     
                        
                        13.4
                            Managing the RESTful Services Configuration File
                     
                        
                     
                     
                     
- 13.4.1 About Managing the RESTful Services Configuration File
 - 13.4.2 Configuration File Creation Guidelines
 - 13.4.3 Creating the RESTful Services Configuration File
 - 13.4.4 Examples of Configuration Files
 - 13.4.5 Executing a Single RESTful Command
 - 13.4.6 Executing Multiple RESTful Administrative Commands Using a Script
 - 13.4.7 Creating a Script to Automatically Enroll Oracle Databases as Endpoints
 
 - 13.5 Disabling RESTful Services
 - 
                     
                     
                        
                        13.6
                            Oracle Key Vault Administrative REST Client Tool Commands
                     
                        
                     
                     
                     
- 13.6.1 RESTful Services Command Syntax
 - 13.6.2 RESTful Services Wallet Command Syntax
 - 
                           
                           
                              
                              13.6.3
                                  Commands to Add and Enroll Endpoints 
                           
                              
                           
                           
                           
- 13.6.3.1 create_endpoint Command
 - 13.6.3.2 create_unique_endpoint Command
 - 13.6.3.3 delete_endpoint Command
 - 13.6.3.4 download Command
 - 13.6.3.5 get_enrollment_token Command
 - 13.6.3.6 modify_endpoint_desc Command
 - 13.6.3.7 modify_endpoint_email Command
 - 13.6.3.8 modify_endpoint_name Command
 - 13.6.3.9 modify_endpoint_platform Command
 - 13.6.3.10 modify_endpoint_type Command
 - 13.6.3.11 provision Command
 - 13.6.3.12 re_enroll Command
 - 13.6.3.13 re_enroll_all Command
 
 - 13.6.4 Endpoint Group Commands
 - 
                           
                           
                              
                              13.6.5
                                  Virtual Wallet Commands
                           
                              
                           
                           
                           
- 13.6.5.1 add_wallet_access_ep Command
 - 13.6.5.2 add_wallet_access_epg Command
 - 13.6.5.3 create_unique_wallet Command
 - 13.6.5.4 create_wallet Command
 - 13.6.5.5 delete_wallet Command
 - 13.6.5.6 drop_wallet_access_ep Command
 - 13.6.5.7 drop_wallet_access_epg Command
 - 13.6.5.8 get_default_wallet Command
 - 13.6.5.9 get_object_name Command
 - 13.6.5.10 get_wallets Command
 - 13.6.5.11 modify_wallet_access_ep Command
 - 13.6.5.12 modify_wallet_access_epg Command
 - 13.6.5.13 modify_wallet_desc Command
 - 13.6.5.14 modify_wallet_name Command
 - 13.6.5.15 set_default_wallet Command
 
 - 13.6.6 Error Reporting
 - 13.6.7 Status and Help Information Commands
 
 - 
                     
                     
                        
                        13.7
                            Oracle Key Vault Key Management REST Client Tool Commands
                     
                        
                     
                     
                     
- 13.7.1 About Oracle Key Vault Key Management REST Client Tool Commands
 - 13.7.2 Oracle Key Vault Key Management REST Client API Using OKVRESTSERVICE
 - 13.7.3 List of Key Management REST Client Tool Commands
 - 13.7.4 Key Creation and Registration Commands
 - 13.7.5 Key Attribute Management Commands
 - 13.7.6 Key Life Cycle Management Commands
 - 13.7.7 Wallet Commands
 
 
 - 
               
               
                  
                  14
                      Backup and Restore Operations
               
                  
               
               
               
- 14.1 About Backing Up and Restoring Data in Oracle Key Vault
 - 14.2 Oracle Key Vault Backup Destinations
 - 14.3 Backup Schedules and States
 - 14.4 Scheduling and Managing Oracle Key Vault Backups
 - 
                     
                     
                        
                        14.5
                            Restoring Oracle Key Vault Data
                     
                        
                     
                     
                     
- 14.5.1 About the Oracle Key Vault Restore Process
 - 14.5.2 Procedure for Restoring Oracle Key Vault Data
 - 14.5.3 Multi-Master Cluster and the Restore Operation
 - 14.5.4 Primary-Standby and the Restore Operation
 - 14.5.5 Third-Party Certificates and the Restore Operation
 - 14.5.6 Changes Resulting from a System State Restore
 
 - 14.6 Backup and Restore Best Practices
 
 - 
               
               
                  
                  15
                      Oracle Key Vault General System Administration
               
                  
               
               
               
- 15.1 Overview of Oracle Key Vault General System Administration
 - 
                     
                     
                        
                        15.2
                            Configuring Oracle Key Vault in a Non-Multi-Master Cluster Environment
                     
                        
                     
                     
                     
- 15.2.1 Configuring the Network Details
 - 15.2.2 Configuring the Network Services
 - 15.2.3 Configuring the System Time
 - 15.2.4 Configuring DNS
 - 15.2.5 Configuring FIPS Mode
 - 15.2.6 Configuring Syslog
 - 15.2.7 Configuring RESTful Services
 - 15.2.8 Configuring Oracle Audit Vault Integration
 - 15.2.9 Configuring the Oracle Key Vault Management Console Web Session Timeout
 - 15.2.10 Restarting or Powering Off Oracle Key Vault
 
 - 
                     
                     
                        
                        15.3
                            Configuring Oracle Key Vault in a Multi-Master Cluster Environment
                     
                        
                     
                     
                     
- 
                           
                           
                              
                              15.3.1
                                  Configuring System Settings for Individual Multi-Master Cluster Nodes
                           
                              
                           
                           
                           
- 15.3.1.1 Configuring the Network Details for the Node
 - 15.3.1.2 Configuring the Network Services for the Node
 - 15.3.1.3 Configuring the System Time for the Node
 - 15.3.1.4 Configuring DNS for the Node
 - 15.3.1.5 Configuring the FIPS Mode for the Node
 - 15.3.1.6 Configuring Syslog for the Node
 - 15.3.1.7 Configuring Oracle Audit Vault Integration for the Node
 - 15.3.1.8 Restarting or Powering Off Oracle Key Vault from a Node
 
 - 
                           
                           
                              
                              15.3.2
                                  Managing Oracle Key Vault Multi-Master Clusters
                           
                              
                           
                           
                           
- 15.3.2.1 About Configuring Cluster System Settings
 - 15.3.2.2 Configuring the System Time for the Cluster
 - 15.3.2.3 Configuring DNS for the Cluster
 - 15.3.2.4 Configuring Maximum Disable Node Duration for the Cluster
 - 15.3.2.5 Configuring RESTful Services for the Cluster
 - 15.3.2.6 Configuring Syslog for the Cluster
 - 15.3.2.7 Configuring SNMP Settings for the Cluster
 - 15.3.2.8 Configuring the Oracle Key Vault Management Console Web Session Timeout for the Cluster
 
 
 - 
                           
                           
                              
                              15.3.1
                                  Configuring System Settings for Individual Multi-Master Cluster Nodes
                           
                              
                           
                           
                           
 - 15.4 Managing System Recovery
 - 15.5 Support for a Primary-Standby Environment
 - 
                     
                     
                        
                        15.6
                            Commercial National Security Algorithm Suite Support
                     
                        
                     
                     
                     
- 15.6.1 About Commercial National Security Algorithm Suite Support
 - 15.6.2 Running the Commercial National Security Algorithm Scripts
 - 15.6.3 Performing Backup and Restore Operations with CNSA
 - 15.6.4 Upgrading a Standalone Oracle Key Vault Server with CNSA
 - 15.6.5 Upgrading Primary-Standby Oracle Key Vault Servers to Use CNSA
 
 - 15.7 Minimizing Downtime
 
 - 16 Managing Certificates
 - 
               
               
                  
                  17
                      Monitoring and Auditing Oracle Key Vault
               
                  
               
               
               
- 
                     
                     
                        
                        17.1
                            Managing System Monitoring
                     
                        
                     
                     
                     
- 
                           
                           
                              
                              17.1.1
                                  Configuring Remote Monitoring to Use SNMP
                           
                              
                           
                           
                           
- 17.1.1.1 About Using SNMP for Oracle Key Vault
 - 17.1.1.2 Granting SNMP Access to Users
 - 17.1.1.3 Changing the SNMP User Name and Password
 - 17.1.1.4 Changing SNMP Settings on the Standby Server
 - 17.1.1.5 Remotely Monitoring Oracle Key Vault Using SNMP
 - 17.1.1.6 SNMP Management Information Base Variables for Oracle Key Vault
 - 17.1.1.7 Example: Simplified Remote Monitoring of Oracle Key Vault Using SNMP
 
 - 17.1.2 Configuring Email Notification
 - 17.1.3 Configuring the Syslog Destination for Individual Multi-Master Cluster Nodes
 - 17.1.4 Capturing System Diagnostics
 - 17.1.5 Configuring Oracle Audit Vault Integration for the Node
 
 - 
                           
                           
                              
                              17.1.1
                                  Configuring Remote Monitoring to Use SNMP
                           
                              
                           
                           
                           
 - 17.2 Configuring Oracle Key Vault Alerts
 - 17.3 Managing System Auditing
 - 17.4 Using Oracle Key Vault Reports
 
 - 
                     
                     
                        
                        17.1
                            Managing System Monitoring
                     
                        
                     
                     
                     
 - 
               
               
                  
                  18
                      Managing Oracle Key Vault Master Encryption Keys
               
                  
               
               
               
- 18.1 Configuring an Oracle Key Vault-to-New TDE-Enabled Database Connection
 - 18.2 Migrating Existing TDE Wallets to Oracle Key Vault
 - 
                     
                     
                        
                        18.3
                            Using the Persistent Master Encryption Key Cache
                     
                        
                     
                     
                     
- 18.3.1 About the Persistent Master Encrption Key Cache
 - 18.3.2 About Oracle Key Vault Persistent Master Encyrption Key Cache Architecture
 - 18.3.3 Caching Master Encryption Keys in the In-Memory and Persistent Master Encryption Key Cache
 - 18.3.4 Storage Location of Persistent Master Encryption Key Cache
 - 18.3.5 Persistent Master Encryption Key Cache Modes of Operation
 - 18.3.6 Persistent Master Encryption Key Cache Refresh Window
 - 
                           
                           
                              
                              18.3.7
                                  Persistent Master Encryption Key Cache Parameters
                           
                              
                           
                           
                           
- 18.3.7.1 PKCS11_CACHE_TIMEOUT Parameter
 - 18.3.7.2 PKCS11_PERSISTENT_CACHE_TIMEOUT Parameter
 - 18.3.7.3 PKCS11_PERSISTENT_CACHE_FIRST Parameter
 - 18.3.7.4 PKCS11_CONFIG_PARAM_REFRESH_INTERVAL Parameter
 - 18.3.7.5 PKCS11_PERSISTENT_CACHE_REFRESH_WINDOW Parameter
 - 18.3.7.6 EXPIRE PKCS11 PERSISTENT CACHE ON DATABASE SHUTDOWN Parameter
 
 - 18.3.8 Listing the Contents of the Persistent Master Encryption Key Cache
 - 18.3.9 Oracle Database Deployments and Persistent Master Encryption Key Cache
 
 - 18.4 Uploading and Downloading Oracle Wallets
 - 18.5 Uploading and Downloading JKS and JCEKS Keystores
 - 18.6 Using a User-Defined Key as the TDE Master Encryption Key
 
 - 
               
               
                  
                  19
                      Managing Online and Offline Secrets
               
                  
               
               
               
- 19.1 Uploading and Downloading Credential Files
 - 19.2 Managing Secrets and Credentials for SQL*Plus
 - 19.3 Managing Secrets and Credentials for SSH
 - 19.4 Managing Opaque Objects
 - 
                     
                     
                        
                        19.5
                            Managing Passwords in Oracle Key Vault in Scripts for Large Database Deployments
                     
                        
                     
                     
                     
- 19.5.1 About Managing Passwords in Oracle Key Vault in Scripts for Large Database Deployments
 - 19.5.2 Configuring the External Keystore Password Upload
 - 19.5.3 Example: Script for Using External Keystore Passwords in SQL*Plus Operations
 - 19.5.4 Sharing Secrets with Other Databases
 - 19.5.5 Changing Passwords for a Large Database Deployment
 
 
 - 
               
               
                  
                  20
                      Managing Keys for Oracle Products
               
                  
               
               
               
- 20.1 Using a TDE-Configured Oracle Database in an Oracle RAC Environment
 - 20.2 Using a TDE-Configured Oracle Database in an Oracle GoldenGate Environment
 - 
                     
                     
                        
                        20.3
                            Using a TDE-Configured Oracle Database in an Oracle Data Guard Environment
                     
                        
                     
                     
                     
- 20.3.1 About Uploading Oracle Wallets in an Oracle Data Guard Environment
 - 20.3.2 Uploading Oracle Wallets in an Oracle Data Guard Environment
 - 20.3.3 Performing an Online Master Key Connection in an Oracle Data Guard Environment
 - 20.3.4 Migrating Oracle Wallets in an Oracle Data Guard Environment
 - 20.3.5 Reverse Migrating Oracle Wallets in an Oracle Data Guard Environment
 - 20.3.6 Migrating an Oracle TDE Wallet to Oracle Key Vault for a Logical Standby Database
 - 20.3.7 Checking the Oracle TDE Wallet Migration for a Logical Standby Database
 
 - 20.4 Uploading Keystores from Automatic Storage Management to Oracle Key Vault
 - 20.5 MySQL Integration with Oracle Key Vault
 - 20.6 Other Oracle Database Features That Oracle Key Vault Supports
 
 - A Oracle Key Vault Multi-Master Cluster Operations
 - B Oracle Key Vault okvutil Endpoint Utility Reference
 - 
               
               
                  
                  C
                      Troubleshooting Oracle Key Vault
               
                  
               
               
               
- C.1 Oracle Key Vault Pre-Installation Checklist
 - 
                     
                     
                        
                        C.2
                            Integrating Oracle Key Vault with Oracle Audit Vault and Database Firewall
                     
                        
                     
                     
                     
- C.2.1 Step 1: Check the Environment
 - C.2.2 Step 2: Register Oracle Key Vault as a Secured Target with AVDF
 - C.2.3 Step 3: Register Oracle Key Vault as a Host with AVDF
 - C.2.4 Step 4: Download the AVDF Agent and Upload it to Oracle Key Vault
 - C.2.5 Step 5: Install the AVDF agent.jar File on the Oracle Key Vault Server
 - C.2.6 Step 6: Add the Oracle Key Vault Audit Trail to AVDF
 - C.2.7 Step 7: View Oracle Key Vault Audit Data Collected by AVDF
 
 - C.3 RESTful Services Troubleshooting Help
 - C.4 Error: Cannot Open Keystore Message
 - C.5 KMIP Error: Invalid Field
 - C.6 WARNING: Could Not Store Private Key Errors
 - C.7 Errors After Upgrading Oracle Key Vault
 - C.8 Error: Failed to Open Wallet
 - C.9 Transaction Check Error: Diagnostics Generation Utility
 - C.10 Fast-Start Failover (FSFO) Suspended (ORA-16818)
 - C.11 SSH Tunnel Add Failure
 - C.12 Error: Provision Command Fails if /usr/bin/java Does Not Exist
 - C.13 TDE Endpoint Integration Issues
 - C.14 Failover Situations in Primary-Standby Mode
 - C.15 Performing a Planned Shutdown
 
 - D Security Technical Implementation Guides Compliance Standards
 - Glossary
 - Index