Table of Contents
- Title and Copyright Information
- Preface
- 1 Getting Started with HSM
-
2
Configuring an HSM for Oracle Key Vault
- 2.1 HSM-Enabling in a Standalone Oracle Key Vault Deployment
- 2.2 HSM-Enabling in a Primary-Standby Oracle Key Vault Deployment
- 2.3 HSMs in a Multi-Master Cluster
- 2.4 Backup and Restore Operations in an HSM-Enabled Oracle Key Vault Instance
- 2.5 Reverse Migration Operation
- 3 Upgrade Considerations When Using HSMs in Oracle Key Vault
-
4
Support Guidance
-
4.1
General Troubleshooting
- 4.1.1 Trace Files for Diagnosing Issues
- 4.1.2 HSM Alert
- 4.1.3 Could Not Get Slot for HSM Error
- 4.1.4 Could Not Load PKCS#11 Library Error
- 4.1.5 Oracle Key Vault Management Console Does Not Start After Restarting HSM-Enabled Oracle Key Vault Server
- 4.1.6 Primary-Standby Errors
- 4.1.7 Errors from HSM-Enabled Oracle Key Vault Backups
- 4.1.8 Restoring an HSM-Enabled Backup
-
4.2
Vendor Specific Notes for Thales Luna
- 4.2.1 Installing the HSM Client Software on the Oracle Key Vault Server for Thales Luna
- 4.2.2 HSM Credential for Thales Luna
- 4.2.3 Token Label for Thales Luna
- 4.2.4 Enrolling Oracle Key Vault as a Client of a Thales Luna HSM
- 4.2.5 HSM Provider Value for Thales Luna
- 4.2.6 HSM Vendor Specific Checks for Thales Luna
- 4.3 Vendor Specific Notes for nCipher
- 4.4 Vendor Specific Notes for Utimaco
-
4.1
General Troubleshooting