Index

A  C  D  E  G  H  I  J  K  L  M  N  O  P  R  S  T  U  V  X  

A

  • ad hoc tools
    • Oracle Data Redaction 8.4.2
  • administrative access to policies, restricting 13.2
  • aggregate functions
    • affect on Data Redaction policy optimization 12.5
  • ALTER SYSTEM statement
    • how compares with ADMINISTER KEY MANAGEMENT statement 5.5
  • APEX_UTIL.GET_NUMERIC_SESSION_STATE function
    • Oracle Data Redaction policies (NV public function) 10.5.6
  • APEX_UTIL.GET_SESSION_STATE function
    • Oracle Data Redaction policies (V public function) 10.5.6
  • applications
    • database applications and Oracle Data Redaction 8.4.1
    • modifying to use Transparent Data Encryption 5.4
  • auto login keystores
    • and Transparent Data Encryption (TDE) 4.2.5.4
  • Automatic Storage Management (ASM)
    • moving software keystores from 4.1.8

C

  • CDBs
    • cloning PDBs with encrypted data 6.5.7.2
    • cloning PDBs wth encrypted data, about 6.5.7.1
    • Data Redaction masking policies 12.9
    • moving PDB from one CDB to another 6.5.4
    • PDBs with encrypted data 6.5.6
    • preserving keystore passwords in PDB move operations 6.5.4
    • TDE operations in root 6.5.2
    • TDE operations in root and PDBs 6.5.3
  • change data capture, synchronous 3.3.3
  • cloning and upgrading encrypted PDBs
  • closing external keystores 4.1.11.1
  • closing software keystores 4.1.11.1
  • column encryption
    • about 2.4.2
    • changing algorithm 3.3.9
    • changing encryption key 3.3.9
    • creating encrypted table column with default algorithm 3.3.4.2
    • creating encrypted table column with non-default algorithm 3.3.4.3
    • creating index on encrypted column 3.3.6
    • data loads from external file 5.7
    • data types to encrypt 3.3.2
    • existing tables
    • external tables 3.3.4.7
    • incompatibilities 7.1
    • limitations 7.1
    • performance, optimum 7.2
    • restrictions 3.3.3
    • salt 3.3.7
    • security considerations 5.2.2
    • skipping integrity check 3.3.4.4
  • column sensitive type discovery
    • enabling when creating a Data Redaction policy 11.5.2
  • compliance
    • Transparent Data Encryption 2.2
  • compression of Transparent Data Encryption data 5.1
  • configuring software keystores
    • creating local auto-login keystore 3.1.3.3

D

  • data at rest 2.1
  • database close operations
    • keystores 5.8
  • database links
    • with Oracle Data Redaction policies 12.4
  • database roles
    • Data Redaction policies 10.5.4
  • databases
  • data deduplication of Transparent Data Encryption data 5.1
  • data redaction
    • See: Oracle Data Redaction
  • Data Redaction supported functions 10.5.1
  • data storage
    • Transparent Data Encryption 5.3.2
  • DDL statements
    • Oracle Data Redaction policies 12.2
  • decryption
  • DISTINCT clause, Data Redaction policies 12.1
  • DML statements
    • Oracle Data Redaction policies 12.2

E

  • editing custom formats 11.4.3
  • editing policies 11.5.3
  • Editions
    • Transparent Data Encryption 6.7
  • encrypted columns
    • data loads from external files 5.7
  • encryption 2.4.2
    • See also: Transparent Data Encryption (TDE)
  • encryption algorithms, supported 3.4.7.1
  • EXEMPT REDACTION POLICY privilege
    • using with Database Vault 13.2
  • expressions 10.5.1
  • external credential store, hardware keystores 3.1.2.3
  • external credential store, password-based software keystores 3.1.2.3
  • external files
    • loading data to tables with encrypted columns 5.7
  • external keystores 3.2.1
  • external store for passwords
    • open and close operations in CDB 6.5.8
    • operations in CDB environment 6.5.1
  • external tables, encrypting columns in
    • ORACLE_DATPUMP 5.7
    • ORACLE_LOADER 5.7

G

  • GROUP BY clause, Data Redaction policies 12.1
  • guidelines
    • materialized views and Data Redaction 13.5
    • recycle bin and Data Redaction 13.6
    • SYS_CONTEXT values and Data Redaction 13.4
  • guidelines, general usage
    • redacted columns and DISTINCT clause 12.1
    • redacted columns and GROUP BY clause 12.1
    • redacted columns and ORDER BY clause 12.1
  • guidelines, security
    • ad hoc query attacks and Data Redaction 13.1
    • application context value handling by Data Redaction policies 13.1
    • day-to-day operations and Data Redaction 13.1
    • DDL statements and Data Redaction policies 13.1
    • exhaustive SQL queries and inference and Data Redaction 13.1

H

  • hardware keystores

I

  • import/export utilities, original 3.3.3
  • indexes
    • creating on encrypted column 3.3.6
  • index range scans 2.4.3
  • inline views
    • Data Redaction policies order of redaction 12.3
    • Data Redaction redaction 12.3
  • intruders
    • ad hoc query attacks 13.1
  • isolated mode
    • configuring for Oracle Key Vault 3.2.2

J

  • JSON
    • Oracle Data Redaction 12.15

K

  • keystores
    • about 2.4.4.1
    • architecture 2.4.2
    • ASM-based 4.1.12
    • auto login 4.2.5.4
    • auto-login, open and close operations in CDBs 6.5.8
    • backing up password-based software keystores
    • backing up password-protected software keystores
    • changing Oracle Key Vault password 4.1.3
    • changing passwords for password-based software keystores 4.1.2.1
    • closing external keystores 4.1.11.1
    • closing in CDBs 6.5.8
    • closing software keystores 4.1.11.1
    • database close operations 5.8
    • deleting 4.1.14
    • external 3.2.1
    • external keystore
      • configuration process 3.2
    • master encryption key merge differing from import or export 4.2.6.10
    • merging
    • migrating
      • creating master encryption key for external keystore-based encryption 4.1.9.1.3
      • external keystore to software keystore 4.1.9.2.1
      • keystore order after migration 4.1.9.3
      • password key into external keystore 4.1.9.1.2
    • migration using Oracle Key Vault 4.1.10
    • moving out of ASM 4.1.8
    • moving software keystore to a new location 4.1.7
    • opening exteranl keystores 3.2.3
    • opening in CDBs 6.5.8
    • opening software keystores 3.1.4.1
    • Oracle Database secrets
      • about 4.3.1
      • storing in external keystore 4.3.6
      • storing in software keystore 4.3.2
    • password access 4.1.1
    • password preservation in PDB move operations 6.5.4
    • possible states of 3.1.4.1
    • using auto-login external keystore 4.3.10.1
  • keystores, software
    • configuration process 3.1

L

  • LENGTH functions, character string

M

  • masking
    • See: Oracle Data Redaction
  • master encryption key
    • See: TDE master encryption key
  • materialized views
    • Data Redaction guideline 13.5
    • Transparent Data Encryption tablespace encryption 6.2.1
  • multitenant container databases
    • See: CDBs

N

  • namespace functions
  • nested functions
    • Data Redaction policies order of redaction 12.3
  • NV public function (APEX_UTIL.GET_NUMERIC_SESSION_STATE function), Data Redaction policies 10.5.6

O

  • OLS_LABEL_DOMINATES public function
    • Data Redaction policies 10.5.5
  • opening external keystores 3.2.3, 3.2.3.1
  • opening software keystores 3.1.4.1
  • ORA-00979 error
    • not a GROUP BY expression error 12.1
  • ORA-28081
    • Insufficient privileges - the command references a redacted object error 12.2
  • Oracle Application Express
    • filtering using by session state in Data Redaction policies 10.5.6
  • Oracle Application Expression
  • Oracle Call Interface
    • Transparent Data Encryption 6.6
  • Oracle Database Real Application Security
  • Oracle Database Vault
    • using with Data Redaction 13.2
  • Oracle Data Guard
    • TDE and Oracle Key Vault 6.2.2
    • Transparent Data Encryption 6.2.1
  • Oracle Data Pump
    • encrypted columns 6.1.2
    • encrypted data 6.1.1
    • encrypted data with dump sets 6.1.3
    • exported data from Data Redaction policies 12.13.3
    • exporting Oracle Data Redaction objects 12.13.2.1
    • imported data from Data Redaction policies 12.13.4
    • Oracle Data Redaction security policy 12.13.1
  • Oracle Data Redaction 9.4
  • Oracle Data Redaction, database links 12.4
  • Oracle Data RedactionEnterprise Manager Cloud Control
    • deleting custom format 11.4.5
  • Oracle Data Redaction formats
    • creating in Cloud Control 11.4.2
    • deleting in Cloud Control 11.4.5
    • editing in Cloud Control 11.4.3
    • Enterprise Management Cloud Control, managing in 11.4.1
    • Enterprise Manager Cloud Control, sensitive column types 11.3
    • Enterprise Manager Cloud Control, viewing in 11.4.4
  • Oracle Data Redaction partial redaction
  • Oracle Data Redaction policies 10.5.3
  • Oracle Data Redaction policy expressions
    • Cloud Control, about 11.6.1
    • creating in Cloud Control 11.6.2
    • deleting in Cloud Control 11.6.5
    • editing in Cloud Control 11.6.3
    • viewing in Cloud Control 11.6.4
  • Oracle Enterprise Manager Cloud Control 11.5.3
  • Oracle Enterprise Manager Data Masking and Subsetting Pack
    • Oracle Data Redaction impact 12.14
  • Oracle GoldenGate
    • storing secrets in Oracle keystores 4.4.1
  • Oracle Key Vault
    • migration of keystores 4.1.10
  • Oracle Label Security
    • functions using Data Redaction expressions 10.5.2.5
  • Oracle Real Application Clusters
    • multitenant configuration and TDE 6.3.2
    • Transparent Data Encryption 6.3.1
  • Oracle Recovery Manager
    • Transparent Data Encryption 4.1.13
  • Oracle Securefiles
    • Transparent Data Encryption 6.4, 6.4.1
  • Oracle Virtual Private Database (VPD)
  • orapki utility
    • how compares with ADMINISTER KEY MANAGEMENT statement 5.5
  • ORDER BY clause, Data Redaction policies 12.1
  • original import/export utilities 3.3.3

P

  • passwords
    • access to for ADMINISTER KEY MANAGEMENT operations 4.1.1
    • preserving in PDB move operations 6.5.4
  • PDBs
    • Data Redaction policies 12.9
    • finding TDE keystore status for all PDBs 6.5.9
    • master encryption keys
    • Transparent Data Encryption 6.5.1
  • performance
    • Transparent Data Encryption 5.3.1
  • PKI encryption
    • backup and recovery operations 5.6.3
    • hardware keystores 5.6.2
    • master encryption key 5.6.1
    • tablespace encryption 5.6.2
  • pluggable databases
    • See: PDBs
  • policy expressions, Oracle Data Redaction 10.6.1

R

  • recycle bin
    • Data Redaction policies and 13.6
  • reports
    • based Data Redaction policies 10.18
  • returning null values
  • rotating

S

  • salt
  • salt (TDE)
  • secrets
    • storing Oracle Database secrets in keystore
      • about 4.3.1
      • storing in external keystore 4.3.6
      • storing in software keystore 4.3.2
  • SecureFiles
    • Transparent Data Encryption 6.4, 6.4.1
  • software keystores
    • password-based using external keystore 3.1.2.3
  • SUBSTR function
  • synchronous change data capture 3.3.3
  • SYS_CONTEXT function
    • Data Redaction policies 13.4
    • SYS_SESSION_ROLES namespace used in Data Redaction 10.5.4
  • SYS_SESSION_ROLES SYS_CONTEXT namespace
  • SYSTEM user
    • Data Redaction policies 13.3
  • SYS user
    • Data Redaction policies 13.3

T

  • TABLESPACE_ENCRYPTION_DEFAULT_ALGORITHM dynamic parameter 3.4.4
  • tablespace encryption
  • tablespace master encryption key
  • tablespaces
    • about encrypting 3.4.1
    • comparison between offline and online conversions 3.4.1
    • rotating encryption algorithm 4.2.5.5
  • tablespaces, offline decryption
  • tablespaces, offline encryption
  • tablespaces, online encryption
  • TDE
    • See: Transparent Data Encryption (TDE)
  • TDE Academy 6.5.7.3
  • TDE master encryption keys
  • Transparent Data Encryption (TDE)
    • about 2.1
    • benefits 2.2
    • CDBs
      • operations in root or PDBs 6.5.3
    • column encryption
      • about 2.4.2, 3.3.1
      • adding encrypting column to existing table 3.3.5.2
      • changing algorithm 3.3.9
      • changing encryption key 3.3.9
      • creating encrypted column in external table 3.3.4.7
      • creating index on encrypted column 3.3.6
      • creating tables with default encryption algorithm 3.3.4.2
      • creating tables with non-default encryption algorithm 3.3.4.3
      • data types supported 3.3.2
      • disabling encryption in existing column 3.3.5.4
      • encrypting columns in existing tables 3.3.5.1
      • encrypting existing column 3.3.5.3
      • encryption and integrity algorithms 2.4.5
      • restrictions 3.3.3
      • salt in encrypted columns 3.3.7
    • columns with identity columns 3.3.3
    • compatibility with application software 7.1
    • compatibility with Oracle Database tools 7.1
    • compression of encrypted data 5.1
    • configuring external keystores
    • configuring software keystores
      • about 3.1.1
      • creating auto-login keystore 3.1.3.3
      • creating password-based keystore 3.1.3.2
      • opening keystores 3.1.4.1
      • setting software master encryption key 3.1.5
      • sqlnet.ora file configuration 3.1.2
    • data deduplication of encrypted data 5.1
    • editions 6.7
    • encryption and integrity algorithms 2.4.5
    • finding information about 3.5
    • frequently asked questions 7
    • incompatibilities 7.1
    • keystore management
      • ASM-based keystore 4.1.12
      • backing up password-protected software keystores 4.1.4.1
      • changing Oracle Key Vault keystore password 4.1.3
      • changing password-based software keystore password 4.1.2.1
      • closing external keystores 4.1.11.1
      • closing software keystore 4.1.11.1
      • merging keystores, about 4.1.6.1
      • merging keystores, auto-login into password-based 4.1.6.4
      • merging keystores, one into an existing 4.1.6.3
      • merging keystores, reversing merge operation 4.1.6.5
      • merging keystores, two into a third new keystore 4.1.6.2
      • migrating password key and external keystore 4.1.9.1.2
      • migrating password key and external keystore, master encryption key creation 4.1.9.1.3
      • migrating password key and external keystore, reverse migration 4.1.9.2.1
      • TDE master encryption key attributes 4.2.3.1
    • keystores
    • master encryption key
    • master encryption key attributes
    • master encryption keys
    • modifying applications for use with 5.4
    • multidatabase environments 6.8
    • Oracle Call Interface 6.6
    • Oracle Data Guard 6.2.1, 6.2.2
    • Oracle Data Pump
      • export and import operations on dump sets 6.1.3
      • export and import operations on encrypted columns 6.1.2
    • Oracle Data Pump export and import operations
    • Oracle Real Application Clusters
    • Oracle Recovery Manager 4.1.13
    • PDBs
      • about 6.5.1
      • finding keystore status for all PDBs 6.5.9
      • operations in root 6.5.2
    • performance
      • database workloads 7.2
      • decrypting entire data set 7.2
      • optimum 7.2
      • worst case scenario 7.2
    • performance overheads
    • PKI encryption 5.6
    • privileges required 2.3
    • SecureFiles 6.4, 6.4.1
    • security considerations
    • storage overhead 5.3.2
    • storing Oracle GoldenGate secrets 4.4.1
    • tablespace encryption
    • tablespace encryption, setting with COMPATIBLE parameter 3.4.3.1.1
    • TDE Academy 6.5.7.3
    • views 3.5
  • Transparent Data Encryption (TDE)integrity
    • column encryption
      • creating tables without integrity checks (NOMAC) 3.3.4.4
      • improving performance 3.3.4.4
    • NOMAC parameter (TDE) 3.3.4.4
  • Transparent Data Encryption (TDE) keystores
    • deleting 4.1.14
    • moving software keystore to a new location 4.1.7
  • transportable tablespaces 3.3.3
  • tutorials
    • named Data Redaction policy expressions 10.6.5

U

  • utilities, import/export 3.3.3

V

  • V$ENCRYPTION_WALLET view
    • keystore order after migration 4.1.9.3
  • views
  • V public function (APEX_UTIL.GET_SESSION_STATE function), Data Redaction policies 10.5.6

X

  • XML generation 12.7