3 Getting Started with Oracle Database Vault
Before you can start using Oracle Database Vault, you must register it with the Oracle database.
- About Registering Oracle Database Vault with an Oracle Database
 After you install Oracle Database, you must register (that is, configure and enable) Oracle Database Vault with the Oracle database in which it was installed.
- Registering Oracle Database Vault with an Oracle Database in a Multitenant Environment
 You can register Oracle Database Vault in a multitenant environment based on several scenarios.
- Registering Oracle Database Vault in a Non-Multitenant Environment
 After you register the users, you should create a profile to protect these accounts.
- Verifying That Database Vault Is Configured and Enabled
 TheDBA_DV_STATUS,CDB_DV_STATUS,DBA_OLS_STATUS, andCDB_OLS_STATUSdata dictionary views verify if Oracle Database is configured and enabled.
- Logging in to Oracle Database Vault from Oracle Enterprise Cloud Control
 Oracle Enterprise Manager Cloud Control (Cloud Control) provides pages for managing Oracle Database Vault.
- Quick Start Tutorial: Securing a Schema from DBA Access
 This tutorial shows how to create a realm around theHRschema.
3.1 About Registering Oracle Database Vault with an Oracle Database
After you install Oracle Database, you must register (that is, configure and enable) Oracle Database Vault with the Oracle database in which it was installed.
Oracle Database includes Database Vault when you choose to include a default database in the installation process, but you must register it before you can use it. If you create a custom database, then you can use DBCA to install and enable Database Vault for it. The registration process enables Oracle Label Security if it is not already enabled. Oracle Label Security is required for Oracle Database Vault but it does not require a separate license unless you begin using Oracle Label Security separately and create Oracle Label Security policies. This procedure applies to the CDB root, application root, and the current pluggable database (PDB), as well as to both single-instance and Oracle Real Application Clusters (Oracle RAC) installations. In a multitenant database, Database Vault must be configured with the CDB root before any of the PDBs can configure Database Vault.
As part of the registration process, you created the Database Vault backup accounts. These are accounts that hold the key Database Vault roles. Use these accounts initially to provision the roles to named users with administrative privileges. Maintaining a backup account will allow you to recover from the named user losing or somehow misplacing their credentials because SYS will not be able to reset these passwords for users with these roles.
                  
You can register Oracle Database in both multitenant and non-multitenant environments. For multitenant environments, you have several methods to choose from for the registration.
Note:
If you have upgraded from a release earlier than Oracle Database 12c, and if the earlier Oracle Database Vault had been enabled in that earlier release, then after the upgrade process is complete, you must enable Oracle Database Vault by using theDBMS_MACADM.ENABLE_DV procedure. 
                     In a multitenant environment, if you are migrating a non-Database Vault registered Oracle database from a release earlier than release 12c, then you must perform a manual installation of Database Vault.
Related Topics
Parent topic: Getting Started with Oracle Database Vault
3.2 Registering Oracle Database Vault with an Oracle Database in a Multitenant Environment
You can register Oracle Database Vault in a multitenant environment based on several scenarios.
- About Registering Database Vault in a Multitenant Environment
 In a multitenant environment, you must register Oracle Database Vault in the CDB root before you can register Database Vault in any of the associated PDBs.
- Registering Database Vault in the CDB Root
 In a multitenant environment, you register Oracle Database Vault with common users who will use the Database Vault-enforced roles in the CDB root.
- Registering Database Vault Common Users to Manage Specific PDBs
 In a multitenant environment, you must register Oracle Database Vault in the root first, then in the PDBs afterward.
- Creating a Profile to Protect the DV_OWNER and DV_ACCTMGR Users
 A profile provides additional protection for users who have been granted theDV_OWNERandDV_ACCTMGRroles.
- Plugging in a Database Vault-Enabled PDB
 From SQL*Plus, in a multitenant environment, you can plug in a database that already has Database Vault enabled.
- Manually Installing Oracle Database Vault in a Multitenant Environment
 Under certain conditions, for a multitenant environment, you must manually install Oracle Database Vault.
Parent topic: Getting Started with Oracle Database Vault
3.2.1 About Registering Database Vault in a Multitenant Environment
In a multitenant environment, you must register Oracle Database Vault in the CDB root before you can register Database Vault in any of the associated PDBs.
The common users who have been assigned the DV_OWNER and DV_ACCTMGR roles in the CDB root can also have the same role in the PDBs. PDBs can have Database Vault registered using the same common users or use separate PDB local users. The DV_ACCTMGR role is granted commonly to the common user in the CDB root. You can grant DV_OWNER locally or commonly to the CDB root common user when you register Database Vault with the CDB root. Granting DV_OWNER locally to the common user prevents the common DV_OWNER user from using this role in any PDB.
                     
3.2.2 Registering Database Vault in the CDB Root
In a multitenant environment, you register Oracle Database Vault with common users who will use the Database Vault-enforced roles in the CDB root.
3.2.3 Registering Database Vault Common Users to Manage Specific PDBs
In a multitenant environment, you must register Oracle Database Vault in the root first, then in the PDBs afterward.
ORA-47503: Database Vault is not enabled on CDB$ROOT error appears.
                     3.2.4 Creating a Profile to Protect the DV_OWNER and DV_ACCTMGR Users
A profile provides additional protection for users who have been granted the DV_OWNER and DV_ACCTMGR roles. 
                     
DV_OWNER or DV_ACCTMGR roles are considered critical, privileged, accounts. Typically, these accounts should be considered service accounts and exempt from password lockout requirements. Oracle recommends that you create a custom profile that prevents the account from being locked. In addition, you should audit failed login attempts for these Database Vault-related accounts. 
                     - Log into the database instance as a user who has the CREATE PROFILEsystem privilege.- For common DV_OWNERandDV_ACCTMGRusers: Log in to the root of the database instance.
- For local DV_OWNERandDV_ACCTMGRusers: Log in to the PDB in which you created the users.
 
- For common 
- Create a profile similar to the following:- For common DV_OWNERandDV_ACCTMGRusers: In the root, create the profile similar to the following:CREATE PROFILE c##dv_profile limit FAILED_LOGIN_ATTEMPTS UNLIMITED PASSWORD_VERIFY_FUNCTION ORA12C_VERIFY_FUNCTION PASSWORD_LOCK_TIME UNLIMITED CONTAINER=ALL;
- For local DV_OWNERandDV_ACCTMGRusers: In the PDB, create the profile similar to the following:CREATE PROFILE dv_profile limit FAILED_LOGIN_ATTEMPTS UNLIMITED PASSWORD_VERIFY_FUNCTION ORA12C_VERIFY_FUNCTION PASSWORD_LOCK_TIME UNLIMITED CONTAINER=CURRENT;
 
- For common 
- Update the DV_OWNERandDV_ACCTMGRuser accounts to use this profile.- For common DV_OWNERandDV_ACCTMGRusers:ALTER USER c##sec_admin_owen PROFILE c##dv_profile CONTAINER = ALL; ALTER USER c##dbv_owner_root_backup PROFILE c##dv_profile CONTAINER = ALL; ALTER USER c##accts_admin_ace PROFILE c##dv_profile CONTAINER = ALL; ALTER USER c##dbv_acctmgr_root_backup PROFILE c##dv_profile CONTAINER = ALL;
- For local DV_OWNERandDV_ACCTMGRusers:ALTER USER sec_admin_owen PROFILE dv_profile CONTAINER = CURRENT; ALTER USER dbv_owner_backup PROFILE dv_profile CONTAINER = CURRENT; ALTER USER accts_admin_ace PROFILE dv_profile CONTAINER = CURRENT; ALTER USER dbv_acctmgr_backup PROFILE dv_profile CONTAINER = CURRENT;
 
- For common 
- Connect as a user who has been granted the AUDIT_ADMINrole.
- Create and enable a unified audit policy to track failed logins by any user who has been granted the DV_OWNERorDV_ACCTMGRrole.- For common DV_OWNERandDV_ACCTMGRusers: In the root, create a policy similar to the following:CREATE AUDIT POLICY c##dv_logins ACTIONS LOGON; AUDIT POLICY c##dv_logins BY USERS WITH GRANTED ROLES DV_OWNER, DV_ACCTMGR WHENEVER NOT SUCCESSFUL;
- For local DV_OWNERandDV_ACCTMGRusers: In the PDB, create a policy similar to the following:CREATE AUDIT POLICY dv_logins ACTIONS LOGON; AUDIT POLICY dv_logins BY USERS WITH GRANTED ROLES DV_OWNER, DV_ACCTMGR WHENEVER NOT SUCCESSFUL;
 
- For common 
3.2.5 Plugging in a Database Vault-Enabled PDB
From SQL*Plus, in a multitenant environment, you can plug in a database that already has Database Vault enabled.
In this scenario, the plugged in database has its own local Database Vault accounts. Be aware that if you plug a Database Vault-enabled database into a CDB that is not Database Vault enabled, then the PDB will remain in restricted mode until you enable Database Vault in the CDB and then restart the CDB. If you plug a non-Database Vault-enabled PDB into a CDB that is Database Vault enabled, then the PDB remains in restricted mode until you enable Database Vault in the PDB and then restart the PDB. This plugged in non-Database Vault enabled PDB can still be used. However, if the CDB is Database Vault enabled with the strict option set, then the PDB must be Database Vault enabled.
Before you plug in a Database Vault-enabled PDB and if the Database Vault roles are granted to common users, ensure that you understand fully how plugging in PDBs affect common users.
Related Topics
3.2.6 Manually Installing Oracle Database Vault in a Multitenant Environment
Under certain conditions, for a multitenant environment, you must manually install Oracle Database Vault.
3.3 Registering Oracle Database Vault in a Non-Multitenant Environment
After you register the users, you should create a profile to protect these accounts.
- Registering Database Vault in a Non-Multitenant Environment
 You can register Oracle Database Vault from SQL*Plus in a non-multitenant environment.
- Creating a Profile to Protect the DV_OWNER and DV_ACCTMGR Users
 A profile provides additional protection for users who have been granted theDV_OWNERandDV_ACCTMGRroles.
Parent topic: Getting Started with Oracle Database Vault
3.3.1 Registering Database Vault in a Non-Multitenant Environment
You can register Oracle Database Vault from SQL*Plus in a non-multitenant environment.
3.3.2 Creating a Profile to Protect the DV_OWNER and DV_ACCTMGR Users
A profile provides additional protection for users who have been granted the DV_OWNER and DV_ACCTMGR roles. 
                     
DV_OWNER or DV_ACCTMGR roles are considered critical, privileged, accounts. Typically, these accounts should be considered service accounts and exempt from password lockout requirements. Oracle recommends that you create a custom profile that prevents the account from being locked. In addition, you should audit failed login attempts for these Database Vault-related accounts. 
                     3.4 Verifying That Database Vault Is Configured and Enabled
The DBA_DV_STATUS, CDB_DV_STATUS, DBA_OLS_STATUS, and CDB_OLS_STATUS data dictionary views verify if Oracle Database is configured and enabled. 
                  
SYS user and users who have been granted the DBA role can query these views. 
                  - 
                           For Database Vault: - 
                                 If you want to find the Database Vault status for a non-multitenant database, or in a multitenant environment for the root only or an individual PDB, then depending on who you are connected to the database as, query the DBA_DV_STATUSorSYS.DBA_DV_STATUSview. Examples are as follows:- If you are connected as a user who has the DBArole or theSYSDBAadministrative privilege:SELECT * FROM DBA_DV_STATUS;
- If you are connected as a user who has the DV_OWNERorDV_ADMINrole:SELECT * FROM SYS.DBA_DV_STATUS;
 Output similar to the following appears: NAME STATUS -------------------- ----------- DV_CONFIGURE_STATUS TRUE DV_ENABLE_STATUS TRUE
- If you are connected as a user who has the 
- 
                                 If you want to find the Database Vault status of all PDBs in a multitenant environment, as a common user with administrative privileges, then query CDB_DV_STATUS, which provides the addition of a container ID (CON_ID) field.
 
- 
                                 
- 
                           For Oracle Label Security, query the following data dictionary views, which are similar to their Database Vault equivalent views: - 
                                 DBA_OLS_STATUS
- 
                                 CDB_OLS_STATUS
 
- 
                                 
Parent topic: Getting Started with Oracle Database Vault
3.5 Logging in to Oracle Database Vault from Oracle Enterprise Cloud Control
Oracle Enterprise Manager Cloud Control (Cloud Control) provides pages for managing Oracle Database Vault.
3.6 Quick Start Tutorial: Securing a Schema from DBA Access
This tutorial shows how to create a realm around the HR schema. 
                  
- About This Tutorial
 In this tutorial, you create a realm around for theHRsample database schema by using the Oracle Database Vault PL/SQL packages.
- Step 1: Log On as SYSTEM to Access the HR Schema
 You must enable theHRschema for this tutorial.
- Step 2: Create a Realm
 Realms can protect one or more schemas, individual schema objects, and database roles.
- Step 3: Create the SEBASTIAN User Account
 At this stage, there are no database accounts or roles authorized to access or otherwise manipulate the database objects the realm will protect.
- Step 4: Have User SEBASTIAN Test the Realm
 At this stage, have userSEBASTIANtest the realm, even though he has theREAD ANY TABLEsystem privilege.
- Step 5: Create an Authorization for the Realm
 Next, userSEBASTIANmust be granted authorization to the HR Apps realm, so that he can access theHR.EMPLOYEEStable.
- Step 6: Test the Realm
 To test the realm, you must try to access theEMPLOYEEStable as a user other thanHR.
- Step 7: If Unified Auditing Is Not Enabled, Then Run a Report
 Because you enabled auditing on failure for the HR Apps realm, you can generate a report to find any security violations.
- Step 8: Remove the Components for This Tutorial
 You can remove the components that you created for this tutorial if you no longer need them.
Parent topic: Getting Started with Oracle Database Vault
3.6.1 About This Tutorial
In this tutorial, you create a realm around for the HR sample database schema by using the Oracle Database Vault PL/SQL packages. 
                     
In the HR schema, the EMPLOYEES table has information such as salaries that should be hidden from most employees in the company, including those with administrative access. To accomplish this, you add the HR schema to the secured objects of the protection zone, which in Oracle Database Vault is called a realm, inside the database. Then you grant limited authorizations to this realm. Afterward, you test the realm to make sure it has been properly secured. And finally, to see how Oracle Database Vault provides an audit trail on suspicious activities like the one you will try when you test the realm, you will run a report. 
                     
Parent topic: Quick Start Tutorial: Securing a Schema from DBA Access
3.6.2 Step 1: Log On as SYSTEM to Access the HR Schema
You must enable the HR schema for this tutorial. 
                     
HR sample schema is installed. Oracle Database Sample Schemas describes how to install the sample schemas.
                     Parent topic: Quick Start Tutorial: Securing a Schema from DBA Access
3.6.3 Step 2: Create a Realm
Realms can protect one or more schemas, individual schema objects, and database roles.
HR schema. 
                     At this stage, you have created the realm but you have not assigned any authorizations to it. You will take care of that later on in this tutorial.
Parent topic: Quick Start Tutorial: Securing a Schema from DBA Access
3.6.4 Step 3: Create the SEBASTIAN User Account
At this stage, there are no database accounts or roles authorized to access or otherwise manipulate the database objects the realm will protect.
So, the next step is to authorize database accounts or database roles so that they can have access to the schemas within the realm. You will create the SEBASTIAN user account. 
                        
Do not exit SQL*Plus; you will need it for Step 6: Test the Realm, when you test the realm.
Parent topic: Quick Start Tutorial: Securing a Schema from DBA Access
3.6.5 Step 4: Have User SEBASTIAN Test the Realm
At this stage, have user SEBASTIAN test the realm, even though he has the READ ANY TABLE system privilege.
                     
SEBASTIAN has the READ ANY TABLE system privilege, he cannot query the HR.EMPLOYEES table, because the HR Apps realm takes precedence over the READ ANY TABLE system privilege.
                     Parent topic: Quick Start Tutorial: Securing a Schema from DBA Access
3.6.6 Step 5: Create an Authorization for the Realm
Next, user SEBASTIAN must be granted authorization to the HR Apps realm, so that he can access the HR.EMPLOYEES table. 
                     
Parent topic: Quick Start Tutorial: Securing a Schema from DBA Access
3.6.7 Step 6: Test the Realm
To test the realm, you must try to access the EMPLOYEES table as a user other than HR.
                     
 The SYSTEM account normally has access to all objects in the HR schema, but now that you have safeguarded the EMPLOYEES table with Oracle Database Vault, this is no longer the case. 
                        
- 
                              In SQL*Plus, connect as SYSTEM.CONNECT SYSTEM -- Or, CONNECT SYSTEM@hrpdb Enter password: password 
- 
                              Try accessing the salary information in the EMPLOYEEStable again:SELECT FIRST_NAME, LAST_NAME, SALARY FROM HR.EMPLOYEES WHERE ROWNUM <10; The following output should appear: Error at line 1: ORA-01031: insufficient privileges SYSTEMno longer has access to the salary information in the EMPLOYEES table. (In fact, even userSYSdoes not have access to this table.) However, userSEBASTIANdoes have access to this information.
- 
                              Connect as user SEBASTIAN.CONNECT sebastian -- Or, CONNECT sebastian@hrpdb Enter password: password 
- 
                              Perform the following query: SELECT FIRST_NAME, LAST_NAME, SALARY FROM HR.EMPLOYEES WHERE ROWNUM <10; Output similar to the following appears: FIRST_NAME LAST_NAME SALARY -------------------- ------------------------- ---------- Steven King 24000 Neena Kochhar 17000 Lex De Haan 17000 Alexander Hunold 9000 Bruce Ernst 6000 David Austin 4800 Valli Pataballa 4800 Diana Lorentz 4200 Nancy Greenberg 12008 9 rows selected. 
Parent topic: Quick Start Tutorial: Securing a Schema from DBA Access
3.6.8 Step 7: If Unified Auditing Is Not Enabled, Then Run a Report
Because you enabled auditing on failure for the HR Apps realm, you can generate a report to find any security violations.
For example, you could generate a report for the violation that you attempted in Step 6: Test the Realm.
Oracle Database Vault generates a report listing the type of violation (in this case, the SELECT statement entered in the previous section), when and where it occurred, the login account who tried the violation, and what the violation was. 
                        
Parent topic: Quick Start Tutorial: Securing a Schema from DBA Access
3.6.9 Step 8: Remove the Components for This Tutorial
You can remove the components that you created for this tutorial if you no longer need them.
- 
                              Drop user SEBASTIAN.In SQL*Plus, log on as the Oracle Database Vault account manager (for example, bea_dvacctmgr) and then dropSEBASTIANas follows:sqlplus bea_dvacctmgr -- Or, CONNECT bea_dvacctmgr@hrpdb Enter password: password DROP USER SEBASTIAN; 
- 
                              Delete the HR Apps realm. - 
                                    In Cloud Control, ensure that you are logged in as a user who has the DV_OWNERrole.
- 
                                    In the Database Vault Home page, click Administration. 
- 
                                    In the Realms page, select HR Appsfrom the list of realms.
- 
                                    Click Delete, and in the Confirmation window, click Yes. 
 
- 
                                    
- 
                              If necessary, in SQL*Plus, lock and expire the HRaccount.ALTER USER HR ACCOUNT LOCK PASSWORD EXPIRE; 
Parent topic: Quick Start Tutorial: Securing a Schema from DBA Access
