Oracle Wallet
The following commands provide functionality to manipulate Oracle wallet stores within the securityconfig tool. These commands are available in EE only. For more information on the securityconfig tool, see Configuring Security with Securityconfig.
To create a new auto-login wallet, run the wallet create command:
wallet create
-dir <wallet directory> Auto-login wallets store passwords in an obfuscated state. Access to the wallet is secured against reading by unauthorized users using the OS-level login.
To manipulate secrets (passwords), which are associated with a name (alias), run the wallet secret command:
wallet secret
-dir <wallet directory>
{-set | -delete} -alias <alias>If the -set option is specified, the user is prompted for a new password for the specified alias and required to verify the new secret.
If the -delete option is specified, the secret is deleted from the store.
Special considerations should be taken if Oracle wallet is used and you are deploying your Oracle NoSQL Database. For more information, see Guidelines for Deploying Secure Applications.
Use the wallet subcommand while configuring the security of the
kvstore:
securityconfig utility to set up the basic store configuration
with
security:java -Xmx64m -Xms64m -jar KVHOME/lib/kvstore.jar securityconfigsecurityconfig tool is invoked. Use the config
create command with the -pwdmgr option to specify the
mechanism used to hold password that is needed for accessing the store. In this case,
Oracle Wallet is used. Oracle Wallet is only available in the Oracle NoSQL Database
Enterprise Edition
version.security-> config create -pwdmgr wallet -root kvroot
Enter a password for the Java KeyStore: Enter a password for your store and then re-enter it for verification. The configuration tool will automatically generate the security related files.