Enable OCI HYOK with Thales CipherTrust Manager Using OCI Load Balancer for High Availability

Introduction

In the previous tutorial, we explored integrating Thales CipherTrust Manager with Oracle Cloud Infrastructure (OCI) to enable Hold Your Own Key (HYOK) capabilities, both with and without an OCI API Gateway. While clustering CipherTrust Managers provides a level of recoverability, it does not ensure accurate high availability from a networking perspective.

The Thales CipherTrust Manager does not natively support a virtual IP address (VIP address) for seamless failover between nodes.

This tutorial addresses the limitation by introducing OCI Load Balancer to provide high network availability for Thales CipherTrust Manager instances. By placing the clustered CipherTrust Managers behind an OCI Load Balancer, we can ensure continuous availability and fault tolerance for external key management services in OCI, even in the event of a node failure or data centre disruption.

image

This tutorial will walk you through the architecture, configuration, and considerations for deploying this setup in your OCI environment.

Objectives

Task 1: Review the Existing OCI and Thales CipherTrust Manager HYOK Architectures

Before introducing OCI Load Balancer into the architecture, it is essential to revisit the existing OCI and Thales CipherTrust Manager HYOK deployments. In earlier implementations, we covered two primary patterns:

This section will briefly summarize these two designs and highlight their strengths and limitations, setting the foundation for introducing the OCI Load Balancer to close the availability gap.

Both architectures relied on clustering multiple Thales CipherTrust Managers to provide recoverability, but they lacked accurate network-level high availability due to the absence of native VIP address support in Thales CipherTrust Manager. Each deployment handled key management effectively, but introduced potential single points of failure from a network routing and service accessibility perspective.

image

Before you begin, make sure you have the following in place:

Task 2: Create an OCI Load Balancer

To achieve high availability for the Thales CipherTrust Manager at the network layer, we introduce OCI Load Balancer into the architecture. The OCI Load Balancer will be a single, resilient access point that intelligently distributes incoming requests across the clustered Thales CipherTrust Manager nodes.

This task will provide an OCI Load Balancer that fronts multiple Thales CipherTrust Manager instances. You will configure backend sets, health checks, SSL termination (if applicable), and listener rules tailored to your HYOK deployment whether you are using the OCI API Gateway or not.

This OCI Load Balancer setup ensures that the key management service remains reachable even if one of the Thales CipherTrust Manager nodes becomes unavailable, significantly improving the reliability and fault tolerance of your external key management integration with OCI.

Make sure you create a DNS record for the load balancer. We have created an A record in the private DNS listener inside the OCI VCN.

image

Task 3: Integrate OCI Load Balancer to an Existing OCI API Gateway–based HYOK Deployment

In this task, we will integrate the OCI Load Balancer into your existing OCI API Gateway-based HYOK deployment, ensuring a seamless and highly available architecture.

In this architecture, we combine the strengths of the OCI API Gateway and the OCI Load Balancer to enhance the reliability and security of the OCI HYOK integration with Thales CipherTrust Manager.

The OCI API Gateway continues to serve as the secure public-facing entry point, enforcing authentication, authorization, and routing policies. Behind it, the OCI Load Balancer distributes requests across multiple CipherTrust Manager nodes, ensuring high availability and fault tolerance at the network layer.

This layered design maintains a secure access model through the OCI API Gateway. It addresses the lack of native VIP address support in Thales CipherTrust Manager by introducing a resilient backend through the OCI Load Balancer.

image

The following illustration shows the end-to-end traffic flow with the OCI API Gateway and the OCI Load Balancer integrated into the architecture.

image

Task 4: Integrate OCI Load Balancer to an Existing but without OCI API Gateway-based HYOK Deployment

In this task, you will learn how to configure and use the OCI Load Balancer as the sole access point for Thales CipherTrust Manager in an OCI HYOK deployment, enabling a clean, performant, and highly available architecture.

In this architecture, we simplify the deployment by removing the OCI API Gateway and placing the OCI Load Balancer directly in front of the Thales CipherTrust Manager cluster. This approach is ideal for private integrations where public access is not required and the goal is to ensure high availability within a secure, internal network.

By routing requests through the OCI Load Balancer, we can distribute traffic across multiple Thales CipherTrust Manager nodes while maintaining session resilience and failover capabilities, even in the event of a node or availability domain failure. This setup addresses the key limitation of the Thales CipherTrust Manager’s lack of native VIP address support, without the additional complexity of OCI API Gateway policies and authentication flows.

Follow the tasks listed in the following tutorial: Set up an OCI Hold Your Own Key using Thales CipherTrust Manager without OCI API Gateway. But now, all the (AMS) CTM1 IP addresses have been changed to the load balancer IP address.

This is the detailed integration flow for OCI with Thales CipherTrust Manager integration (HYOK) with only the OCI Load Balancer in the path.

image

The following illustration shows the end-to-end traffic flow with only the OCI Load Balancer integrated into the architecture.

image

Task 5: Review all the OCI and Thales CipherTrust Manager HYOK Architectures to make the Thales CipherTrust Manager Highly Available

There is no one-size-fits-all approach to deploying Thales CipherTrust Manager for Hold Your Own Key (HYOK) in OCI. Multiple architectural options are available to achieve a resilient, highly available deployment depending on your network topology, security requirements, and available infrastructure, whether cloud-based or on-premises.

This section provides a consolidated overview of all supported architecture patterns for integrating Thales CipherTrust Manager with OCI HYOK, focusing on high availability. These include combinations of:

Each architecture has benefits and trade-offs regarding complexity, failover capabilities, and control. Whether you are running a fully cloud-native setup, operating across hybrid environments, or leveraging legacy load balancers in your data centers, there is a model that fits.

The architectures covered include:

Architecture # Description
1 CTM in a single data center – basic setup without OCI API Gateway or OCI Load Balancer
2 CTM in a single data center with OCI API Gateway – external access, no HA
3 CTMs in two data centers with OCI API Gateway and OCI Load Balancer – full HA solution
4 CTMs in two data centers with OCI API Gateway and on-premises load balancer (no HA) – partial resilience
5 CTMs in two data centers with OCI API Gateway and on-premises load balancer (HA) – HA managed externally
6 CTM in one data center with OCI API Gateway and on-premises load balancer (no HA) – limited failover
7 CTMs in two data centers with OCI Load Balancer only – internal access, full network-level HA without OCI API Gateway

This overview will help you compare and select the architecture that best aligns with your technical and operational requirements.

Conclusion

Ensuring high availability for Thales CipherTrust Manager in an Oracle Cloud Infrastructure (OCI) HYOK deployment is essential for maintaining secure, uninterrupted access to customer-managed encryption keys. While clustering CipherTrust Managers provides recoverability, it is insufficient to meet high availability requirements at the network level.

This tutorial demonstrated how the OCI Load Balancer can close that gap, either in conjunction with the OCI API Gateway or as a standalone solution for internal access. We also reviewed several real-world architecture patterns, including hybrid models that leverage on-premises load balancers, helping you choose the design that aligns with your infrastructure strategy and availability goals.

By thoughtfully integrating OCI’s networking services with Thales CipherTrust Manager, organizations can build a resilient and secure external key management solution that supports enterprise-grade compliance and operational continuity.

Acknowledgments

More Learning Resources

Explore other labs on docs.oracle.com/learn or access more free learning content on the Oracle Learning YouTube channel. Additionally, visit education.oracle.com/learning-explorer to become an Oracle Learning Explorer.

For product documentation, visit Oracle Help Center.