Use this part to secure your CA and MA environments.
Topics:
Overview of Security Options
You can use these security features to protect your Oracle GoldenGate environment and the data that is being processed.
Encrypting Data with the Master Key and Wallet Method
To use this method of data encryption, you create a master key wallet and add a master key to the wallet. This method works as follows, depending on whether the data is encrypted in the trails or across TCP/IP:
Encrypting Data with the ENCKEYS Method
To use this method of data encryption, you configure Oracle GoldenGate to generate an encryption key and store the key in a local ENCKEYS file.
Managing Identities in a Credential Store
Learn how to use an Oracle GoldenGate credential store to maintain encrypted database passwords and user IDs and associate them with an alias.
Configuring GGSCI Command Security
You can establish command security for Oracle GoldenGate to control which users have access to which Oracle GoldenGate functions.
Securing Manager
You can use the Manager parameter, ACCESSRULE, to set security access rules for Manager. It allows GGSCI access from a remote host if you are using passive Extract or Director.