Go to main content
1/24
Contents
Title and Copyright Information
Audience
Documentation Accessibility
Conventions
Related Information
1
Introducing
Oracle GoldenGate
Security
Part I Securing the
Microservices Architecture
MA
Security Features
2
Network
2.1
Network Access Control
2.2
Network Connection Adapter
2.3
Proxy Support
2.4
Reverse Proxy Support
3
Authentication and Authorization
3.1
Authentication
3.2
Authorization
3.3
Authorization for WebSockets
3.4
Error Codes
3.5
Cross Site Request Forgery
4
Communication Security
4.1
Certificate Access Control List
4.2
Transport Layer Security Protocols and Ciphers
4.3
TLS Certificate Revocation List Handling
4.4
HTTP Security and Cache Headers
5
Server and Deployment Identities
5.1
Using a Universally Unique IDs Scheme
5.2
Using a Deterministically Calculated Unique ID Scheme
5.3
Using an Explicit Naming Scheme
5.4
Creating Server and Deployment IDs
6
Securing Deployments
Part II Securing
Oracle GoldenGate
7
Overview of Security Options
8
Encrypting Data with the Master Key and Wallet Method
8.1
Creating the Wallet and Adding a Master Key
8.2
Specifying Encryption Parameters in the Parameter File
8.3
Renewing the Master Key
8.4
Deleting Stale Master Keys
9
Encrypting Data with the ENCKEYS Method
9.1
Encrypting the Data with the ENCKEYS Method
9.2
Decrypting the Data with the ENCKEYS Method
9.3
Examples of Data Encryption using the ENCKEYS Method
10
Managing Identities in a Credential Store
10.1
Creating and Populating the Credential Store
10.2
Specifying the Alias in a Parameter File or Command
11
Encrypting a Password in a Command or Parameter File
11.1
Encrypting the Password
11.2
Specifying the Encrypted Password in a Parameter File or Command
12
Populating an ENCKEYS File with Encryption Keys
12.1
Defining Your Own Key
12.2
Using KEYGEN to Generate a Key
12.3
Creating and Populating the ENCKEYS Lookup File
13
Configuring GGSCI Command Security
13.1
Setting Up Command Security
13.2
Securing the CMDSEC File
14
Using Target System Connection Initiation
14.1
Configuring the Passive Extract Group
14.2
Configuring the Alias Extract Group
14.3
Starting and Stopping the Passive and Alias Processes
14.4
Managing Extraction Activities
14.5
Other Considerations when using Passive-Alias Extract
15
Securing Manager
Scripting on this page enhances content navigation, but does not change the content in any way.