Oracle Wallet

The following commands provide functionality to manipulate Oracle wallet stores within the securityconfig tool. These commands are available in EE only. For more information on the securityconfig tool, see Configuring Security with Securityconfig.

To create a new auto-login wallet, run the wallet create command:

wallet create 
-dir <wallet directory> 

Auto-login wallets store passwords in an obfuscated state. Access to the wallet is secured against reading by unauthorized users using the OS-level login.

To manipulate secrets (passwords), which are associated with a name (alias), run the wallet secret command:

wallet secret 
-dir <wallet directory> 
{-set | -delete} -alias <alias>

If the -set option is specified, the user is prompted for a new password for the specified alias and required to verify the new secret.

If the -delete option is specified, the secret is deleted from the store.

Special considerations should be taken if Oracle wallet is used and you are deploying your Oracle NoSQL Database. For more information, see Guidelines for Deploying Secure Applications.

Use the wallet subcommand while configuring the security of the kvstore:

Run the securityconfig utility to set up the basic store configuration with security:
java -Xmx64m -Xms64m -jar KVHOME/lib/kvstore.jar securityconfig
The securityconfig tool is invoked. Use the config create command with the -pwdmgr option to specify the mechanism used to hold password that is needed for accessing the store. In this case, Oracle Wallet is used. Oracle Wallet is only available in the Oracle NoSQL Database Enterprise Edition version.
security-> config create -pwdmgr wallet -root kvroot
Enter a password for the Java KeyStore: 

Enter a password for your store and then re-enter it for verification. The configuration tool will automatically generate the security related files.