1 Introduction to Oracle Key Vault

Oracle Key Vault is a full-stack, security-hardened software appliance built to centralize the management of keys and security objects within the enterprise.

1.1 About Key and Secrets Management in Oracle Key Vault

Oracle Key Vault is a fault-tolerant, highly available and scalable, secure and standards-compliant key and secrets management appliance, where you can store, manage, and share your security objects.

A security object contains critical data that is provided by a user. Security objects that you can manage with Oracle Key Vault include encryption keys, Oracle wallets, Java keystores (JKS), Java Cryptography Extension keystores (JCEKS), and credential files. Credential files can include SSH private keys (used for public key authentication to remote servers (for example OCI compute instances)) or database account passwords for unattended execution of regularly scheduled maintenance scripts.

To increase key and secret availability, you can install Oracle Key Vault as a multi-master cluster with up to 16 (geographically distributed) nodes.

Oracle Key Vault centralizes key and secrets management across your organization quickly and efficiently. Built on Oracle Linux, Oracle Database, Oracle Database security features like Oracle Transparent Data Encryption, Oracle Database Vault, Oracle Virtual Private Database, and Oracle GoldenGate technology, Oracle Key Vault's centralized, highly available, and scalable security solution helps to overcome the biggest key-management challenges facing organizations today. With Oracle Key Vault you can retain, back up, and restore your security objects, prevent their accidental loss, and manage their lifecycle in a protected environment.

Oracle Key Vault is optimized for the Oracle Stack (database, middleware, systems), and Advanced Security Transparent Data Encryption (TDE). In addition, it complies with the industry standard OASIS Key Management Interoperability Protocol (KMIP) for compatibility with KMIP-based clients, for example MongoDB.

Oracle Key Vault works with endpoints, which it treats as clients to store and manage security objects, share them with trusted peers, and retrieve them. An endpoint is a computer system such as a database server, an application server, and other information systems, where keys are used to access encrypted data and credentials are used to authenticate to other systems. For database servers hosting one or more Oracle databases each Oracle database will be at least one endpoint. You can use Oracle Key Vault to manage a variety of other endpoints, such as master encryption keys for Oracle GoldenGate encrypted trail files, MySQL TDE, encrypted ACFS file systems, ZDLRA, and many more KMIP-compliant endpoints, like MongoDB. The Java and C software development kits make it easy to integrate other endpoints as well.

1.2 Benefits of Using Oracle Key Vault

Oracle Key Vault helps you to fight security threats, centralize key storage, and centralize key lifecycle management.

Deploying Oracle Key Vault in your organization will help you accomplish the following:

  • Manage the lifecycle for endpoint security objects and keys, which includes key creation, rotation, deactivation, and removal.

  • Prevent the loss of keys and wallets due to forgotten passwords or accidental deletion.

  • Share keys securely between authorized endpoints across the organization.

  • Enroll and provision endpoints easily using a single software package that contains all the necessary binaries, configuration files, and endpoint certificates for mutually authenticated connections (mTLS 1.2) between endpoints and Oracle Key Vault.

  • Work with other Oracle products and features in addition to Transparent Data Encryption (TDE), such as Oracle Real Application Clusters (Oracle RAC), Oracle Data Guard, pluggable databases, Oracle GoldenGate encrypted trail files, sharded databases, and others.

    Work with other products, such as MongoDB, that support integration with external key managers via the Key Management Interoperability Protocol (KMIP).

Figure 1-1 Encrypted Data That Oracle Key Vault Can Protect

Description of Figure 1-1 follows
Description of "Figure 1-1 Encrypted Data That Oracle Key Vault Can Protect"

This figure illustrates how a multi-master cluster environment can be used to manage different kinds of encrypted data. It has the following components:

  • Oracle Database refers to Oracle databases that are connected to the Oracle Key Vault. Typically, these databases are protected with Transparent Data Encryption (TDE).

  • Oracle wallets and Java keystores are containers for keys and sensitive objects that you upload and download between Oracle Key Vault and endpoints.

  • Secrets Management refers to other keystore files, which are security objects like certificates, and credential files like Kerberos keytab files, SSH key files, and server password files, that you upload to Oracle Key Vault from endpoints.

  • ZDLRA, MongoDB, MySQL, Oracle GoldenGate, Solaris Crypto Keys, and ACFS are all sources of encrypted key data that can be protected by Oracle Key Vault.

You can deploy Oracle Key Vault in the following types of environments:

  • Single Oracle Database instance
  • Multiple Oracle databases on the same server
  • Oracle Database using a multitenant environment
  • Oracle GoldenGate
  • Oracle Real Application Clusters (RAC)
  • Oracle Data Guard
  • Oracle Exadata, engineered systems
  • Oracle Database deployed on ExaDB-C@C, ExaDB-D, and ExaDB-D@Azure.
  • Oracle Autonomous Database (ADB-C@C)

Other components of Oracle Key Vault can include the following:

  • Oracle Key Vault Management Console refers to the Oracle Key Vault graphical user interface, where you can log in to manage your security objects and administer the Oracle Key Vault system.

  • Oracle Key Vault Backup refers to a backup device, where security objects in Oracle Key Vault can be backed up on-demand or on-schedule.

An Oracle Key Vault multi-master cluster provides additional benefits, such as:

  • Maximum key availability by providing multiple Oracle Key Vault nodes from which data may be retrieved
  • Zero endpoint downtime during Oracle Key Vault multi-master cluster maintenance

1.3 Oracle Key Vault Use Cases

The most typical use cases for Oracle Key Vault are centralized storage and management of security objects.

1.3.1 Centralized Management of TDE Master Encryption Keys Using Online Master Encryption Keys

You can use an online master encryption key to centralize the management of TDE master encryption keys over a direct network connection.

This feature applies only to Oracle databases that use Transparent Data Encryption (TDE). The term online master encryption key replaces the previous term TDE direct connection.

online master encryption keys enable you to centrally manage Transparent Data Encryption (TDE) master encryption keys over a network connection as an alternative to using local Oracle wallet files. The connection configuration entails using a PKCS#11 library to connect to Oracle Key Vault. After you perform the configuration, all future TDE master encryption keys will be stored and managed in Oracle Key Vault. There are two scenarios that you can use:

  • If the database does not yet have TDE wallets

  • If the database has already been configured for TDE

The online master encryption key feature works as follows: TDE generates the master encryption key and stores it in Oracle Key Vault. Oracle Key Vault administrators have full control of the TDE master encryption keys. They can revoke access of the keys from certain endpoints, share the keys with other endpoints, and perform other operations. The online master encryption key is also a convenient alternative to copying local wallet files to multiple endpoints manually. Sharing TDE master encryption keys, rather than maintaining local wallet copies, is especially useful when Oracle Real Application Clusters (Oracle RAC), Oracle Data Guard or shared databases are encrypted with TDE. The following comparison illustrates the difference:

  • Local wallet copy

    In a Data Guard scenario, re-key operations on the primary database cause the managed recovery process on the standby databases to fail. You must copy the wallet to the standby database, and then an administrator must open the wallet (if the wallet is not an auto-login wallet). Afterward, you must restart the managed recovery process.

  • Shared TDE key in a virtual wallet in Oracle Key Vault

    In a database cluster, after a key rotation operation, Oracle Key Vault immediately shares the new TDE master encryption key with other nodes in the cluster. There is no need to copy the wallet manually to the other nodes. In a Data Guard configuration, after key rotation, the new keys are immediately available to the standby databases. Sharded databases are independent databases that can have their own TDE implementation. However, all keys of all shards need to available to all shards to enable data movement across shards. Oracle Key Vault makes key management operations seamless.

Centralized management facilitates copying encrypted data between databases using Oracle Data Pump export, import, and the transportable tablespaces features of Oracle Database when master encryption keys are stored in the wallet.

  • In non-centralized management the wallet must be manually copied from source to target databases.

  • In centralized management these master encryption keys are easily shared when you place them in a virtual wallet in Oracle Key Vault, and then grant each endpoint access to the virtual wallet.

You must open the wallet before encryption and decryption. After you close the wallet, then encrypted data in tables and tablespaces is unavailable to you. You should rotate the TDE master encryption key regularly to remain in compliance with the applicable regulations.

Oracle Key Vault supports the ADMINISTER KEY MANAGEMENT SQL statements that are used to manage Transparent Data Encryption in an Oracle Database 12.1.0.2 and later.

Online master encryption keys managed in Oracle Key Vault are supported from Oracle Database 12.1.0.2 and later version. Online master key is deprecated for Oracle Database 11.2.0.4.

The following figure illustrates the centralized management of online master encryption keys.

Figure 1-2 Centralized Management of Online Master Encryption Keys

Description of Figure 1-2 follows
Description of "Figure 1-2 Centralized Management of Online Master Encryption Keys"

1.3.2 Centralized Storage of Oracle Wallet Files and Java Keystores

You can store security objects centrally in Oracle Key Vault, and manage them with automatic mechanisms for tracking, backup, and recovery.

This will help you address many operational and security challenges posed by the manual tracking and management of security objects dispersed widely across multiple servers.

Oracle Key Vault stores copies of Oracle wallet files, Java keystores, and other security objects in a centralized location for long-term retention and recovery. These security objects can later be downloaded to a new wallet or keystore file and shared with trusted server peer endpoints.

The Oracle Key Vault endpoint software can read the format of Oracle wallet files and Java keystores to store their contents at the granularity of individual security objects. You can upload both password-protected and auto-login wallets, and then download the wallet contents to a new wallet of either type. This enables users to manage security objects individually and add them to virtual wallets for sharing.

Oracle Key Vault can individually store and manage the security objects contained in:

  • Oracle wallet files

    Symmetric keys used for encryption (including TDE master encryption keys), passwords (Secure External Password Store), and X.509 certificates (network encryption).

    Oracle Key Vault supports wallet files from all supported releases, starting with Oracle Database 12.1.0.2 to Oracle Database 23c.

  • Java keystores

    Symmetric keys, asymmetric keys such as private keys, and X.509 certificates.

    Oracle Key Vault supports both JKS and JCEKS types of Java keystores.

The following figure illustrates the centralized storage of Oracle wallet files and Java keystores.

Figure 1-3 Centralized Storage of Oracle Wallet Files and Java Keystores

Description of Figure 1-3 follows
Description of "Figure 1-3 Centralized Storage of Oracle Wallet Files and Java Keystores"

1.3.3 Storage of Credential Files

Oracle Key Vault can back up credential files other than Oracle wallets and Java keystores for long-term retention and recovery.

Oracle Key Vault does not interpret the actual content of a credential file. It simply stores the entire file as an opaque object (a file designed to prevent tools such as Oracle Key Vault from interpreting its contents) and provides a handle to the endpoint for retrieval at a later time. A credential file contains security objects such as keys, passwords, SSH keys, Kerberos keytab files, and X.509 certificates.

You can directly upload credential files to Oracle Key Vault, consolidate them in a central repository, and share them across endpoints in a trusted group. Oracle Key Vault backs up all credential files for continued and secure access at any time. Access control to credential files is managed by Oracle Key Vault endpoint administrators.

The following figure illustrates how credential files are backed up in Oracle Key Vault.

Figure 1-4 Backing Up Credential Files

Description of Figure 1-4 follows
Description of "Figure 1-4 Backing Up Credential Files"

1.3.4 Online Management of Endpoint Keys and Secret Data

You can use the RESTful key management interface to manage the storage and retrieval of keys.

Applications, scripts, and third-party software can use the new interfaces to manage their keys and secrets in the Oracle Key Vault. They can retrieve the secrets or keys at run time and also generate and store new secrets or keys in Oracle Key Vault at run time. All objects managed by the user or operations executed by the user using the RESTful services utility have the same security and availability attributes and the same access control as those created by other Oracle Key Vault endpoint utilities such as okvutil.

1.4 Who Should Use Oracle Key Vault

Oracle Key Vault is designed for users who are responsible for deploying, maintaining, and managing security within the enterprise.

These users can be database, system, or security administrators, indeed any information security personnel responsible for protecting enterprise data in database servers, application servers, operating systems, and other information systems. They manage encryption keys, Oracle wallets, Java keystores, and other security objects on a regular basis.

Other users can include personnel responsible for Oracle databases, and servers that interact with Oracle Database, because Oracle Key Vault provides inherently tighter integration with Oracle database. These systems often deploy encryption on a large scale and may have a need to simplify key and wallet management.

1.5 Major Features of Oracle Key Vault

Oracle Key Vault enhances security in key management with a wide range of features that support different database deployments.

1.5.1 Centralized Storage and Management of Security Objects

You can store and manage security objects, such as TDE master encryption keys, wallets and keystores, and certificates, using Oracle Key Vault.

  • TDE master encryption keys

    For Oracle databases that use Transparent Data Encryption (TDE), Oracle Key Vault manages master encryption keys over a direct network connection using an online master encryption key as an alternative to using local wallet files. The keys stored in Oracle Key Vault can be shared across databases according to endpoint access control settings. This method of sharing keys without local wallet copies is useful when TDE is running on database clusters such as Oracle Real Application Clusters (Oracle RAC), Oracle Data Guard, or Oracle GoldenGate. You can easily migrate master encryption keys from Oracle wallets to Oracle Key Vault. Direct connections between TDE and Oracle Key Vault are supported for Oracle Database 12.1.0.2 or later.

  • Oracle wallets and Java keystores

    Oracle wallets and Java keystores are often widely distributed across servers and server clusters, with backup and distribution of these files performed manually. Oracle Key Vault itemizes and stores contents of these files in a master repository, yet allows server endpoints to continue operating with their local copies, while being disconnected from Oracle Key Vault. After you have archived wallets and keystores, you can recover them to their servers if their local copies are mistakenly deleted or their passwords are forgotten. Oracle Key Vault streamlines the sharing of wallets across database clusters such as Oracle RAC, Oracle Active Data Guard, and Oracle GoldenGate. Sharing wallets also facilitates the movement of encrypted data using Oracle Data Pump and the transportable tablespaces feature of Oracle Database, or when migrating (unplugging or plugging) a PDB. You can use Oracle Key Vault with Oracle wallets from all supported releases of Oracle middleware products and Oracle Database.

  • Credential files

    Applications store keys, passwords, and other types of sensitive information in credential files that are often widely distributed without appropriate protective mechanisms. Secure Shell (SSH) key files and Kerberos keytabs are examples of credential files. Oracle Key Vault backs up credential files for long-term retention and recovery, audits access to them, and shares them across trusted server endpoints.

  • Certificate files

    X.509 certificate files (common file extensions include .pem, .cer, .crt, .der, .p12) used to authenticate and validate user identities and encrypt data on communication channels may also be stored, shared, and managed in Oracle Key Vault.

1.5.2 Centrally Managed Remote Server Access Controls and Improved Private Key Governance for SSH Public Key Authentication

By centrally managing the private and public keys needed for public key authentication, Oracle Key Vault enables remote server access control and private key governance.

Administrators use SSH keys to access servers and IT systems, and that use has exploded with the rise of cloud computing. Unmanaged SSH key pairs used for SSH public key authentication are a security and management challenge. Oracle Key Vault helps organizations better manage their SSH keys in two ways:
  • Centralized access control – Administering users' public keys for SSH hosts in Oracle Key Vault makes provisioning and revocation of access to systems by administrators easy to manage. Administrators can provision a user's access to a remote server by uploading the user's public key into an SSH Server wallet in Oracle Key Vault. To deny access to the remote servers, SSH administrators only need to remove the user's public keys from the SSH Server wallets. Centralizing the management of SSH public keys allows administrators to track and report on access attempts.
  • Improved SSH key governance – Centralizing both private and public keys in a fault-tolerant, scalable, and continuously available key management system allows for enhanced key governance. With centralized key management, organizations can enforce corporate security policies such as required key length and algorithm, periodic key rotations, and key usage reporting and auditing. Furthermore, administrators can quickly restrict all remote access in case of an ongoing security incident. Security for SSH keys can be enhanced by generating a private/public SSH key pair on-board Oracle Key Vault and by making the private key non-extractable so it cannot leave Oracle Key Vault's cluster boundary. Copying the user's public key into the SSH Server wallet in Oracle Key Vault provides the user with server access. The end-user who attempts to access a remote server can do so as long as the public key is present in the remote server's SSH Server wallet and the user has access to the matching private key in Oracle Key Vault. Managing keys in Oracle Key Vault mitigates risks associated with disk-based private keys, including key theft, unauthorized copying and sharing of keys, and key loss.

1.5.3 Management of the Key Lifecycle

The management of the key lifecycle is critical for maintaining security and regulatory compliance, and consists of creation, backup, rotation, and expiration.

Oracle Key Vault provides mechanisms for facilitating periodic key rotations, backup, and recovery, which ensure that you can stay in regulatory compliance, unlike other systems that create keys and passwords. You can create policies to track the key lifecycle, and configure Oracle Key Vault to report key lifecycle changes as they happen. In this manner, you will know when keys are due to expire, and can ensure that they are properly rotated and backed up.

In addition, you can restrict symmetric and private keys from leaving the Oracle Key Vault cluster boundary. This restriction applies to the key material but not to its metadata. The cryptographic operations using such keys must be performed within Oracle Key Vault.

Key lifecycle tracking is very important to maintain compliance with industry and governmental standards, such as the Payment Card Industry Data Security Standard (PCI DSS), which deal with highly sensitive data, and therefore have stringent requirements regarding the maximum lifetime of encryption keys and passwords.

1.5.4 Reporting and Alerts

Oracle Key Vault provides reports and alerts to track system activity in depth.

  • Reports

    The Oracle Key Vault audit and management reports provide detailed statistics on system, user, and endpoint activity, certificate, key and password expiry, entitlement and metadata of security objects. Audit reports capture all user and endpoint actions, the objects of the actions, and their final result.

  • Alerts

    You can configure the types of alerts that you want to receive. These include alerts for the expiration of keys, endpoint certificates, and user passwords, disk utilization, system backup, and the Oracle Key Vault cluster events. You can choose to send alerts to syslog to allow for external monitoring.

1.5.5 Separation of Duties for Oracle Key Vault Users

Oracle Key Vault provides for separation of duties in the form of three console user roles and four endpoint privileges.

The roles are System Administrator, Key Administrator, and Audit Manager. The endpoint privileges are Create Endpoint, Manage Endpoint, Create Endpoint Group, and Manage Endpoint Group.

Each user role possesses privileges for a type of task and may be assigned to one user (for a strict separation of duties) or combined so a single user performs multiple user roles according to the needs of the organization.

The user who is responsible for uploading and downloading security objects between Oracle Key Vault and the endpoint is referred to as the endpoint administrator. Only endpoint administrators can directly access security objects provided they have been granted access and only through installing the endpoint software. You cannot retrieve security objects using the Oracle Key Vault management console.

1.5.6 Persistent Master Encryption Key Cache

The persistent master encryption key cache feature of the endpoint software enables databases to operate when the Oracle Key Vault server is unavailable.

The TDE master encryption key is cached in the persistent master encryption key cache in addition to the in-memory cache, to make the master encryption key available across database processes. It eliminates the need for databases to contact the Oracle Key Vault server for every new process, redo log switch, or database start-up operations.

The persistent master encryption key cache is not necessary in a multi-master cluster deployment. It is primarily used for standalone or primary-standby (deprecated) Oracle Key Vault deployments.

1.5.7 Backup and Restore Functionality for Security Objects

Oracle Key Vault enables you to back up all security objects including keys, certificates, and passwords.

It encrypts backups for better protection of the sensitive keys and security objects and supports storing them securely at a remote destination.

This feature prevents loss of your sensitive data in the case of server failure, because you can restore a new Oracle Key Vault server to a previous state from a backup.

Oracle Key Vault can transfer backup files to any remote location that implements the Secure Copy Protocol (SCP) or SSH Secure File Transfer Protocol (SFTP).

Users with the System Administrator role can perform the following backup and restore tasks in Oracle Key Vault:

  • Managing incremental and full backups
  • Creating, deleting, and modifying remote backup locations
  • Setting up, modifying, or disabling the current backup schedule
  • Initiating an immediate one-time backup
  • Scheduling a future one-time backup

Oracle Key Vault performs hot backup operation which means that the system is not interrupted while the backup is being created.

1.5.8 Management of Oracle Key Vault Using RESTful Services Utility

You can use Oracle Key Vault RESTful services utility to automate many of the configuration, deployment, and administration tasks at scale.

A large distributed enterprise deployment often requires automation through scripting to enable mass endpoint deployments, apply configuration changes, and perform routine management operations. The Oracle Key Vault RESTful services utility enables you perform all of these tasks in a way that facilitates faster deployment with less human intervention. You can use Oracle Key Vault RESTful services to automate the management of endpoints, wallets, access control, deployment operations, and backup operations at scale.

The Oracle Key Vault RESTful services utility also enables the automation of most key management functions at scale by providing a simplified interface to Key Management Interoperability Protocol (KMIP) operations. The RESTful services utility allows operations on managed objects such as keys, certificates, and other objects in a simple manner without requiring any client side development.

1.5.9 Support for OASIS Key Management Interoperability Protocol (KMIP)

You can use Oracle Key Vault with a range of OASIS KMIP version 1.1 profiles.

OASIS Key Management Interoperability Protocol (KMIP) standardizes key management operations between key management servers and endpoints provided by different vendors.

Oracle Key Vault implements the following OASIS KMIP version 1.1 profiles:

  • Basic Discover versions Server Profile: Provides the server version to endpoints.

  • Basic Baseline Server KMIP Profile: Provides core functionality to retrieve objects from the server.

  • Basic Secret Data Server KMIP Profile: Provides endpoints the ability to create, store, and retrieve secret data (typically passwords) on the server.

  • Basic Symmetric Key Store and Server KMIP Profile: Provides endpoints the ability to store and retrieve symmetric encryption keys on the server.

  • Basic Symmetric Key Foundry and Server KMIP Profile: Provides endpoints the ability to create new symmetric encryption keys on the server.

Note:

Oracle Key Vault KMIP Server now uses KMIP protocol version 1.1 as its preferred version. In earlier releases of Oracle Key Vault, even though the KMIP server accepted and processed client requests with KMIP version 1.1, it always sent the server response with the KMIP version 1.0. Now, the KMIP server sends a response with the protocol version with which the KMIP request was made. The KMIP server is also enhanced to return an error for client requests that are made with unsupported KMIP version. Such error responses are returned using the server’s preferred KMIP version which is currently set to 1.1.

1.5.10 Database Release and Platform Support

Oracle Key Vault supports following Database Release and Platform.

Oracle Key Vault supports Oracle Database releases from 12.1.0.2 to 23c on Oracle and RedHat Linux, Solaris (SPARC and x86), SuSE Linux Enterprise Server, AIX, HP-UX (IA) and Windows Server.

1.5.11 Integration with External Audit and Monitoring Services

Oracle Key Vault audit records can be collected by Oracle Audit Vault, contributing to a complete picture about security-relevant events in your enterprise.

SNMP and RESTful monitoring commands can monitor Oracle Key Vault cluster health and maintain its availability. Oracle Key Vault audit data and alerts, system activity, and information about Oracle Key Vault cluster operations can be forwarded to a SYSLOG server.

1.5.12 Integration of MySQL with Oracle Key Vault

Oracle Key Vault can manage MySQL TDE encryption keys.

Note:

MySQL Windows databases are not supported.

1.5.13 Oracle Advanced Cluster File System Encryption

Oracle Key Vault supports key management for Oracle Advanced Cluster File System (Oracle ACFS) encryption.

Note:

Starting with Oracle Database 21c, the name of Oracle Automatic Storage Management Cluster File System (Oracle ACFS) is changed to Oracle Advanced Cluster File System (Oracle ACFS).

This change is only a change of the name. The basic function of Oracle's cluster file system continues to be the same. Oracle continues to develop and enhance Oracle ACFS.

1.5.14 Support for Cloud-Based Oracle Database Deployments

An Oracle Key Vault cluster, deployed on-premises (on dedicated hardware or as a virtual machine) or in your Oracle Cloud Infrastructure (OCI) tenancy from the Oracle Cloud Marketplace, in Microsoft Azure or Amazon AWS, can provide key management for ExaDB-C@C, ADB-C@C, ExaDB-D and ExaDB-D@Azure, as well as Oracle databases deployed on-premises or in Microsoft Azure and Amazon AWS.

1.5.15 Oracle Key Vault Hardware Security Module Integration

Oracle Key Vault can use a hardware security module (HSM) as a Root of Trust (RoT) that protects encryption keys.

HSMs are built with specialized tamper-resistant hardware which is harder to access than normal servers. This protects the RoT and makes it difficult to extract sensitive key material, lowering the risk of compromise. In addition, you can use HSMs in FIPS 140-2 Level 3 mode which can help meet certain compliance requirements.

1.5.16 Continuous Availability, Fault-tolerance, and High Availability through Oracle Key Vault Clustering

You can use Oracle Key Vault to configure continuous availability and fault-tolerance using node clustering.

Oracle Key Vault can be installed in a cluster with up to 16 nodes. Clusters consist of up to eight read/write pairs. These read/write pairs are updated synchronously; when one Oracle Key Vault node creates a key for a TDE-enabled database, the transaction completes only after the key has been replicated to at least one other node. Clustering also allows rolling upgrades to Oracle Key Vault cluster nodes without interruptions to your application availability, even if Oracle Key Vault is operated with non-extractable TDE keys.

1.6 Oracle Key Vault Interfaces

Oracle Key Vault provides both a graphical user interface and command-line interfaces.

1.6.1 Oracle Key Vault Management Console

The Oracle Key Vault management console is a browser-based graphical user interface that Key Vault administrators use to perform day-to-day tasks.

It enables Oracle Key Vault administrators to manage keys and sensitive objects, wallets, endpoints, and users. The console can also configure settings for individual Oracle Key Vault servers, as well as multi-master clusters, backup, and recovery.

1.6.2 Oracle Key Vault okvutil Endpoint Utility

Endpoint administrators can use the okvutil command-line utility to upload and download security objects between Oracle Key Vault and endpoints.

The okvutil utility communicates with Oracle Key Vault over a mutually authenticated secure connection.

1.6.3 Oracle Key Vault RESTful Services

You can use the Oracle Key Vault RESTful Services utility to automate processes for a large distributed enterprise deployment.

This utility enables you to automate the management of endpoints, wallets, security objects, deployment operations, and backup operations using RESTful services that are JSON compliant.

1.6.4 Oracle Key Vault Client SDK

Various Oracle and non-Oracle products can use the Oracle Key Vault client SDK to integrate directly with Oracle Key Vault.

The client SDK is available in both Java and C. It has a comprehensive set of high-level and low-level APIs and sample programs.

1.7 Overview of an Oracle Key Vault Deployment

Oracle Key Vault provides two different deployment options.

  • A multi-master cluster configuration allows for up to 16 nodes for scalability and high availability. This is the recommended deployment. Usually, read-write pairs follow the deployment of Oracle Data Guard primary and standby databases, potentially stretching across geographically distributed data centers, or even stretching from on-premises into an Oracle Cloud Infrastructure (OCI), Microsoft Azure, and Amazon AWS tenancy.
  • A standalone deployment is simplest to deploy. However, it does not provide continuous availability of the key service in the event an Oracle Key Vault server becomes unavailable.

You can use the following steps as a guideline to deploying Oracle Key Vault within your organization:

  1. Understand important concepts described in Oracle Key Vault Concepts and Oracle Key Vault Multi-Master Cluster Concepts.

  2. Install and configure Oracle Key Vault as described in Oracle Key Vault Installation and Upgrade Guide .

  3. Create a multi-master cluster by adding up to 16 Oracle Key Vault servers for maximum redundancy and reliability. This is described in Configuring System Settings for an Entire Oracle Key Vault Multi-Master Cluster.

    You must have a separate license for each Oracle Key Vault server installation in a multi-master cluster environment.

  4. Create users to manage the day-to-day tasks for Oracle Key Vault as described in Managing Oracle Key Vault Users.

  5. Register endpoints so that they can use Oracle Key Vault to store and manage their security objects described in Managing Oracle Key Vault Endpoints.

  6. Register endpoints in the cloud described in Oracle Database Instances in Oracle Cloud Infrastructure.

  7. Enroll endpoints so that you can upload or download security objects between the endpoints and Oracle Key Vault described in Enrolling and Upgrading Endpoints for Oracle Key Vault.

  8. Upload or add virtual wallets to Oracle Key Vault described in Managing Oracle Key Vault Master Encryption Keys.

  9. Use automating endpoint enrollment and provisioning for large-scale deployments in Oracle Key Vault RESTful Services Administrator's Guide .

  10. Read about using Oracle Key Vault with other features, such as Oracle GoldenGate, in Managing Keys for Oracle Products.

  11. Automate key management to perform online key management with other software using RESTful services utility and client SDK, as described in Oracle Key Vault RESTful Services Administrator's Guide .

  12. Learn how to perform periodic maintenance tasks such as administering and monitoring the system, as described in Oracle Key Vault General System Administration.

  13. Learn how to monitor Oracle Key Vault by performing tasks such as creating alerts, as described in Monitoring and Auditing Oracle Key Vault.