2.357 TDE_CONFIGURATION
TDE_CONFIGURATION is used for per-PDB configuration for Transparent Data Encryption (TDE).
Before Oracle Database 18c, each PDB stored its separate encryption keys in the CDB’s keystore (united mode). Starting with Oracle Database 18c Cloud environments, a PDB can optionally store its encryption keys in a separate keystore (isolated mode), thus allowing protection by a separate keystore password. This functionality is not available for on-premise environments.
The WALLET_ROOT initialization parameter must be set in order for TDE_CONFIGURATION to take effect.
| Property | Description |
|---|---|
|
Parameter type |
String |
|
Syntax |
|
|
Syntax |
value ::=
Note: |
|
Default value |
None |
|
Modifiable |
|
|
Modifiable in a PDB |
Yes |
|
Basic |
No |
|
Oracle RAC |
The same value must be specified on all instances using the |
Footnote 1
In some cases when this parameter is set using ALTER SYSTEM SCOPE=SPFILE, the SHOW PARAMETER TDE_CONFIGURATION statement does not show the correct value. However, the value set for TDE_CONFIGURATION can be derived from information shown in the V$ENCRYPTION_WALLET view.
The following attributes can be specified:
-
KEYSTORE_CONFIGURATIONattribute. This attribute is required. The value specified with this attribute configures the keystore type for the specified PDB. The following values can be specified for this attribute:-
FILE: This value configures a wallet keystore. -
OKV: This value configures an Oracle Key Vault (OKV) keystore.This value is also used to disable an auto-login OKV configuration and cause any existing
cwallet.ssofiles, containing the credentials to the OKV server as theOKV_PASSWORDclient secret, to be ignored. -
HSM: This value configures a Hardware Security Module (HSM) keystore. -
FILE|OKV: This value configures a reverse migration from an OKV to a wallet keystore. -
FILE|HSM: This value configures a reverse migration from a HSM to a wallet keystore. -
OKV|FILE: This value configures a migration from a wallet to an OKV keystore.This value is also used in an auto-login OKV configuration, because in this configuration a
cwallet.ssofile, containing theOKV_PASSWORDclient secret, must be used by the Oracle server to obtain the credentials to log in to the OKV server. -
HSM|FILE: This value configures a migration from a wallet to a HSM keystore.This value is also used in an auto-login HSM configuration, because in this configuration a
cwallet.ssofile, containing theHSM_PASSWORDclient secret, must be used by the Oracle server to obtain the credentials to log in to the HSM server.
Some of the
KEYSTORE_CONFIGURATIONattribute values consist of a single word, for example, theFILE,OKV, andHSMvalues. The otherKEYSTORE_CONFIGURATIONattribute values consist of two words separated by the “|” character that is a required part of the value’s syntax, for example, theFILE|OKV,FILE|HSM,OKV|FILE, andHSM|FILEvalues.In Oracle Database releases prior to Oracle Database 18.1, keystore types were configured in
sqlnet.orausing theMETHODattribute of theSQLNET.ENCRYPTION_WALLET_LOCATIONparameter. -
-
CONTAINERattribute: This optional attribute can be used only when setting the parameter in theCDB$ROOTof a CDB. TheCONTAINERattribute can be specified only when theCDB$ROOTis inMOUNTEDstate. With this attribute, you must specify the name of the PDB for which you are setting the parameter. When you specify theCONTAINERattribute, you must use a semicolon “;” as the separation character between theKEYSTORE_CONFIGURATIONandCONTAINERattributes.
Examples
The following statement configures a wallet keystore for the open PDB from which the statement is issued:
ALTER SYSTEM SET TDE_CONFIGURATION="KEYSTORE_CONFIGURATION=FILE" SCOPE=BOTH SID='*';
The following statement configures an OKV keystore for the PDB in MOUNTED state from which the statement is issued:
ALTER SYSTEM SET TDE_CONFIGURATION="KEYSTORE_CONFIGURATION=OKV" SCOPE=SPFILE SID='*';
The following statement configures a HSM keystore for the ORCLPDB PDB. For this statement to succeed, the parameter must be set in the CDB$ROOT of a CDB when the CDB$ROOT is in MOUNTED state:
ALTER SYSTEM SET TDE_CONFIGURATION="KEYSTORE_CONFIGURATION=HSM; CONTAINER=ORCLPDB" SCOPE=MEMORY SID='*';
See Also:
-
Oracle Database Advanced Security Guide for information about managing keystores and encryption keys in united mode
-
Oracle Database Advanced Security Guide for information about managing keystores and encryption keys in isolated mode