Integrating TDE with CipherTrust Manager on Oracle 19c Exadata Cloud@Customer (ExaCC)
This section outlines the following steps to integrate TDE with the CipherTrust Manager on Oracle 19c Exadata Cloud@Customer (ExaCC):
Migrating from File Wallet to HSM Wallet
Migrating Auto-Login File Wallet to Auto-Login HSM Wallet
You can directly migrate a software-based Auto-Login enabled wallet to an Auto-Loginenabled HSM wallet. If you have a software wallet configured already, the content of the spfile
file and wallet information will have the following structure:
Output:
WRL_TYPE | WRL_PARAMETER | WALLET_TYPE | STATUS |
---|---|---|---|
FILE | <software_wallet_location> | AUTOLOGIN | OPEN |
Rename or move the
cwallet.sso
file from the location specified above to any other location.Restart the database and open the software keystore.
Add the secret to the software keystore. This secret is the HSM's password and the client is
HSM_PASSWORD
.HSM_PASSWORD
is an oracle defined client name that represents the HSM password as a secret in the software keystore.
You must include the<cm_user:cm_user_password>
andHSM_PASSWORD
in single quotes. It will not work if you do not do this.Create a new Auto-Login keystore using the password of the Oracle software wallet.
Set
TDE_CONFIGURATION
parameter.Migrate the Auto-Login software wallet to Auto-Login HSM wallet.
Create new MEK on CM.
To sync the secondary node restart the Oracle 19C database.
Migrating Auto-Login File Wallet with United PDB to Auto-Login HSM Wallet with United PDB
You can directly migrate a software-based Auto-Login enabled wallet to an Auto-Login enabled HSM wallet. If you have a software wallet configured already, the content of the spfile
file and wallet information will have the following structure:
Output:
WRL_TYPE | WRL_PARAMETER | WALLET_TYPE | STATUS |
---|---|---|---|
FILE | <software_wallet_location> | AUTOLOGIN | OPEN |
Rename or move the
cwallet.sso
file from the location specified above to any other location.Restart the database and open the software keystore.
Set the
TDE_CONFIGURATION
parameter.Migrate the Software wallet to HSM wallet.
Set the master encryption key for the HSM keystore.
Closed the HSM keystore.
Set the
TDE_CONFIGURATION
parameter.Open all PDBs.
Check the wallet status.
Add the secret to the software keystore. This secret is the HSM's password and the client is
HSM_PASSWORD
.HSM_PASSWORD
is an oracle defined client name that represents the HSM password as a secret in the software keystore.You must include the
<cm_user:cm_user_password>
andHSM_PASSWORD
in single quotes. It will not work if you do not do this.Create a new Auto-Login keystore using the password of the Oracle software wallet.
Set the
TDE_CONFIGURATION
parameter.Restart the database.
Open the PDB in read-write mode.
Check Wallet status.
Connect to the PDB.
Check Wallet status.
To sync the secondary node restart the Oracle 19C database.
Migrating back from Auto-login HSM Wallet to Auto login File Wallet
If you want to switch from an HSM keystore to a software keystore then you can use reverse migration of the keystore.
Note
It is recommended to keep the HSM. Earlier backup files may rely on TDE master encryption keys present in the HSM.
Navigate to
<software_wallet_location>/tde
directory and rename thecwallet.sso
file tocwallet_backup.sso
.Set
TDE_CONFIGURATION
parameter.Run Reverse Migration command.
After you complete the reverse migration, you do not need to restart the database or manually reopen the software keystore.
Restart the database and open the software keystore.
Create a new Auto-Login keystore using the password of the Oracle software wallet.
Restart the database.
Check Wallet status.
To sync the secondary node restart the Oracle 19C database.