PDB to CDP
Prerequisites
KeySecure Classic is up and running at a supported version. Refer to the KeySecure Classic documentation for details.
A supported PDB version is configured with that KeySecure Classic. Refer to the PDB documentation for details.
CipherTrust Manager is up and running at a supported version. Refer to CipherTrust Manager Deployment for details.
pdbctl utility is installed. Refer to pdbctl Utility Documentation for details.
Note
If you are running an unsupported version, upgrade your environment to a supported version before proceeding. Refer to the corresponding product documentation for upgrade instructions.
Supported Versions
Current Setup
Product | Version |
---|---|
PDB for Oracle | 8.8.0 or higher |
PDB for SQL Server | 8.9.0 or higher |
PDB for DB2 | 8.7.0 or higher |
KeySecure Classic | 8.12.2 or higher |
Target Setup
Product | Version |
---|---|
CDP for Oracle | 8.12.0 or higher |
CDP for SQL Server | 8.12.0 or higher |
CDP for DB2 | 8.12.0 or higher |
CipherTrust Manager | 2.2.0 or higher |
Migration Steps
The migration steps slightly vary based on the CipherTrust Manager's version used by the user.
Back up keys, users, and certificates on the KeySecure Classic UI. Refer to Creating a Backup File for details.
Tip
While taking a backup, on the
Create Backup
screen, select theProtectDB Manager
check box.Restore the backup on the CipherTrust Manager. Refer to Migrating the Backup File for details.
Note
The local users migrated from KeySecure Classic become a part of the Key Admin and User Admin groups by default.
You can manage the access rights for each of these users by adding or removing them from a particular group according to the requirement.
To perform CipherTrust Database Protection related operations on the CipherTrust Manager UI, a local user must be part of the ProtectDB group. Refer to System Defined Groups for details.
Replicate database connections on CipherTrust Manager. This step will migrate the database connections on KeySecure Classic to the CipherTrust Manager. The database connections must be recreated on the CipherTrust Manager with the same connection details.
Viewing database connection information on KeySecure Classic
Log on to KeySecure Classic as an administrator.
Navigate to the Database List section (Security > Databases).
Select the database connection and click Edit Connection to view the connection information.
Replicating database connection on CipherTrust Manager
Log on to the CipherTrust Manager GUI as administrator.
Click CDP tile to open the application.
The Databases screen displays the list of existing database connections, if any.
Enter the Connection Information details in the respective fields. The connection information details must have the same values as specified in step 1. For more information about the fields, refer to the Managing Database Connection section of the CDP Server Admin Guide.
Click Save.
The newly added database appears on the Databases screen. The Status column reflects the status of the connection.
Click the refresh icon on the screen if the status is not updated.
Update properties file. After the server configurations are done, update the
ProtectDB.properties
file with theNAE_IP
andNAE_Port
of the CipherTrust Manager. To reflect the changes in the properties file, perform the following steps. These steps vary for each CDP client.Oracle
Update the
ProtectDB.properties
file.For Linux, the properties file is copied to the
<ORACLE_HOME>/lib/safenet/
directory.For Windows, the properties file is copied to the
<ORACLE_HOME>\bin\
directory.
Execute the
loadProperties.sh
(UNIX/Linux) orloadProperties.bat
(Windows) scripts. These scripts are placed at the following location:Unix/Linux:
<ORACLE_HOME>/lib/safenet/
Windows:
<ORACLE_HOME>\bin\
SQL Server
Update the
ProtectDB.properties
file. The properties file is copied to theC:\Program Files\SafeNet\MsSqlProvider\MSSQLSERVER
directory.Restart the database server.
DB2
Update the
ProtectDB.properties
file. The properties file is copied to theJAVA_HOME/lib/ext
directory.Restart the database.
Configure error replacement values on CipherTrust Manager. Unlike all other column encryption properties, the Error Replacement property does not get saved in the metadata. So, to use this option, it must be set for each encrypted and to be encrypted column.
To set Error Replacement:
Log on to the CipherTrust Manager GUI.
Click the CDP tile to open the application. The Databases screen displays the list of existing database connections, if any.
Click the overflow icon corresponding to the desired database connection.
Click on Manage Tables. The list of tables is displayed on the screen.
Set the Error Replacement option in the encryption properties of the columns of the listed tables. Refer to the Managing Tables section of the CDP Server Admin Guide for details.
If required, upgrade the CipherTrust Database Protection clients. Refer to the CipherTrust Database Protection documentation for details.
Back up keys, users, and certificates on the KeySecure Classic UI. Refer to Creating a Backup File for details.
Tip
While taking a backup, on the
Create Backup
screen, select theProtectDB Manager
check box.Restore the backup on the CipherTrust Manager. Refer to Migrating the Backup File for details.
Note
The local users migrated from KeySecure Classic become a part of the Key Admin and User Admin groups by default.
You can manage the access rights for each of these users by adding or removing them from a particular group according to the requirement.
To perform CipherTrust Database Protection related operations on the CipherTrust Manager UI, a local user must be part of the ProtectDB group. Refer to System Defined Groups for details.
Replicate database connections on CipherTrust Manager. This step will migrate the database connections on KeySecure Classic to the CipherTrust Manager. The database connections must be recreated on the CipherTrust Manager with the same connection details.
Viewing database connection information on KeySecure Classic
Log on to KeySecure Classic as an administrator.
Navigate to the Database List section (Security > Databases).
Select the database connection and click Edit Connection to view the connection information.
Replicating database connection on CipherTrust Manager
Log on to the CipherTrust Manager GUI as administrator.
Click CDP tile to open the application.
The Databases screen displays the list of existing database connections, if any.
Enter the Connection Information details in the respective fields. The connection information details must have the same values as specified in step 1. For more information about the fields, refer to the Managing Database Connection section of the CDP Server Admin Guide.
Click Save.
The newly added database appears on the Databases screen. The Status column reflects the status of the connection.
Click the refresh icon on the screen if the status is not updated.
Update properties file. After the server configurations are done, update the
ProtectDB.properties
file with theNAE_IP
andNAE_Port
of the CipherTrust Manager. To reflect the changes in the properties file, perform the following steps. These steps vary for each CDP client.Oracle
Update the
ProtectDB.properties
file.For Linux, the properties file is copied to the
<ORACLE_HOME>/lib/safenet/
directory.For Windows, the properties file is copied to the
<ORACLE_HOME>\bin\
directory.
Execute the
loadProperties.sh
(UNIX/Linux) orloadProperties.bat
(Windows) scripts. These scripts are placed at the following location:Unix/Linux:
<ORACLE_HOME>/lib/safenet/
Windows:
<ORACLE_HOME>\bin\
SQL Server
Update the
ProtectDB.properties
file. The properties file is copied to theC:\Program Files\SafeNet\MsSqlProvider\MSSQLSERVER
directory.Restart the database server.
DB2
Update the
ProtectDB.properties
file. The properties file is copied to theJAVA_HOME/lib/ext
directory.Restart the database.
If required, upgrade the CipherTrust Database Protection clients. Refer to the CipherTrust Database Protection documentation for details.
Upgrade the pdbctl utility to 1.6.0. For details, refer to pdbctl Utility Documentation for details.
Limitations
The following operations cannot be performed through the CipherTrust Manager UI. You need the pdbctl utility to perform these operations:
View job history
Delete views and triggers
Create domain index
Create views and triggers
Delete old data
Encrypt table
Decrypt column
The key rotation operation can not be performed using the CipherTrust Manager UI. However, you can rotate key using the pdbctl utility.