3 General Security Guidelines
Learn about general security guidelines for Oracle Audit Vault and Database Firewall.
3.1 Installing Oracle Audit Vault and Database Firewall Securely to Protect Your Data
Learn how to securely install Oracle AVDF to protect your data.
3.1.1 Installing Oracle Audit Vault and Database Firewall Securely
Learn to securely install Oracle Audit Vault and Database Firewall.
Oracle Audit Vault Server installs in a secure state by default. Therefore, it is important to be careful if you change any of the default settings because your changes may compromise the security of your setup.
See Also:
Oracle Audit Vault and Database Firewall Installation Guide for details of the installation.
3.1.2 Protecting Your Data
Consider account naming, password use, and other guidelines to better enable Oracle AVDF to protect your data.
Consider following these guidelines to protect your data:
-
Account Names and Passwords: Use secure passwords for the Oracle Audit Vault Server console UI, as well as for the
root
,support
, andsys
accounts and keep these passwords safe. -
Administrator Accounts: Do not share Oracle Audit Vault and Database Firewall Administrator accounts.
-
Strong Password Policies: Encourage users to adopt strong passwords.
-
Installed Accounts: Oracle Audit Vault and Database Firewall embeds operating system and database accounts. Do not add new accounts of this type. Do not unlock the existing accounts. Doing so may compromise the security of the Oracle Audit Vault and Database Firewall system.
-
Secure Archiving: Oracle Audit Vault and Database Firewall sends archive data over the network. Secure both the archive destination and intermediate network infrastructure.
-
Remote Access: The Settings tab of the services page of Oracle Audit Vault Server console controls access to:
- web console
- shell (ssh)
- SNMP
Follow these guidelines when granting remote access:
-
Grant access only if you need it for a specific task and then revoke access when that task is completed.
-
Restrict access by IP address. Do this immediately after installing the system.
-
Grant terminal (shell) access only when doing a patch update or when requested to do so by the documentation or by Oracle support.
3.2 General Security Recommendations
Follow these general security recommendations for Oracle Audit Vault Server and Database Firewall (Oracle AVDF).
- If you are using the Database Firewall to block unwanted traffic, then ensure that all data flowing from the database clients to the database and back passes through the Oracle Database Firewall. This includes both requests and responses.
- Use the appropriate security measures for your site to control access to the computer that contains Oracle AVDF. Give access only to specific and trusted users, because someone with physical or virtual access to the console during installation can compromise the security of the installed system.
- Ensure that passwords conform to best practice.
- Separate the duties of administrators and auditors by assigning these roles to different people.
- Assign the Audit Vault Server user the appropriate administrator, super administrator, auditor, and super auditor roles.
- By default, the following accounts that are related to Oracle AVDF are locked: the
Oracle OS user account, Oracle Grid accounts, any Oracle Database Vault accounts
(for example, users who have been granted the
DV_OWNER
andDV_ACCTMGR
roles). Ensure that these accounts remain locked. - Avoid sharing passwords between users and login sessions. Add new operating system users to distinguish access by different people.
- When configuring system log forwarding, use suitable encryption to avoid giving actors with network access (such as network administrators) access to potentially sensitive data. See Configuring Remote Syslog Over TLS.
- Database accounts
AGENTUSR#
andAVSRCUSR#
belong to theAVS_NONINTERACTIVE
profile prior to Oracle AVDF 20.9 and theAVS_AGENT_NONINTERACTIVE
profile starting with Oracle AVDF 20.9. These accounts are created whenever a new agent or target is added. The passwords for these accounts are generated internally and starting in Oracle AVDF 20.9, the passwords are also rotated periodically. Oracle recommends that you do not modify theAGENTUSR#
andAVSRCUSR#
accounts including modifying password lifetime, failed login attempts, or the password. For more information, see Updating the Passwords of the AGENTUSR# and AVSRCUSR# Accounts. - Database account
AVREPORTUSER
belongs to theAVS_NONINTERACTIVE
profile. Oracle recommends that you do not modify theAVREPORTUSER
account including modifying password lifetime or failed login attempts.
3.3 External Network Dependencies
Ensure the security of your Oracle AVDF configuration by considering important external network dependencies.
When you add an external network service to Audit Vault Server or Database Firewall, you include these services to the trust model of your deployment.
For example, when you add a DNS server to an appliance, you trust the DNS server to provide the correct information about the host names that you look up. If someone compromises the DNS server, then they can control the network endpoints that are accessed by Audit Vault Server or Database Firewall using the host name.
There are analogous trust relationships in other services too, for example, NFS or NTP.
For this reason, add network services to Audit Vault Server or Database Firewall only when the following are adequately secure:
- the service
- the host server
- the intermediate network
3.4 Considerations for Deploying Network-Based Solutions
Learn about what to consider when deploying network-based solutions.
3.4.1 Monitoring Encrypted Traffic with the Database Firewall
The Database Firewall supports monitoring Native Network Encrypted (NNE) traffic if it is configured between a database client and an Oracle Database.
Starting with Oracle Audit Vault and Database Firewall (Oracle AVDF) release 20.7, the Database Firewall supports monitoring TLS-encrypted SQL traffic between a database client and an Oracle Database when the Database Firewall is deployed in proxy mode. The Database Firewall acts a TLS proxy terminating the session from the database client and creating a new TLS outbound session to the database server.
Starting with Oracle AVDF release 20.8, the Database Firewall supports monitoring TLS-encrypted SQL traffic between the database client and Oracle Real Application Clusters (Oracle RAC).
To monitor TLS traffic for non-Oracle databases, you can use TLS termination solutions to terminate TLS traffic just before it reaches the Database Firewall.
3.4.2 Managing Database Firewall Server Side SQL and Context Configurations
Learn how to manage Database Firewall SQL and context configurations.
Database Firewall policy enforcement relies on capturing and understanding SQL
traffic between the database client and server. Because Database
Firewall only analyzes network traffic between the application
tier and the database server, the firewall cannot examine SQL
that is directly sent from the database server. Some of the
types of SQL statements that Database Firewall cannot examine
are system provided and user defined SQL that you run from
stored procedures and callouts. The firewall also cannot examine
SQL that you run from background jobs, such as those that
created by the DBMS_JOB
or
DBMS_SCHEDULER
PL/SQL packages in
Oracle databases, or SQL that is indirectly run from DDLs or
other SQL statements. You can use the Oracle AVDF auditing
features to capture these types of SQL statements.
Database Firewall builds its execution context entirely from the information that it captures from the network traffic. However, enforcement may depend on context information on the server. Any lack of context affects the resolution of identifiers that you use in database objects.
3.4.3 How Oracle AVDF Works with Various Database Access Paths
Learn how Oracle AVDF works with database access paths.
Oracle AVDF works with the following types of database access paths:
-
Non SQL protocol access: Database platforms support different network protocols beyond the database SQL based protocols. For example, Oracle Database supports HTTP, FTP, Advanced Queuing, Direct Path, and NFS access to the data in the database. The Database Firewall provides policy enforcement only for SQL based access to the database. The protocols that Database Firewall understands are Oracle TTC/Net and Tabular Data Stream (TDS) for Microsoft SQL Server, Sybase ASE, and IBM Distributed Relational Database Architecture (DRDA).
-
IPv6 Connections: Oracle AVDF does not support IPv6 deployments.
-
Non TCP based Connections: Database Firewall only supports TCP based network connections to database servers. It cannot monitor connections that are made to database servers using non TCP protocols such as Systems Network Architecture (SNA), Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX).
3.4.4 Database Firewall Configuration for Oracle Database Target Configured in Shared Server Mode
Learn about managing Database Firewall shared server configuration.
Shared server architectures enable databases to permit user processes to share server processes. A dispatcher process directs multiple incoming network session requests to a common queue, and then redirects these session requests to the next available process of the shared server. By default, Oracle Database creates one dispatcher service for the TCP protocol. In the init.ora
file, this setting is controlled by the DISPATCHERS
parameter, as follows:
dispatchers="(PROTOCOL=tcp)"
In the default configuration, a dynamic port listens to the incoming connection using the TCP protocol. With a shared server configuration, many user processes connect to a dispatcher on this dynamic port. If the Database Firewall is not configured to monitor the connections on this port, then the policy cannot be enforced on these connections. To facilitate the Database Firewall connection configuration, you should explicitly include the port number in the DISPATCHERS parameter. For example:
dispatchers="(PROTOCOL=tcp)(PORT=
nnnn)"
Choose a value for nnnn, and configure the Database Firewall to protect that address, alongside the usual listener address.
See Also:
-
Oracle Database Administrator's Guide for more information about managing shared servers
-
Oracle Database Reference for more information about the
DISPATCHERS
parameter
3.4.5 Additional Client and Listener Behavior Considerations
Learn about additional issues to be aware of with clients and shared listeners.
-
Client-side context: You can configure Oracle Database Firewall policies to use client-side context information such as client program name, client operating system username, and so on. After the client transmits this information to the database, Oracle Database Firewall captures it from the network. Oracle Database Firewall does not control or enforce the integrity of the client side or network. Consider the integrity of this information before using it to define security policies.
-
Multiple databases and services on a shared listener: Oracle Database Firewall supports policies based on Oracle Database service names. For non-Oracle databases, Oracle Database Firewall enforces policies that are based on the IP address and port number. In a configuration where a single listener endpoint (IP_address:port) is shared among multiple databases, Oracle Database Firewall cannot differentiate traffic that is directed to each individual database.
3.5 Security Considerations for Custom Collector Development
Learn about security considerations for Custom Collector Development.
3.5.1 Custom Collector Development
Learn about custom collector development.
Note the following if you develop custom collectors:
- Prevent resource leaks. Ensure that JDBC resources are closed appropriately. These resources include the connections, result sets, and statements.
- Prevent data loss. Ensure that your audit data is purged from the target system only after it has been successfully collected by the custom collector.
- Avoid frequent queries to the target system.
- Ensure that the custom collector does not consume a lot of system resources such as CPU and memory on the target host.
- Avoid logging audit data because the audit records contain sensitive information.
- Grant only the required privileges on the target system to users who have access to the Agent.
- Ensure that only necessary files are added to custom collector
.jar
file. - Ensure that your custom collector code collects the audit data from your target system securely.
Note:
The collection framework ensures that audit data is transferred from the collector to Oracle Audit Vault Server securely.
3.6 About Setting Transport Layer Security Levels
Learn about setting Transport Layer Security (TLS) levels in Oracle AVDF.
This topic describes the different levels of connection encryption deployed on Oracle Audit Vault and Database Firewall appliances. Oracle AVDF uses TLS for inter component communication.
You can change the TLS levels and cipher suites for the following:
-
Connection between Audit Vault Server and the Agent or Host Monitor Agent
-
Connection between Host Monitor Agent and Database Firewall
-
Connection between Audit Vault Server and Database Firewall
-
Audit Vault Server console and the end user browsers
Note:
-
Adhere to Host Monitor Agent Requirements.
-
If any Agent is using
Java 1.6
, then upgrade theJava
version to1.8
.
Connection Encryption Strength Used On Oracle AVDF Appliances
TLS Level | TLS Version | Description |
---|---|---|
Level-4 (Default on new installation) |
|
This level is the strongest, restricting TLS to version 1.2 for inter communication between all the components in Oracle Audit Vault and Database Firewall. Note: It is recommended to use Level-4 for all services unless the supported service explicitly requires a lower level of TLS. |
Level-3 |
|
This level supports everything that Level-4 does. For Oracle AVDF releases 20.1 to 20.3:
Starting Oracle AVDF 20.4, Level-3 uses TLS 1.2 for Audit Vault Agent to Audit Vault Server communication. It is the same for Host Monitor Agent to Database Firewall communication. |
Level-2 |
|
This level adds support for legacy and deprecated ciphers. Note:
|
Level-1 (Custom) |
|
This is a customizable cipher set that is configured with Level-4 strength by default. |
How To Change TLS Levels and Other Tasks
Row No. | Task | Command | Detailed Information |
---|---|---|---|
1 |
To check the existing TLS levels for Audit Vault Server and Database Firewall. |
|
Log in as support user and run this command. Use this command to check the actual configuration of the Audit Vault Server and Database Firewall. |
2 |
To set the TLS level and to find more options. |
|
Log in as root user and run this command. By default, on a new installation the TLS level is set to Level-4. On upgrade it is set to Level-2 by default. This is appropriate to most of the situations. It is possible to change the level set. Use this command to find the options available. |
3 |
To set TLS level for the Audit Vault Sever console. |
|
Log in as root user and run this command. This
command sets the TLS level for web browser
connections to the AVS GUI. The levels can be set
to |
4 |
To set TLS level for communication between Audit Vault Server and Database Firewall. |
|
Log in as root user and run this command. This
command sets the desired TLS level and restarts
the internal services. The levels can be set to
|
5 |
To set the TLS level for Audit Vault Agent to Audit Vault Server, and Host Monitor Agent to Database Firewall communication. |
|
Log in as root user and run this command. This command sets the TLS level for
communication between the Audit Vault Agent to Audit Vault Server, and Host
Monitor Agent to Database Firewall. The levels can be set to Note: Perform the following steps to
upgrade all Agents to the specified TLS levels
after executing the
1. Log in to the Audit Vault Server console as root user. 2. Change the directory by using the command:
3. Execute the script using the command:
This command must not be executed more than once in a period of one hour. |
6 |
To apply customized cipher set. |
For Audit Vault Server console:
For Audit Vault Agent or Host Monitor Agent:
For inter appliance communication:
|
By default, on a new installation the product is set to Level-4. On upgrade it is set to Level-2. This is appropriate to most of the situations. It is possible to customize. There are prompts and warning messages during the upgrade process which indicate that the cipher levels are not set to maximum security. The cipher levels are not automatically changed during upgrade. Use this command to apply the custom defined level from the file created. These commands set the TLS level for web browser connections and restart the internal services and Audit Vault Server. Note: After running the command to apply
customized cipher set, verify the error output in the system log file available at
Log in as root user to run the command to edit the custom level configuration file. The customizable set of cipher suites is defined in this file. By default, on a new installation the product is set to Level-4. This file can be modified to further restrict the cipher suite and include ciphers available on the product. |
7 |
To display the complete list of available cipher suites. |
|
Log in as support user to run this command. Use this command to display the current set of available cipher suites. |
8 |
To change TLS levels for inbound connection from the database client to the Database Firewall monitoring point. |
See Modifying a Database Firewall Monitoring Point for complete information. |
Starting with Oracle AVDF release 20.7, Database Firewall supports TLS encrypted SQL traffic. The TLS levels can be changed in the Advanced settings of the Database Firewall monitoring point using the Audit Vault Server console. |
9 |
To change TLS levels for outbound connection from Database Firewall monitoring point to Oracle Database. |
See Modifying a Database Firewall Monitoring Point for complete information. |
Starting with Oracle AVDF release 20.7, Database Firewall supports TLS encrypted SQL traffic. The TLS levels can be changed in the Advanced settings of the Database Firewall monitoring point using the Audit Vault Server console. |
When To Change TLS Levels
Oracle recommends leaving the internal TLS level at Level-4. Here is some more information on when to change the TLS levels:
Component | Situation |
---|---|
Internal communication |
Oracle recommends to set at Level–4 for increased security. |
Audit Vault Server console (GUI) |
To support old browsers, set the TLS level to match the browser. |
Audit Vault Agent / Host Monitor Agent / Audit Vault Server |
Oracle recommends to set at Level–4 for increased security. |
Audit Vault Agent deployed with IBM AIX |
On a fresh installation of Oracle AVDF releases 20.1 to 20.3, it is set to Level–4. Change the TLS level to Level-3 if any of the Audit Vault Agents are deployed on IBM AIX. On a fresh installation of Oracle AVDF 20.4 and later, it is set to Level–4 and there is no change required. |
Setting Custom Cipher Sets
Log in as root user to run this procedure for setting the custom cipher set. Do this by creating a custom file that defines the TLS levels and later applying the file.
3.7 Certificates
Learn about different certificates in Oracle AVDF.
3.7.1 Platform Certificates
Learn all about Oracle AVDF platform certificates.
Oracle AVDF uses platform certificates for internal communication by various services.
Oracle AVDF release 20.6.0.0.0 and later provides the ability to renew platform
certificates for Audit Vault Server and Database Firewall appliances before they expire.
If the expiry period is less than 90 days, a warning message (ODF
10729
) is displayed in the /var/log/messages
file. See the
action column against ODF 10729
in the section Database Firewall Messages for detailed procedure for renewing the certificates manually.
If the certificates are not renewed manually and if they are about to expire in less than 30 days, then the platform certificates are automatically renewed and all the relevant services are restarted.
3.7.2 Rotating Audit Vault Agent Certificates
Learn how to rotate Audit Vault Agent certificates.
Audit Vault Agent uses certificates for internal communication with various components and services. These certificates are valid for a specific duration according to the following table:
Table 3-1 Audit Vault Agent Certificate Validity
Audit Vault Server Release | Audit Vault Agent Certificate Validity |
---|---|
Oracle AVDF 12.2 | 10 years |
Oracle AVDF 20.1 and later | 27 months |
Tip:
Starting with Oracle AVDF 20.9, if you have received a system alert that the certificate of your Audit Vault Agent is about to expire, you can skip to Step 4: Rotate the Audit Vault Agent Certificates.3.7.2.1 About Audit Vault Agent Certificates
Learn about Audit Vault Agent certificates.
Audit Vault Agent certificates are used for communication between the Agent and Audit Vault Server. These Audit Vault Agent certificates have to be rotated or renewed for uninterrupted Oracle AVDF services.
Starting with Oracle AVDF release 20.7, the certificates can be renewed manually. For Oracle AVDF release 20.6 and prior, a patch needs to be applied before renewing the certificates.
After the Audit Vault Agent certificates are rotated or renewed, they are valid for a period of 27 months across all releases.
Note:
The certificate rotation or renewal is applicable to Audit Vault Agent and Host Monitor Agent.3.7.2.2 Step 1: Download the Patch for Validating Audit Vault Agent Certificates (Oracle AVDF 20.1 to 20.9)
Download this patch to check the validity of the Audit Vault Agent certificates to determine when they will expire.
- Log in to My Oracle Support.
- Search for patch number 34412167.
- Download
- For Oracle AVDF 20.1-20.7:
p34412167_201000_Linux-x86-64.zip
- For Oracle AVDF 20.8-20.9:
p34412167_208000_Linux-x86-64.zip
- For Oracle AVDF 20.1-20.7:
- Extract the contents of the zip file.
- Copy
show-agent-certificate.py
from the extracted location to the/tmp
directory on the Audit Vault Server.
3.7.2.3 Step 2: Check the Validity of the Audit Vault Agent Certificates (Oracle AVDF 20.1 to 20.9)
Check the validity of the Audit Vault Agent certificates to determine when they will expire.
3.7.2.4 Step 3: Patch the Audit Vault Agents to Enable Certificate Rotation (Oracle AVDF 20.1 to 20.6 Only)
If the results of Step 2 indicate that the agent certificates are already expired or will expire within the next three months, then you need to rotate the agent certificates. For Oracle AVDF release 20.1 to 20.6, you first need to patch the Audit Vault Agents to enable certificate rotation.
Note:
In a high availability environment, apply the patch on both the primary and standby Audit Vault Servers.
3.7.2.5 Step 4: Rotate the Audit Vault Agent Certificates
If the results of Step 2 indicate that the agent certificates are already expired or will expire within the next 30 days, then you need to rotate the agent certificates.
If certificates have expired, you will have to manually rotate certificates through the steps for Oracle AVDF 20.10.
Ensure that all components of your AVDF system, Audit Vault Server(s), Audit Vault Agent(s), and Database Firewall(s), are up prior to performing certificate rotation. If certificates are rotated while a component is down, the component may not work the next time it is brought back up.
-
Log in to the Audit Vault Server Console as a
super administrator
. - Click the Settings tab.
- In the Security section, click the Certificates tab.
- Click the Rotate Certificates tab.
- Click either Rotate CA Certificates to rotate all
certificate authorities (CA) and service certificates or Rotate Service
Certificates to only rotate the service certificates on the following:
- The primary Audit Vault Server, including the UI certificate if it is
not externally signed.
The SSO certificate will not be rotated as this must be done manually. See Rotating the Audit Vault Server SSO Certificate for more information.
- The secondary Audit Vault Server, if set up in a high availability environment
- Any registered Audit Vault Agents
- Any registered Database Firewalls
Note:
If the certificate authority is rotated, it will invalidate the certificates that have been signed by the Database Firewall certificate authority. Therefore, TLS proxy certificates should be signed externally by an appropriate certificate authority. See Creating TLS Proxy Certificates for Database Firewall for more information.
- The primary Audit Vault Server, including the UI certificate if it is
not externally signed.
- Click OK to confirm certificate rotation.
While the certificates are being rotated the UI may be unavailable for some time.
Note:
In a high availability environment, follow these steps for the primary Audit Vault Server only.
-
Log in to the Audit Vault Server through SSH and switch to the
root
user. - Change the
directory:
cd /opt/avdf/lib/ruby/avdf
- Run the following command to rotate the Audit Vault Agent
certificates:
ruby update_agent_cert_task.rb
- If the certificate was already expired and you're using
agentless collection,
-
Log in to the destination Audit Vault Server through SSH and switch to the
root
user. - Run the below command to redeploy Agentless Collection
Service
/usr/local/dbfw/bin/deploy_default_agent.py
-
Note:
In a high availability environment, follow these steps for the primary Audit Vault Server only.
- Connect to the Audit Vault Server through SSH as the root user.
- Change the directory:
cd /opt/avdf/lib/ruby/avdf
- Run the following command to rotate the Audit Vault Agent
certificates:
ruby update_agent_cert_task.rb
- If the certificates were already expired:
-
Log in to the Audit Vault Server Console as an
administrator
. - Click the Agents tab.
- Select the check box for all stopped agents, and then click Deactivate.
- Select the check box of all agent that were deactivated, and then click Activate.
- Copy or make a note of the agent activation key for all agents.
- Click Downloads in the left navigation menu.
- Download the
agent.jar
- Transfer the
agent.jar
file to all the agent machines. - Start all the Audit Vault
Agents
by running the bellow
commands:
-
agentctl start -k
- Paste or enter the agent activation key in the
following format:
<Agent Name>::XXXX-XXXX-XXXX-XXXX-XXXX
The activation key is not displayed as you type it.
-
If you're using agentless collection in Oracle AVDF 20.9, perform these steps if the certificate was already expired
-
Log in to the destination Audit Vault Server through SSH and switch to the
root
user. - Run the below command to redeploy Agentless Collection
Service
/usr/local/dbfw/bin/deploy_default_agent.py
-
- If the certificates were not already expired:
- Validate the Audit Vault Agent certificate after the
rotation. See Step 2: Check the Validity of the Audit Vault Agent Certificates (Oracle AVDF 20.1 to 20.9).
The Audit Vault Agent takes at most 12 hours to update the new certificates. The time depends on the number of agents that are registered on the Audit Vault Server.
- After 12 hours, verify that the Audit Vault Agents are in the RUNNING state. If they are in the STOPPED state, then contact Oracle Support.
- Validate the Audit Vault Agent certificate after the
rotation. See Step 2: Check the Validity of the Audit Vault Agent Certificates (Oracle AVDF 20.1 to 20.9).
- If you disabled the autostart feature of Audit Vault Agent prior to applying patch 34412167, re-enable it. See Autostarting the Agent on Windows Host for more information.
3.7.3 Rotating Audit Vault Server Certificates
Learn how to rotate Audit Vault Server certificates.
Audit Vault Server uses certificates for internal communication with various components and services. Oracle AVDF enables you to rotate Audit Vault Server certificates before they expire.
If certificates have expired, you will have to manually rotate certificates through the steps for Oracle AVDF 20.10.
Ensure that all components of your AVDF system, Audit Vault Server(s), Audit Vault Agent(s), and Database Firewall(s), are up prior to performing certificate rotation. If certificates are rotated while a component is down, the component may not work the next time it is brought back up.
-
Log in to the Audit Vault Server Console as a
super administrator
. - Click the Settings tab.
- In the Security section, click the Certificates tab.
- Click the Rotate Certificates tab.
- Click either Rotate CA Certificates to rotate all
certificate authorities (CA) and service certificates or Rotate Service
Certificates to only rotate the service certificates on the following:
- The primary Audit Vault Server, including the UI certificate if it is
not externally signed.
The SSO certificate will not be rotated as this must be done manually. See Rotating the Audit Vault Server SSO Certificate for more information.
- The secondary Audit Vault Server, if set up in a high availability environment
- Any registered Audit Vault Agents
- Any registered Database Firewalls
Note:
If the certificate authority is rotated, it will invalidate the certificates that have been signed by the Database Firewall certificate authority. Therefore, TLS proxy certificates should be signed externally by an appropriate certificate authority. See Creating TLS Proxy Certificates for Database Firewall for more information.
- The primary Audit Vault Server, including the UI certificate if it is
not externally signed.
- Click OK to confirm certificate rotation.
While the certificates are being rotated the UI may be unavailable for some time.
- Generate new certificate authority (CA) certificates on the
Audit Vault Server by the following command as the
root
user. This process updates the central, self-signed CA certificate on the Audit Vault Server./usr/local/bin/gensslcert destroy-certs create-ca
- Restart the primary Audit Vault Server appliance. As the
root
user run the following commands:systemctl reload httpd
systemctl restart controller
- Update and regenerate the CA certificate bundles and services.
-
Run the following command as the
root
user on the primary Audit Vault Server appliance:cat /usr/local/dbfw/etc/ha_partner.crt /usr/local/dbfw/etc/ca.crt > /etc/pki/tls/certs/dbfw-ca.crt
- Restart the primary Audit Vault Server appliance. As the
root
user run the following commands:systemctl reload httpd
systemctl restart controller
-
- Run the following command as the
root
user on the primary server:systemctl start monitor
- Copy and transfer the new CA certificates from the Audit Vault
Server to each of the linked Database Firewall instances:
Run as the
root
user on the primary server:scp /usr/local/dbfw/etc/ca.crt support@<dbfw-ip>:/tmp/primary.ca
Run as theroot
user on the Database Firewall:cp /tmp/primary.ca /usr/local/dbfw/etc/controller.crt
cp /tmp/standby.ca /usr/local/dbfw/etc/controller_second.crt
- Update the Database Firewall and Audit Vault Server
controllers:
Run as the
root
user on the Database Firewall:cat /tmp/primary.ca | /opt/avdf/config-utils/bin/config-avs set avs=primary address=<primary-ip> certificate=-
cat /tmp/standby.ca | /opt/avdf/config-utils/bin/config-avs set avs=secondary address=<standby-ip> certificate=-
- Restart the Database Firewall appliance. As the
root
user run the following commands:systemctl reload httpd
systemctl restart stund
- Verify that the local and peer certificates are valid.
Verify the following local certificates:
/usr/local/dbfw/etc/ca.crt
/etc/pki/tls/certs/localhost_internal.crt
/usr/local/dbfw/etc/cert.crt
/usr/local/dbfw/etc/avs/avs_apex_client.crt
/usr/local/dbfw/etc/avs/avswallet
/etc/pki/tls/certs/localhost.crt
Verify the following peer certificates:
/usr/local/dbfw/etc/avs/fwcerts/fw-[ip].cert
/usr/local/dbfw/etc/ha_partner.crt
/var/lib/oracle/dbfw/av/conf/ava.cer
/var/lib/oracle/dbfw/av/conf/avs.cer
Use the
config-diagnostics
,sappdiag
, oropenssl x509
command to verify the certificate validity:/usr/local/dbfw/bin/sappdiag
openssl x509 -enddate -startdate -noout -in /usr/local/dbfw/etc/ca.crt
- Generate new certificate authority (CA) certificates on the
primary Audit Vault Server by the following command as the
root
user. This process updates the central, self-signed CA certificate on the Audit Vault Server./usr/local/bin/gensslcert destroy-certs create-ca
- Restart the primary Audit Vault Server appliance. As the
root
user run the following commands:systemctl reload httpd
systemctl restart controller
- Transfer the CA certificates from the primary Audit Vault
Server to the standby Audit Vault Server:
Run as the
root
user on the primary server:scp /usr/local/dbfw/etc/ca.crt support@<standby-ip>:/tmp/ha_partner.crt
Run as theroot
user on the standby server:cp /tmp/ha_partner.crt /usr/local/dbfw/etc/ha_partner.crt
- Restart the standby Audit Vault Server appliance. As the
root
user run the following commands:systemctl reload httpd
systemctl restart controller
- Regenerate the CA certificates and all certificates on the
standby Audit Vault Server instance.
Run as the
root
user on the standby server:/usr/local/bin/gensslcert destroy-certs create-ca
- Restart the standby Audit Vault Server appliance. As the
root
user run the following commands:systemctl reload httpd
systemctl restart controller
- Transfer the standby CA certificates to the primary
instance:
Run as the
root
user on the primary server:cp /tmp/ha_partner.crt /usr/local/dbfw/etc/ha_partner.crt
Run as theroot
user on the standby server:scp /usr/local/dbfw/etc/ca.crt support@<primary-ip>:/tmp/ha_partner.crt
- Restart the primary Audit Vault Server appliance. As the
root
user run the following commands:systemctl reload httpd
systemctl restart controller
- Update and regenerate the CA certificate bundles and services.
Perform these steps on the primary and standby Audit Vault Server instances
one at a time.
-
Run the following command as the
root
user on the primary Audit Vault Server appliance:cat /usr/local/dbfw/etc/ha_partner.crt /usr/local/dbfw/etc/ca.crt > /etc/pki/tls/certs/dbfw-ca.crt
- Restart the primary Audit Vault Server appliance. As the
root
user run the following commands:systemctl reload httpd
systemctl restart controller
-
Run the following command as the
root
user on the standby Audit Vault Server appliance:cat /usr/local/dbfw/etc/ha_partner.crt /usr/local/dbfw/etc/ca.crt > /etc/pki/tls/certs/dbfw-ca.crt
- Restart the standby Audit Vault Server appliance. As the
root
user run the following commands:systemctl reload httpd
systemctl restart controller
-
- Restart the observer on the primary Audit Vault Server
server:
Run as the
root
user on the primary server:systemctl stop monitor
Switch to the
oracle
user.su - oracle
Run as theoracle
user on the primary server:/usr/local/dbfw/bin/observerctl --stop
/usr/local/dbfw/bin/observerctl --start
- Wait for two minutes for the observer process to come up.
To check the observer status:
-
Log in to the Audit Vault Server through SSH as the
support
user.Note:
If you're using the Oracle Cloud Infrastructure (OCI) marketplace image, connect through SSH as theOPC
user.ssh support@<audit_vault_server_ip_address>
-
Switch to the
root
user.su - root
Note:
If you're using the OCI marketplace image, use thesudo su -
command. -
Switch to the
oracle
user.su - oracle
-
Run the following command:
/usr/local/dbfw/bin/setup_ha.rb –status
This displays all statuses, including the Data Guard observer status. It displays Data guard observer = yes when the observer is running.
-
- Run the following command as the
root
user on the primary server:systemctl start monitor
- Copy and transfer the new CA certificates from the primary and
standby instances to each of the linked Database Firewall instances:
Run as the
root
user on the primary server:scp /usr/local/dbfw/etc/ca.crt support@<dbfw-ip>:/tmp/primary.ca
Run as theroot
user on the standby server:scp /usr/local/dbfw/etc/ca.crt support@<dbfw-ip>:/tmp/standby.ca
Run as theroot
user on the Database Firewall:cp /tmp/primary.ca /usr/local/dbfw/etc/controller.crt
cp /tmp/standby.ca /usr/local/dbfw/etc/controller_second.crt
- Update the Database Firewall and Audit Vault Server
controllers:
Run as the
root
user on the Database Firewall:cat /tmp/primary.ca | /opt/avdf/config-utils/bin/config-avs set avs=primary address=<primary-ip> certificate=-
cat /tmp/standby.ca | /opt/avdf/config-utils/bin/config-avs set avs=secondary address=<standby-ip> certificate=-
- Restart the Database Firewall appliance. As the
root
user run the following commands:systemctl reload httpd
systemctl restart stund
- Verify that the local and peer certificates are valid.
Verify the following local certificates:
/usr/local/dbfw/etc/ca.crt
/etc/pki/tls/certs/localhost_internal.crt
/usr/local/dbfw/etc/cert.crt
/usr/local/dbfw/etc/avs/avs_apex_client.crt
/usr/local/dbfw/etc/avs/avswallet
/etc/pki/tls/certs/localhost.crt
Verify the following peer certificates:
/usr/local/dbfw/etc/avs/fwcerts/fw-[ip].cert
/usr/local/dbfw/etc/ha_partner.crt
/var/lib/oracle/dbfw/av/conf/ava.cer
/var/lib/oracle/dbfw/av/conf/avs.cer
Use the
config-diagnostics
,sappdiag
, oropenssl x509
command to verify the certificate validity:/usr/local/dbfw/bin/sappdiag
openssl x509 -enddate -startdate -noout -in /usr/local/dbfw/etc/ca.crt
- Log in to My Oracle Support.
- Search for patch number 34378212.
- Download
p34378212_191000_Linux-x86-64.zip
. - Extract the contents of the zip file.
- Copy
gensslcert.avs.tar.gz
from the extracted location to the/tmp
directory on the Audit Vault Server. - Complete the installation on the Audit Vault Server:
-
Log in to the Audit Vault Server through SSH as the
support
user.Note:
If you're using the Oracle Cloud Infrastructure (OCI) marketplace image, connect through SSH as theOPC
user.ssh support@<audit_vault_server_ip_address>
-
Switch to the
root
user.su - root
Note:
If you're using the OCI marketplace image, use thesudo su -
command. -
Create a new directory:
mkdir /root/gensslcert
-
Copy
gensslcert.avs.tar.gz
to the new directory:cp /tmp/gensslcert.avs.tar.gz /root/gensslcert
-
Change to the new directory:
cd /root/gensslcert
-
Extract the files:
tar xvfz gensslcert.avs.tar.gz
-
- Generate new certificate authority (CA) certificates on the
Audit
Vault Server by running the following command as the
root
user. This process updates the central, self-signed CA certificate on the Audit Vault Server./root/gensslcert/gensslcert destroy-certs create-ca
- Restart the primary Audit Vault Server appliance. As the
root
user run the following commands:systemctl reload httpd
systemctl restart controller
- Update and regenerate the CA certificate bundles and services.
-
Run the following command as the
root
user on the Audit Vault Server appliance:cat /usr/local/dbfw/etc/ha_partner.crt /usr/local/dbfw/etc/ca.crt > /etc/pki/tls/certs/dbfw-ca.crt
- Restart the primary Audit Vault Server appliance. As the
root
user run the following commands:systemctl reload httpd
systemctl restart controller
-
- Run the following command as the
root
user on the primary server:systemctl start monitor
- Copy and transfer the new CA certificates from the
Audit
Vault
Server
to each of the linked Database Firewall instances:
Run as the
root
user on the primary server:scp /usr/local/dbfw/etc/ca.crt support@<dbfw-ip>:/tmp/primary.ca
Run as theroot
user on the Database Firewall:cp /tmp/primary.ca /usr/local/dbfw/etc/controller.crt
cp /tmp/standby.ca /usr/local/dbfw/etc/controller_second.crt
- Update the Database Firewall and Audit Vault Server
controllers:
Run as the
root
user on the Database Firewall:cat /tmp/primary.ca | /opt/avdf/config-utils/bin/config-avs set avs=primary address=<primary-ip> certificate=-
cat /tmp/standby.ca | /opt/avdf/config-utils/bin/config-avs set avs=secondary address=<standby-ip> certificate=-
- Restart the Database Firewall appliance. As the
root
user run the following commands:systemctl reload httpd
systemctl restart stund
- Verify that the local and peer certificates are valid.
Verify the following local certificates:
/usr/local/dbfw/etc/ca.crt
/etc/pki/tls/certs/localhost_internal.crt
/usr/local/dbfw/etc/cert.crt
/usr/local/dbfw/etc/avs/avs_apex_client.crt
/usr/local/dbfw/etc/avs/avswallet
/etc/pki/tls/certs/localhost.crt
Verify the following peer certificates:
/usr/local/dbfw/etc/avs/fwcerts/fw-[ip].cert
/usr/local/dbfw/etc/ha_partner.crt
/var/lib/oracle/dbfw/av/conf/ava.cer
/var/lib/oracle/dbfw/av/conf/avs.cer
Use the
config-diagnostics
,sappdiag
, oropenssl x509
command to verify the certificate validity:/usr/local/dbfw/bin/sappdiag
openssl x509 -enddate -startdate -noout -in /usr/local/dbfw/etc/ca.crt
- Log in to My Oracle Support.
- Search for patch number 34378212.
- Download
p34378212_191000_Linux-x86-64.zip
. - Extract the contents of the zip file.
- Copy
gensslcert.avs.tar.gz
from the extracted location to the/tmp
directory on the Audit Vault Server. - Complete the installation on the Audit Vault Server:
-
Log in to the Audit Vault Server through SSH as the
support
user.Note:
If you're using the Oracle Cloud Infrastructure (OCI) marketplace image, connect through SSH as theOPC
user.ssh support@<audit_vault_server_ip_address>
-
Switch to the
root
user.su - root
Note:
If you're using the OCI marketplace image, use thesudo su -
command. -
Create a new directory:
mkdir /root/gensslcert
-
Copy
gensslcert.avs.tar.gz
to the new directory:cp /tmp/gensslcert.avs.tar.gz /root/gensslcert
-
Change to the new directory:
cd /root/gensslcert
-
Extract the files:
tar xvfz gensslcert.avs.tar.gz
-
- Generate new certificate authority (CA) certificates on the primary
Audit Vault Server by running the following command as the
root
user. This process updates the central, self-signed CA certificate on the Audit Vault Server./root/gensslcert/gensslcert destroy-certs create-ca
- Restart the primary Audit Vault Server appliance. As the
root
user run the following commands:systemctl reload httpd
systemctl restart controller
- Transfer
the CA certificates from the primary Audit Vault Server to the standby Audit
Vault Server:
Run as the
root
user on the primary server:scp /usr/local/dbfw/etc/ca.crt support@<standby-ip>:/tmp/ha_partner.crt
Run as theroot
user on the standby server:cp /tmp/ha_partner.crt /usr/local/dbfw/etc/ha_partner.crt
- Restart the standby Audit Vault Server appliance. As the
root
user run the following commands:systemctl reload httpd
systemctl restart controller
- Regenerate
the CA certificates and all certificates on the standby Audit Vault Server
instance by running the following command as the
root
user./root/gensslcert/gensslcert destroy-certs create-ca
- Restart the standby Audit Vault Server appliance. As the
root
user run the following commands:systemctl reload httpd
systemctl restart controller
- Transfer
the standby CA certificates to the primary instance:
Run as the
root
user on the primary server:cp /tmp/ha_partner.crt /usr/local/dbfw/etc/ha_partner.crt
Run as theroot
user on the standby server:scp /usr/local/dbfw/etc/ca.crt support@<primary-ip>:/tmp/ha_partner.crt
- Restart the primary Audit Vault Server appliance. As the
root
user run the following commands:systemctl reload httpd
systemctl restart controller
- Update and regenerate the CA certificate bundles and services.
Perform these steps on the primary and standby Audit Vault Server instances
one at a time.
-
Run the following command as the
root
user on the primary Audit Vault Server appliance:cat /usr/local/dbfw/etc/ha_partner.crt /usr/local/dbfw/etc/ca.crt > /etc/pki/tls/certs/dbfw-ca.crt
- Restart the primary Audit Vault Server appliance. As the
root
user run the following commands:systemctl reload httpd
systemctl restart controller
-
Run the following command as the
root
user on the standby Audit Vault Server appliance:cat /usr/local/dbfw/etc/ha_partner.crt /usr/local/dbfw/etc/ca.crt > /etc/pki/tls/certs/dbfw-ca.crt
- Restart the standby Audit Vault Server appliance. As the
root
user run the following commands:systemctl reload httpd
systemctl restart controller
-
- Restart
the observer on the primary Audit Vault Server server:
Run as the
root
user on the primary server:systemctl stop monitor
Switch to the
oracle
user.su - oracle
Run as theoracle
user on the primary server:/usr/local/dbfw/bin/observerctl --stop
/usr/local/dbfw/bin/observerctl --start
- Wait for two minutes for the observer process to come up.
To check the observer status:
-
Log in to the Audit Vault Server through SSH as the
support
user.Note:
If you're using the Oracle Cloud Infrastructure (OCI) marketplace image, connect through SSH as theOPC
user.ssh support@<audit_vault_server_ip_address>
-
Switch to the
root
user.su - root
Note:
If you're using the OCI marketplace image, use thesudo su -
command. -
Switch to the
oracle
user.su - oracle
-
Run the following command:
/usr/local/dbfw/bin/setup_ha.rb –status
This displays all statuses, including the Data Guard observer status. It displays Data guard observer = yes when the observer is running.
-
- Run the following command as the
root
user on the primary server:systemctl start monitor
- Copy and transfer the new CA certificates from the primary
and
standby instances
to
each of the linked Database Firewall instances:
Run as the
root
user on the primary server:scp /usr/local/dbfw/etc/ca.crt support@<dbfw-ip>:/tmp/primary.ca
Run as theroot
user on the standby server:scp /usr/local/dbfw/etc/ca.crt support@<dbfw-ip>:/tmp/standby.ca
Run as theroot
user on the Database Firewall:cp /tmp/primary.ca /usr/local/dbfw/etc/controller.crt
cp /tmp/standby.ca /usr/local/dbfw/etc/controller_second.crt
- Update the Database Firewall and Audit Vault Server
controllers:
Run as the
root
user on the Database Firewall:cat /tmp/primary.ca | /opt/avdf/config-utils/bin/config-avs set avs=primary address=<primary-ip> certificate=-
cat /tmp/standby.ca | /opt/avdf/config-utils/bin/config-avs set avs=secondary address=<standby-ip> certificate=-
- Restart the Database Firewall appliance. As the
root
user run the following commands:systemctl reload httpd
systemctl restart stund
- Verify that the local and peer certificates are valid.
Verify the following local certificates:
/usr/local/dbfw/etc/ca.crt
/etc/pki/tls/certs/localhost_internal.crt
/usr/local/dbfw/etc/cert.crt
/usr/local/dbfw/etc/avs/avs_apex_client.crt
/usr/local/dbfw/etc/avs/avswallet
/etc/pki/tls/certs/localhost.crt
Verify the following peer certificates:
/usr/local/dbfw/etc/avs/fwcerts/fw-[ip].cert
/usr/local/dbfw/etc/ha_partner.crt
/var/lib/oracle/dbfw/av/conf/ava.cer
/var/lib/oracle/dbfw/av/conf/avs.cer
Use the
config-diagnostics
,sappdiag
, oropenssl x509
command to verify the certificate validity:/usr/local/dbfw/bin/sappdiag
openssl x509 -enddate -startdate -noout -in /usr/local/dbfw/etc/ca.crt
3.7.4 Rotating Database Firewall Certificates
Learn how to rotate Database Firewall certificates.
Database Firewall uses certificates for internal communication with various components and services. Oracle AVDF enables you to rotate Database Firewall certificates before they expire.
Note:
Rotate certificates for each Database Firewall instance including those paired for high availability.If certificates have expired, you will have to manually rotate certificates through the steps for Oracle AVDF 20.10.
Ensure that all components of your AVDF system, Audit Vault Server(s), Audit Vault Agent(s), and Database Firewall(s), are up prior to performing certificate rotation. If certificates are rotated while a component is down, the component may not work the next time it is brought back up.
-
Log in to the Audit Vault Server Console as a
super administrator
. - Click the Settings tab.
- In the Security section, click the Certificates tab.
- Click the Rotate Certificates tab.
- Click either Rotate CA Certificates to rotate all
certificate authorities (CA) and service certificates or Rotate Service
Certificates to only rotate the service certificates on the following:
- The primary Audit Vault Server, including the UI certificate if it is
not externally signed.
The SSO certificate will not be rotated as this must be done manually. See Rotating the Audit Vault Server SSO Certificate for more information.
- The secondary Audit Vault Server, if set up in a high availability environment
- Any registered Audit Vault Agents
- Any registered Database Firewalls
Note:
If the certificate authority is rotated, it will invalidate the certificates that have been signed by the Database Firewall certificate authority. Therefore, TLS proxy certificates should be signed externally by an appropriate certificate authority. See Creating TLS Proxy Certificates for Database Firewall for more information.
- The primary Audit Vault Server, including the UI certificate if it is
not externally signed.
- Click OK to confirm certificate rotation.
While the certificates are being rotated the UI may be unavailable for some time.
- Generate the new certificate authority (CA) certificates on the
Database Firewall appliance. First regenerate the local CA certificates on
the Database Firewall appliance by running one of the following
commands.
dbfw(root)$ /usr/local/bin/gensslcert destroy-certs create-ca
- Run the following commands to restart the Database Firewall
services:
dbfw(root) $ systemctl reload httpd
dbfw(root) $ systemctl restart stund
- Update the Database Firewall certificate on the Audit Vault Server and regain control of the Database Firewall. See Fetching an Updated Certificate from Database Firewall.
- Verify that the following local certificates are valid:
/usr/local/dbfw/etc/ca.crt
/etc/pki/tls/certs/localhost_internal.crt
/usr/local/dbfw/etc/cert.crt
Use the
config-diagnostics
,sappdiag
, oropenssl x509
command to verify the certificate validity./usr/local/dbfw/bin/sappdiag
openssl x509 -enddate -startdate -noout -in /usr/local/dbfw/etc/ca.crt
- Verify that the following peer certificates are valid:
/usr/local/dbfw/etc/controller.crt
/usr/local/dbfw/etc/controller_second.crt
/usr/local/dbfw/etc/fw_ca.crt
- Log in to My Oracle Support.
- Search for patch number 34378217.
- Download
p34378217_191000_Linux-x86-64.zip
. - Extract the contents of the zip file.
- Copy
gensslcert.dbfw.tar.gz
from the extracted location to the/tmp
directory on the Database Firewall server. - Follow these steps to complete the installation on the Database
Firewall Server:
-
Connect to the Database Firewall appliance through SSH as the support user.
-
Switch to the root user:
su - root
-
Create a new directory:
mkdir /root/gensslcert
-
Copy
gensslcert.dbfw.tar.gz
to the new directory:cp /tmp/gensslcert.dbfw.tar.gz /root/gensslcert
-
Change to the new directory:
cd /root/gensslcert
-
Run the following command:
tar xvfz gensslcert.dbfw.tar.gz
-
- Generate the new certificate authority (CA) certificates on the
Database Firewall appliance. First regenerate the local CA certificates on
the Database Firewall appliance by running one of the following
commands.
dbfw(root)$ /root/gensslcert/gensslcert destroy-certs create-ca
- Run the following commands to restart the Database Firewall
services:
dbfw(root) $ systemctl reload httpd
dbfw(root) $ systemctl restart stund
- Update the Database Firewall certificate on the Audit Vault Server and regain control of the Database Firewall. See Fetching an Updated Certificate from Database Firewall.
- Verify that the following local certificates are valid:
/usr/local/dbfw/etc/ca.crt
/etc/pki/tls/certs/localhost_internal.crt
/usr/local/dbfw/etc/cert.crt
Use the
config-diagnostics
,sappdiag
, oropenssl x509
command to verify the certificate validity./usr/local/dbfw/bin/sappdiag
openssl x509 -enddate -startdate -noout -in /usr/local/dbfw/etc/ca.crt
- Verify that the following peer certificates are valid:
/usr/local/dbfw/etc/controller.crt
/usr/local/dbfw/etc/controller_second.crt
/usr/local/dbfw/etc/fw_ca.crt
3.7.5 Rotating the Audit Vault Server SSO Certificate
Starting in Oracle AVDF 20.11, you can configure single sign-on (SSO) for Audit Vault Server console users. Learn how to rotate the SSO key and certificate.
Rotation of the SSO certificate must be done manually as it does not rotate through the functionality available in the Rotate Certificates tab of the Audit Vault Server.
-
Log in to the Audit Vault Server through SSH and switch to the
root
user. - Go to the
/usr/local/dbfw/etc
directory:cd /usr/local/dbfw/etc
- Create a backup directory and move the current Apex SAML key and certificate files
there.
mkdir apexsaml_backup mv apexsaml.key ./apexsaml_backup mv apexsaml.crt ./apexsaml_backup
- Generate the Apex SAML key and
certificate:
/usr/local/dbfw/etc/privileged-migrations/gen_saml_apex_cert.sh
- Register them with Audit Vault
Server:
/usr/local/dbfw/etc/privileged-migrations/register_apex_key_cert.py
- Test the SSO configuration by logging in to the Audit Vault Server
console.
See Logging In to Oracle AVDF Appliances Through SSO for more information.
- Remove the backup directory for Apex SAML key and certificate if the SSO
connection testing is working
fine:
rm -r /usr/local/dbfw/etc/apexsmal_backup
- If your identity provider requires the Audit Vault Server SSO certificate, update the identity provider configuration with the new SSO certificate.
- If configured in high availability, copy the
/usr/local/dbfw/etc/apexsaml.key
and/usr/local/dbfw/etc/apexsaml.crt
to the standby Audit Vault Server.
3.7.6 Creating TLS Proxy Certificates for Database Firewall
Learn how to create and upload TLS proxy certificates for Database Firewall.
Oracle Audit Vault and Database Firewall (Oracle AVDF) release 20.8 (and later) supports managing TLS proxy certificates for Database Firewall from the Audit Vault Server console.
Database Firewall uses certificates for inbound (database client to Database Firewall) and outbound (Database Firewall to target database) TLS connections. You can create and manage certificates for both inbound and outbound TLS connections through the Audit Vault Server console.
Note:
- This functionality is available to Oracle Database versions that are supported by Oracle AVDF. It is not applicable to Oracle Real Application Clusters (Oracle RAC) instances in Oracle AVDF release 20.7. It is supported starting with Oracle AVDF release 20.8.
- This functionality is applicable to Database Firewall instances that are deployed in Monitoring / Blocking (Proxy) mode only.
- When using Database Firewall as a TLS proxy, password-based user authorization with the database is supported. Certificate-based authorization and third-party user authorization (RADIUS, Kerberos, LDAP, and so on) with the database are not supported.
The following types of certificate signing methods are supported:
-
Certificates that are signed by the Database Firewall certificate authority (CA)
You can use out-of-the-box certificates that are signed by the Database Firewall CA for inbound and outbound TLS connections. Oracle strongly recommends that you use third-party, externally signed certificates for production deployments.
You can choose this option when configuring monitoring points for a target database.
-
Certificates that are signed by an external CA
To use a certificate that is signed by an external CA, create a certificate signing request (CSR) with the relevant information, download it, get the certificate signed, and upload it using the Audit Vault Server console.
After you upload the certificate, you can use it when configuring monitoring points for a target database.
Follow these steps to generate a CSR, download the CSR, and upload the duly signed certificate to the Database Firewall:
3.7.6.1 Viewing Certificate Details
In the Audit Vault Server console, you can view the details for each TLS proxy certificate, including the status, start and end dates, expiry time, common name, and so on.
- Log in to the Audit Vault Server console as a super administrator.
- Click the Settings tab.
- Click the Security tab in the left navigation menu.
- Click the Certificate subtab on the main page.
- Click the Database Firewall subtab.
3.7.6.2 Rotating Certificates
You can also rotate the TLS proxy certificates for Database Firewall.