Changes in This Release for Oracle Key Vault
This Oracle Key Vault release introduces new features that enhance the use of Oracle Key Vault in a large enterprise. Oracle Key Vault release 18.8 introduces the following new features.
Note:
This is the terminal release of Oracle Key Vault release 18.- Changes for Oracle Key Vault Release 21.4
Oracle Key Vault release 21.4 introduces new features that affect this guide. - Changes for Oracle Key Vault Release 21.3
Oracle Key Vault release 21.3 introduces new features that affect this guide.
Changes for Oracle Key Vault Release 21.4
Oracle Key Vault release 21.4 introduces new features that affect this guide.
- Ability to Control the Extraction of Symmetric Encryption Keys from Oracle Key Vault
Starting in Oracle Key Vault release 21.4, to strengthen the protection of symmetric keys, you now can restrict these keys from leaving Oracle Key Vault. - Enhancements to Certificate Management
Starting in Oracle Key Vault release 21.4, several enhancements to the management of certificates are available. - Support for Policy Based Automatic Purging of Old Oracle Key Vault Backups
Starting in Oracle Key Vault release 21.4, you can manually remove the local Oracle Key Vault backup or create a policy to schedule the removal of one or more remote backups. - Ability to Restrict Oracle Key Vault Administrative Role Grants
Starting in Oracle Key Vault release 21.4, you can control whether a grantee of an Oracle Key Vault administrative role can grant the role to other Oracle Key Vault users. - Client IP Address in the Oracle Key Vault Audit Trail
Starting in Oracle Key Vault release 21.4, the Oracle Key Vault audit trail has one new field:Client IP
. - Support for Additional Monitoring Information Through SNMP
Starting in Oracle Key Vault release 21.4, additional monitoring information is available through the SNMPnsExtendOutputFull
MIB base variable.
Parent topic: Changes in This Release for Oracle Key Vault
Ability to Control the Extraction of Symmetric Encryption Keys from Oracle Key Vault
Starting in Oracle Key Vault release 21.4, to strengthen the protection of symmetric keys, you now can restrict these keys from leaving Oracle Key Vault.
This restriction applies to the key material of the symmetric keys, but not its metadata. For example, Transparent Database Encryption (TDE) master encryption keys are stored in Oracle Key Vault. When an endpoint needs to decrypt the key, the PKCS#11 library fetches the TDE master encryption key from Oracle Key Vault to perform the decryption. If your site requires that symmetric keys never leave Oracle Key Vault, then you can configure these keys to remain within Oracle Key Vault during operations. In this case, the PKCS#11 library will send the encrypted data encryption key to Oracle Key Vault. Decryption is then performed within Oracle Key Vault and afterward, the plaintext data encryption key is returned to the PKCS#11 library. The Oracle Key Vault PKCS#11 library performs the encryption and decryption operation within Oracle Key Vault if the TDE master encryption key is restricted to leave Oracle Key Vault, or if it cannot be extracted from Oracle Key Vault.
To control whether symmetric encryption keys can be retrieved (extracted) from Oracle Key Vault, you can use the Oracle Key Vault management console, RESTful services utility commands, the C SDK APIs, and Java SDK APIs.
Parent topic: Changes for Oracle Key Vault Release 21.4
Enhancements to Certificate Management
Starting in Oracle Key Vault release 21.4, several enhancements to the management of certificates are available.
The enhancements are as follows:
- Support for using an Oracle Key Vault certificate authority (CA) certificate that has been signed by an external certificate signing authority: You can choose to have the CA certificate issued by a third-party signing authority. This option can be exercised by first generating a certificate signing request (CSR), having that CSR signed by the external signing authority, and then uploading that signed CA to Oracle Key Vault. You will then be required to perform a CA certificate rotation so that all certificates on board Oracle Key Vault (endpoint certificates as well as those used for communication between Oracle Key Vault multi-master cluster nodes) are re-issued by the new CA. In previous releases, the Oracle Key Vault CA certificate was always self-signed.
- Ability to configure a validity period of Oracle Key Vault self-signed root CA certificate: You can configure the certificate validity period of the Oracle Key Vault self-signed CA. The new validity period would take effect the next time a CA certificate rotation is performed. Previously, this value was fixed and unchangeable.
- In multi-master cluster environments, the ability to set the order in which endpoints are rotated during the Oracle Key Vault CA certificate rotation process: This enhancement enables you to configure the order in which endpoints are rotated during a CA certificate rotation. Starting in this release, the endpoints are, by default, rotated in order of endpoint certificate expiry (that is, those expiring soonest are rotated first). You can also choose to order the endpoint rotation by providing a cluster subgroup priority list before initiating a CA certificate rotation. Then, during the CA certificate rotation process, endpoints that belong to cluster subgroups higher in the priority list are rotated before those in lower-priority cluster subgroups. In previous releases, when a CA certificate rotation was performed, the endpoints were rotated in random order.
- Ability to configure a batch number of endpoints rotated during an Oracle Key Vault CA certificate rotation: You can configure the number of endpoints that can be in the
Updating to current certificate issuer
state at a given point in the CA certificate rotation process. You can configure this value based on the number of endpoints in the Oracle Key Vault configuration. Previously, this value was static and release dependent (for example, at most, 15 endpoints could be in this state in Oracle Key Vault release 21.3). - Ability to rotate Oracle Key Vault server and node certificates: Starting in this release, the certificates that are used for communication between Oracle Key Vault systems (cluster nodes in a multi-master cluster environment, or primary and standby environments), and for communication between an Oracle Key Vault system and its endpoints are now known as server certificates (in standalone or primary-standby environments) and node certificates (in multi-master cluster environments). This enhancement provides greater operational flexibility, because you now can choose different validity periods for the Oracle Key Vault CA certificate and server and node certificates. You then can rotate the server and node certificates as often as needed, without needing to go through the entire CA certificate rotation process.
Related Topics
Parent topic: Changes for Oracle Key Vault Release 21.4
Support for Policy Based Automatic Purging of Old Oracle Key Vault Backups
Starting in Oracle Key Vault release 21.4, you can manually remove the local Oracle Key Vault backup or create a policy to schedule the removal of one or more remote backups.
You can now better manage the disk space consumed by Oracle Key Vault backups on remote backup destination servers without the need to manually delete them once they are deemed no longer needed. You can configure Oracle Key Vault to automatically purge older backups from a remote backup destination based on a policy. For example, you can configure and apply a policy to a remote backup destination to automatically purge backups that are older than 30 days unless the backup is among the 10 more recent backups. In addition, you can now manually delete a local Oracle Key Vault backup.
Ability to Restrict Oracle Key Vault Administrative Role Grants
Starting in Oracle Key Vault release 21.4, you can control whether a grantee of an Oracle Key Vault administrative role can grant the role to other Oracle Key Vault users.
In previous releases, the Oracle Key Vault administrative roles (System Administrator, Key Administrator, and Audit Manager) could be granted to another Oracle Key Vault user by any user who currently has the role. Starting with this release, when an administrator grants the role to another user, the administrator can restrict how the grantee user can in turn grant the role to other users. This enhancement improves overall user security and helps to adhere to good least privileges practices.
Related Topics
Parent topic: Changes for Oracle Key Vault Release 21.4
Client IP Address in the Oracle Key Vault Audit Trail
Starting in Oracle Key Vault release 21.4, the Oracle Key Vault audit trail has one new field: Client IP
.
The Oracle Key Vault audit trail contains fields to capture information such as the name and type of the entity that performed an operation, the time the operation was performed, the node in which an operation was performed, and the result of the operation. The addition of the Client IP
field enables users to better find where operations were performed, particularly in Cloud environments.
Related Topics
Parent topic: Changes for Oracle Key Vault Release 21.4
Support for Additional Monitoring Information Through SNMP
Starting in Oracle Key Vault release 21.4, additional monitoring information is available through the SNMP nsExtendOutputFull
MIB base variable.
The nsExtendOutputFull
MIB base variable now returns the following values:
- Oracle Audit Vault monitor status
- Oracle Audit Vault agent status
- Server or CA certificate expiration information (whichever certificate expires sooner)
Parent topic: Changes for Oracle Key Vault Release 21.4
Changes for Oracle Key Vault Release 21.3
Oracle Key Vault release 21.3 introduces new features that affect this guide.
- Enhancements for the Oracle Audit Vault Integration with Oracle Key Vault
Starting in Oracle Key Vault release 21.3, the integration of the Oracle Audit Vault component of Oracle Audit Vault with Oracle Key Vault has been made more secure and easier to accomplish. - Alert for Fast Recovery Area Space Utilization
Starting in Oracle Key Vault release 21.3, an alert will be generated when the Fast Recovery Area Space utilization of the Oracle Key Vault's embedded database exceeds the configured threshold value. - Cluster Redo Shipping Status Alert Message Change
Starting in Oracle Key Vault release 21.3, theCluster Redo Shipping Status
alert notification message has changed.
Parent topic: Changes in This Release for Oracle Key Vault
Enhancements for the Oracle Audit Vault Integration with Oracle Key Vault
Starting in Oracle Key Vault release 21.3, the integration of the Oracle Audit Vault component of Oracle Audit Vault with Oracle Key Vault has been made more secure and easier to accomplish.
This enhancement includes the following changes in functionality:
- Change in System Administrator and Audit Manager roles: Users who have the System Administrator role no longer can perform the Oracle Audit Vault integration. Instead, for better separation of duty, only a user who has been granted the Audit Manager role can perform the integration. In previous releases, only users with the System Administrator role could perform the integration. However, users who have the System Administrator role can check if the Audit Vault monitoring process is active.
- Easier integration process: A user with the Audit Manager role now can use the Oracle Key Vault management console to perform all the Oracle Audit Vault integration steps. In previous releases, an Oracle Key Vault administrator had to manually perform steps such as downloading and installing the Audit Vault agent to perform this integration.
Related Topics
Parent topic: Changes for Oracle Key Vault Release 21.3
Alert for Fast Recovery Area Space Utilization
Starting in Oracle Key Vault release 21.3, an alert will be generated when the Fast Recovery Area Space utilization of the Oracle Key Vault's embedded database exceeds the configured threshold value.
By default, the configured threshold value is 70 and the alert is available for standalone, multi-master cluster, and primary-standby environments. The new alert enables you to better monitor the Fast Recovery Area space usage of the Oracle Key Vault's embedded database.
Related Topics
Parent topic: Changes for Oracle Key Vault Release 21.3
Cluster Redo Shipping Status Alert Message Change
Starting in Oracle Key Vault release 21.3, the Cluster Redo Shipping Status
alert notification message has changed.
In previous releases, users were alerted only when the redo-shipping status was active (up) or inactive (down). The message now, in addition to this information, indicates whether the node in the cluster is operating in read-only mode or is no longer in read-only mode.
Related Topics
Parent topic: Changes for Oracle Key Vault Release 21.3