Index
A
C
- CDBs
- cloning PDBs with encrypted data 8.2.3.2
- cloning PDBs with encrypted data in isolated mode 9.2.3
- cloning PDBs wth encrypted data, about 8.2.3.1
- moving PDB from one CDB to another in united mode 8.2.1
- moving PDB from one PDB to another 9.2.1
- PDBs with encrypted data 8.2.2
- preserving keystore passwords in PDB move operations 9.2.1
- preserving keystore passwords in PDB move operations in united mode 8.2.1
- relocating PDBs with encrypted data across CDBs in united mode 8.2.3.4
- remotely cloning PDBs with encrypted data in isolated mode 9.2.4, 9.2.5
- remotely cloning PDBs with encrypted data in united mode 8.2.3.3
- change data capture, synchronous 5.3
- closing external keystores 8.1.3.1
- closing TDE wallets 8.1.3.1
- column encryption
- about 2.5.3
- changing algorithm 5.9
- changing encryption key 5.9
- creating encrypted table column with default algorithm 5.4.2
- creating encrypted table column with non-default algorithm 5.4.3
- creating index on encrypted column 5.6
- data loads from external file 10.7
- data types to encrypt 5.2
- existing tables
- external tables 5.4.7
- incompatibilities 12.1
- limitations 12.1
- migrating encryption key 5.10
- performance, optimum 12.2
- salt 5.7
- security considerations 10.3.2
- skipping integrity check 5.4.4
- compliance
- Transparent Data Encryption 2.3
- compression of Transparent Data Encryption data 10.2
- configuring TDE wallets
- creating local auto-login TDe wallet 3.4.2.3
- control files
- lost 4.4.1
D
E
- Editions
- Transparent Data Encryption 11.6
- ENCRYPT_NEW_TABLESPACES database initialization parameter 6.6.2
- encrypted columns
- data loads from external files 10.7
- encrypting data
- encryption 2.5.3
- See also: Transparent Data Encryption (TDE)
- algorithm, setting default 6.5
- cloning PDBs with encrypted data 8.2.3.2
- cloning PDBs with encrypted data in isolated mode 9.2.3
- databases offline 6.12.2
- databases online 6.12.3
- encrypting future tablespaces 6.6.2
- about 6.6.1
- existing databases 6.12.1
- procedure 6.6.2
- relocating PDBs with encrypted data across CDBs in united mode 8.2.3.4
- remotely cloning PDBs with encrypted data in isolated mode 9.2.4, 9.2.5
- remotely cloning PDBs with encrypted data in united mode 8.2.3.3
- supported encryption algorithms 6.9.1
- tablespaces, offline 6.8.1
- tablespaces, online 6.9.1
- ENCRYPTION_WALLET_LOCATION parameter
- convert to WALLET_ROOT and TDE_CONFIGURATION 7.2.5
- encryption algorithms, supported 6.9.1
- encryption keys
- Errors:
- ORA-46694 9.1.15
- EXTERNAL_STORE clause 7.1.4.3
- external credential store, external keystores 7.1.4.1
- external credential store, external keystores, sqlnet.ora 7.1.4.2
- external credential store, password-based TDE wallets 7.1.4.1
- external credential store, password-based TDE wallets, sqlnet.ora 7.1.4.2
- external files
- loading data to tables with encrypted columns 10.7
- external keystores
- about 2.5.4.3
- backing up 7.1.7
- changing password in isolated mode 9.1.1.2
- changing password in united mode 8.1.1.2
- closing 8.1.3.1
- closing in isolated mode 9.1.4.2
- closing in united mode 8.1.3.3
- heartbeat batch size 3.6.5.2
- opening in isolated mode 4.6.3
- plugging PDBs 8.2.2.4, 9.2.2.4
- unplugging PDBs 8.2.2.3, 9.2.2.3
- using external keystore 7.1.4.1
- using external keystore, sqlnet.ora 7.1.4.2
- external store for passwords
- external tables, encrypting columns in
I
- import/export utilities, original 5.3
- indexes
- creating on encrypted column 5.6
- index range scans 2.5.2
- isolated mode 4.2, 4.3
- about 4.1
- about configuring wallet location and keystore type 4.4.1
- ADMINISTER KEY MANAGEMENT operations allowed in 4.2
- ADMINISTER KEY MANAGEMENT operations not allowed in 4.3
- backing up TDE wallets 9.1.2
- changing PDB keystore from CDB root 4.4.3
- configuring external keystores, about 4.6.1
- configuring for Oracle Key Vault 4.6.2
- configuring keystore location and keystore type 4.4.2
- configuring TDE wallets, about 4.5.1
- creating TDE master encryption key for later use 9.1.6
- creating TDE wallet 4.5.2
- encrypting data 4.5.5, 4.6.5
- encryption key, setting 4.5.4
- exporting, importing TDE master encryption keys 9.2.7.1
- exporting or importing master encryption keys 9.2.7.2
- external keystores, closing 9.1.4.2
- external keystores, opening 4.6.3
- lost control file 4.4.4
- master encryption keys
- moving key from PDB to CDB root 9.1.15
- master encryption keys, migrating 4.6.4.2
- migrating from external keystore to password TDE wallet 9.1.14.2
- migrating from password TDE wallet to external keystore 9.1.14.1
- moving encryption key into new TDE wallet 9.1.9
- moving PDB from one CDB to another 9.2.1
- Oracle RAC 4.4.5
- password change for external keystores 9.1.1.2
- password change for TDE wallets 9.1.1.1
- plugging PDBs with encrypted data into CDB 9.2.2.2
- plugging PDB with master encryption keys stored in external keystore 9.2.2.4
- secrets in a keystore, Oracle Database 9.1.12.1
- secrets stored in external keystores 9.1.12.6
- secrets stored in TDE wallets 9.1.12.2
- setting new encryption key 4.6.4.1
- TDE wallets, closing 9.1.4.1
- TDE wallets, opening 4.5.3
- uniting PDB keystore 9.1.15
- unplugging PDBs 9.2.2.3
K
- keystore location
- keystores
- about 2.5.4.1
- architecture 2.5.3
- auto login 7.2.3.4
- auto-login, open and close operations in CDBs 8.2.4, 9.2.6
- backing up isolated mode password-protected TDE wallets
- procedure 9.1.2
- backing up password-protected TDE wallets
- backing up united mode password-protected TDE wallets
- procedure 8.1.2
- changing Oracle Key Vault password 7.1.3
- closing external keystores 8.1.3.1
- closing in CDBs 8.2.4, 9.2.6
- closing TDE wallets 8.1.3.1
- creating when PDB is closed 9.1.16.1
- database close operations 10.8
- deleting unused 8.1.11.2
- deleting unused, about 8.1.11.1
- external, changing password in isolated mode 9.1.1.2
- external, changing password in united mode 8.1.1.2
- external, opening in isolated mode 4.6.3
- merging
- migrating
- creating master encryption key for external keystore-based encryption 7.1.11.1.3
- external keystore to TDE wallet 7.1.11.2.1
- keystore order after migration 7.1.11.3
- migration using Oracle Key Vault 7.1.12
- moving out of ASM 7.1.10
- multiple databases sharing same host, setting for 3.3.3
- non-OMF-compliant system pointing to ASM location 7.1.13.3
- opening in CDBs 8.2.4, 9.2.6
- Oracle Database secrets
- about 9.1.12.1
- password access 7.1.1
- password preservation in PDB move operations 9.2.1
- password preservation in PDB move operations in united mode 8.2.1
- reverting keystore creation operation 9.1.16.2
- search order for 2.7
- software, changing password in isolated mode 9.1.1.1
- software, changing password in united mode 8.1.1.1
- TDE master encryption key merge differing from import or export 7.2.4.10
- using auto-login external keystore 7.1.2.1
- keystore type
O
- opening connection to Oracle Key Vault 3.6.4, 3.6.4.1
- opening TDE wallets 3.4.3.1
- operations allowed in 3.2, 4.2
- operations not allowed in 3.5, 4.3
- ORA-28365 error
- wallet is not open 6.2
- ORA-46680 error 8.2.2.1
- ORA-46694 error 9.1.15
- ORA-65040 error 9.1.16.1
- Oracle Call Interface
- Transparent Data Encryption 11.5
- Oracle Data Guard
- Oracle Data Pump
- Oracle GoldenGate
- storing secrets in Oracle keystores 9.1.13.1
- Oracle Key Vault
- migration of keystores 7.1.12
- Oracle Key Vault connection
- opening in united mode 3.6.4.2
- Oracle-managed tablespaces 6.1
- Oracle Real Application Clusters
- Oracle Recovery Manager
- Transparent Data Encryption 7.1.15
- Oracle Securefiles
- orapki utility
- how compares with ADMINISTER KEY MANAGEMENT statement 10.6
- original import/export utilities 5.3
P
- passwords
- PDBs
- performance
- Transparent Data Encryption 10.4.1
- PKCS#11 library, switching over to updated library
T
- TABLESPACE_ENCRYPTION_DEFAULT_ALGORITHM dynamic parameter 6.5
- TABLESPACE_ENCRYPTION initialization parameter 11.2.2.2
- tablespace encryption
- about 2.5.2
- architecture 2.5.2
- creating encrypted tablespaces 6.4.3.2
- examples 6.4.3.3
- incompatibilities 12.1
- migrating encryption key 6.10
- opening keystore 6.4.1.2
- performance, optimum 12.2
- performance overhead 10.4.1
- procedure 6.4.1.1
- restrictions 6.3
- security considerations for plaintext fragments 10.3.3
- storage overhead 10.4.2
- tablespaces
- tablespaces, offline decryption
- procedure 6.8.3
- tablespaces, offline encryption
- tablespaces, online encryption
- TDE
- See: Transparent Data Encryption (TDE)
- TDE column encryption
- restrictions 5.3
- TDE columns
- migrating from release 11g 10.1
- TDE master encryption key 3.3.1
- TDE master encryption keys
- activating
- activating in isolated mode 9.1.7
- activating in united mode 8.1.6.2
- architecture 2.5.3
- attributes 7.2.1.1
- creating for later use
- about 8.1.4.1
- custom attribute tags
- disabling not allowed 7.2.3.1
- ENCRYPTION_WALLET_LOCATION to WALLET_ROOT and TDE_CONFIGURATION
- creating 7.2.5
- exporting 7.2.4.2
- exporting in PDBs 9.2.7.1
- finding currently used encryption key in united mode 8.1.9
- finding currently used TDE master encryption key 7.2.1.2
- importing 7.2.4.7
- importing in PDBs 9.2.7.1
- keystore merge differing from import or export 7.2.4.10
- outside the databaase
- about 8.1.7.1
- outside the database
- rekeying 7.2.3.4, 8.1.8, 9.1.8
- removing automatically from standby database 8.1.12
- resetting in keystore 7.2.3.3
- setting in keystore 7.2.3.1
- TDE tablespaces
- migrating from release 11g 10.1
- TDE wallets
- about 2.5.4.3
- ASM-based 7.1.13.1
- backing up password-protected TDE wallets
- about 7.1.5.1
- changing password in isolated mode 9.1.1.1
- changing password in united mode 8.1.1.1
- closing in isolated mode 9.1.4.1
- closing in united mode 8.1.3.2
- creating in united mode 3.4.2.2
- deleting 7.1.16
- deleting unused in isolated mode 9.1.9
- merging
- migrating
- password key into external keystore 7.1.11.1.2
- moving TDE wallet to a new location 7.1.9
- opening, about 3.4.3.1
- opening in isolated mode 4.5.3
- opening in united mode 3.4.3.2
- Oracle ASM disk group, setting for 3.3.4
- password-based using external keystore 7.1.4.1
- password-based using external keystore, sqlnet.ora 7.1.4.2
- pointing to ASM location 7.1.13.2
- software, opening in isolated mode 4.5.3
- software, opening in united mode 3.4.3.2
- Transparent Data Encryption (TDE)
- about 2.1
- about configuration 2.2
- benefits 2.3
- column encryption
- about 2.5.3, 5.1
- adding encrypting column to existing table 5.5.2
- changing algorithm 5.9
- changing encryption key 5.9
- creating encrypted column in external table 5.4.7
- creating index on encrypted column 5.6
- creating tables with default encryption algorithm 5.4.2
- creating tables with non-default encryption algorithm 5.4.3
- data types supported 5.2
- decrypting existing column 5.5.4
- encrypting columns in existing tables 5.5.1
- encrypting existing column 5.5.3
- encryption and integrity algorithms 2.5.5
- migrating encryption key 5.10
- restrictions 5.3
- salt in encrypted columns 5.7
- columns with identity columns 5.3
- compatibility with application software 12.1
- compatibility with Oracle Database tools 12.1
- compression of encrypted data 10.2
- configuring external keystores
- configuring external keystores in isolated mode
- reconfiguring TDE wallet 4.6.4.2
- configuring keystores
- about 3.3.1
- configuring Oracle Key Vault for united mode 3.6.3
- configuring TDE wallets
- creating auto-login TDE wallet 3.4.2.3
- data deduplication of encrypted data 10.2
- editions 11.6
- encryption and integrity algorithms 2.5.5
- finding information about 7.3
- frequently asked questions 12
- incompatibilities 12.1
- keystore management
- changing Oracle Key Vault keystore password 7.1.3
- closing external keystores 8.1.3.1
- closing TDE wallet 8.1.3.1
- merging keystores, one into an existing in isolated mode 9.1.3.1
- merging TDE wallets, about 7.1.8.1
- merging TDE wallets, one into an existing 7.1.8.2
- migrating password key and external keystore, reverse migration 7.1.11.2.1
- TDE master encryption key attributes 7.2.1.1
- keystores
- keystore search order 2.7
- master encryption key
- master encryption key attributes
- creating custom tags 7.2.2.2
- master encryption keys
- modifying applications for use with 10.5
- multidatabase environments 11.7
- multitenant environment 2.6
- non-OMF-compliant system pointing to ASM location 7.1.13.3
- opening the connection to Oracle Key Vault 3.6.4
- Oracle Call Interface 11.5
- Oracle Data Guard 11.2.3
- Oracle Data Guard, isolated keystore on PDB 11.2.6
- Oracle Data Guard rekey operations 11.2.7
- Oracle Data Pump
- Oracle Data Pump export and import operations
- about 11.1.1
- Oracle Real Application Clusters
- Oracle Recovery Manager 7.1.15
- TDE wallets 7.1.15
- PDBs
- finding keystore status for all PDBs 8.2.5
- performance
- performance overheads
- privileges required 2.4
- SecureFiles 11.4, 11.4.1
- security considerations
- setting TDE master encryption key 6.4.2
- storage overhead 10.4.2
- storing Oracle GoldenGate secrets 9.1.13.1
- tablespace encryption
- tablespace encryption, setting with COMPATIBLE parameter 6.4.1.1
- TDE master encryption key
- rekeying in isolated mode 9.1.8
- TDE master encryption key attributes
- TDE master encryption keys
- exporting and importing 7.2.4.1
- TDE Master Encryption Keys
- resetting in keystore 7.2.3.3
- TDE wallet management
- ASM-based TDE wallet 7.1.13.1
- backing up password-protected TDE wallets 7.1.5.1
- merging TDE wallets, auto-login into password-protected 7.1.8.4
- merging TDE wallets, reversing merge operation 7.1.8.5
- merging TDE wallets, two into a third new TDE wallet 7.1.8.3
- merging TDE wallets, two into a third new TDE wallet in isolated mode 9.1.3.2
- migrating password key and external keystore 7.1.11.1.2
- migrating password key and external keystore, master encryption key creation 7.1.11.1.3
- TDE wallet pointing to ASM location 7.1.13.2
- views 7.3
- wallet-based, in Oracle Data Guard 11.2.4, 11.2.5
- Transparent Data Encryption (TDE), Oracle Data Guard
- Transparent Data Encryption (TDE)integrity
- Transparent Data Encryption (TDE) keystores
- features affected if deleted 7.1.17
- Transparent Data Encryption (TDE) TDE wallets
- transportable tablespaces 5.3
U
- united mode 3.2, 3.5
- about 3.1
- about managing cloned PDBs with encrypted data 8.2.3.1
- ADMINISTER KEY MANAGEMENT operations allowed in 3.2
- ADMINISTER KEY MANAGEMENT operations not allowed in 3.5
- backing up TDE wallets 8.1.2
- cloning PDB with encrypted data 8.2.3.2
- configuring, procedure 3.3.2
- configuring CDBs for PDBs for Oracle Key Vault, about 3.6.1, 3.6.2
- configuring TDE wallets, about 3.4.1
- creating TDE master encryption key for later use 8.1.4.2
- creating TDE wallet 4.5.2
- encrypting data 3.4.5
- encryption key, setting 3.4.4.2
- external keystores, closing 8.1.3.3
- finding keystore status for all PDBs 8.2.5
- heartbeat batch size for external keystores 3.6.5.2
- isolating PDB keystore 8.1.13
- keystore open and close operations 8.2.4
- master encryption keys
- moving key from CDB root to PDB 8.1.13
- moving TDE master encryption key into new keystore 8.1.11.2
- Oracle Key Vault connection, opening 3.6.4.2
- password change for external keystores 8.1.1.2
- password change for TDE wallets 8.1.1.1
- relocating PDBs with encrypted data across CDBs in united mode 8.2.3.4
- remotely cloning PDBs with encrypted data 9.2.5
- remotely cloning PDB with encrypted data 8.2.3.3, 9.2.4
- setting external keystore encryption key 3.6.5.3
- TDE wallets, closing 8.1.3.2
- TDE wallets, creating in 3.4.2.2
- TDE wallets, opening 3.4.3.2
- utilities, import/export 5.3