Oracle Wallet
The following commands provide functionality to manipulate Oracle wallet stores within the securityconfig
tool. These commands are available in EE only. For more information on the securityconfig
tool, see Configuring Security with Securityconfig.
To create a new auto-login wallet, run the wallet create
command:
wallet create
-dir <wallet directory>
Auto-login wallets store passwords in an obfuscated state. Access to the wallet is secured against reading by unauthorized users using the OS-level login.
To manipulate secrets (passwords), which are associated with a name (alias), run the wallet secret
command:
wallet secret
-dir <wallet directory>
{-set | -delete} -alias <alias>
If the -set option is specified, the user is prompted for a new password for the specified alias and required to verify the new secret.
If the -delete option is specified, the secret is deleted from the store.
Special considerations should be taken if Oracle wallet is used and you are deploying your Oracle NoSQL Database. For more information, see Guidelines for Deploying Secure Applications.
Use the wallet
subcommand while configuring the security of the
kvstore:
securityconfig
utility to set up the basic store
configuration with
security:java -Xmx64m -Xms64m -jar $KVHOME/lib/kvstore.jar securityconfig
securityconfig
tool is invoked. Use the config
create
command with the -pwdmgr
option to
specify the mechanism used to hold password that is needed for accessing the
store. In this case, Oracle Wallet is used. Oracle Wallet is only available
in the Oracle NoSQL Database Enterprise Edition
version.security-> config create -pwdmgr wallet -root $KVROOT
Enter a password for the Java KeyStore:
Enter a password for your store and then re-enter it for verification. The configuration tool will automatically generate the security related files.