This page extends the Oracle Database 19c TDE integration guide with guidance for Real Application Clusters (RAC) deployments and for backup, restore, and recovery operations using Oracle Recovery Manager (RMAN). It assumes you have already completed single-instance configuration of the Futurex PKCS #11 library (FxPKCS11) and verified that Oracle TDE can generate a Master Encryption Key (MEK) on the HSM.Documentation Index
Fetch the complete documentation index at: https://docs.futurex.com/llms.txt
Use this file to discover all available pages before exploring further.
fxpkcs11.cfg configuration, and initial MEK generation. The RAC and RMAN procedures below build on a working single-instance integration.RAC deployment considerations
Oracle RAC presents Oracle TDE as a single logical keystore across all cluster nodes. For HSM-backed TDE, this means every RAC instance must be able to reach the HSM and open the same keystore at startup. The following requirements apply to every RAC deployment.FxPKCS11 library on every node
The FxPKCS11 library must be installed at the same filesystem path on every RAC node, andfxpkcs11.cfg must be identical across nodes.
Install the FxPKCS11 library on each node
<version> with the FxPKCS11 version you downloaded (for example, 4.10).Deploy fxpkcs11.cfg to each node
fxpkcs11.cfg file to /etc/fxpkcs11.cfg on every RAC node. The file must be byte-identical across nodes, including the <HSM> connection details and any TLS client certificate paths.Deploy TLS client certificates to each node
fxpkcs11.cfg references TLS client certificates for mutual authentication to the HSM, copy those certificates (and their private keys) to the referenced paths on every node, with identical permissions.Verify HSM connectivity from each node
Keystore location
Oracle 19c supports two methods for specifying the keystore location:WALLET_ROOTinstance parameter — the recommended approach for new 19c deployments. Sets the keystore root at the database instance level and supports isolated keystores in multitenant environments.ENCRYPTION_WALLET_LOCATIONinsqlnet.ora— the legacy approach carried forward from earlier releases. Still supported in 19c but deprecated.
Option 1: WALLET_ROOT (recommended)
Set WALLET_ROOT on the database
Option 2: sqlnet.ora (legacy)
If you are extending an existing deployment that already usessqlnet.ora, configure $ORACLE_HOME/network/admin/sqlnet.ora identically on every node:
Shared storage options
Place the keystore on one of the following shared storage options:- ACFS (Oracle ASM Cluster File System) — recommended for most RAC deployments.
- DBFS (Database File System) — viable if you are already using DBFS in the environment.
- NFS — supported, but requires careful mount options (hard mounts,
actimeo=0,nolock) to avoid stale keystore reads.
Auto-login keystore for RAC
Oracle supports two types of auto-login keystore:- Standard auto-login keystore (
cwallet.sso) — portable across hosts. Can be opened from any node that can read the file. - Local auto-login keystore — tied to the hostname of the machine that created it. Will not open on any other host.
Create the standard auto-login keystore
cwallet.sso file in the same directory as the password-protected keystore. Because the keystore directory is on shared storage, the cwallet.sso is immediately visible to all RAC nodes.WALLET_ROOT, Oracle automatically creates a tde subdirectory under the configured root. The FROM KEYSTORE clause should reference this subdirectory. When using sqlnet.ora, reference the directory configured in ENCRYPTION_WALLET_LOCATION directly.Updating HSM credentials
If you rotate the HSM user password (the password used by Oracle to authenticate to the HSM), you must regenerate the auto-login keystore. Run theADMINISTER KEY MANAGEMENT CREATE AUTO_LOGIN KEYSTORE command again using the new password. Because the keystore is on shared storage, a single regeneration propagates to all RAC nodes.
Multitenant (CDB/PDB) considerations
Oracle 19c uses the multitenant architecture by default. In a Container Database (CDB) with Pluggable Databases (PDBs), TDE keystores can be configured in one of two modes:- United mode — all PDBs share a single keystore at the CDB level. Simpler to manage; appropriate when a single HSM user and key group covers all tenants.
- Isolated mode — each PDB has its own keystore, potentially backed by different HSM users or key groups. Appropriate when tenants require cryptographic separation.
CONTAINER=ALL and CONTAINER=CURRENT clauses required on ADMINISTER KEY MANAGEMENT commands, and plan for per-PDB HSM user and key group provisioning on the Vectera Plus.
Migrating a software keystore to the HSM
If the customer has an existing TDE deployment using a software keystore (ewallet.p12) and is migrating to HSM-backed TDE, Oracle 19c provides a direct migration path. This is the most common reason a customer will engage Futurex on an Oracle TDE deployment.
Configure the database for HSM
WALLET_ROOT, set TDE_CONFIGURATION='KEYSTORE_CONFIGURATION=HSM'. If you are using sqlnet.ora, update the ENCRYPTION_WALLET_LOCATION method to HSM on all RAC nodes and restart each instance.Execute the migration
WITH BACKUP clause creates a backup of the original software keystore before migration.RMAN backup with TDE
RMAN backup operations against a TDE-enabled database require the keystore to be open on the instance running the backup. No RMAN-specific configuration is required beyond a working TDE integration.RMAN restore
RMAN restore operations require that the same MEK used at backup time is still available on the HSM. The keystore must be open on the target instance before or during the restore, depending on whether the control file references a keystore location.Restoring to the original host
If you are restoring to the same host that performed the backup, the FxPKCS11 library,fxpkcs11.cfg, and network path to the HSM are already in place. Open the keystore and run the restore:
Restoring to an alternate host
Restoring to a host that has never run this database requires additional preparation. Before you can restore encrypted backups, the alternate host must be able to reach the HSM and authenticate as the same crypto user used at backup time.Install FxPKCS11 on the alternate host
/opt/oracle/extapi/64/hsm/futurex/<version>/libfxpkcs11.so). Use the same version of the library to avoid potential incompatibilities.Copy fxpkcs11.cfg to the alternate host
fxpkcs11.cfg file from the original host, along with any TLS client certificates it references. Ensure file permissions match the original.Verify network reachability to the HSM
Configure WALLET_ROOT or sqlnet.ora on the alternate host
WALLET_ROOT, set the parameter to match the source database configuration. For sqlnet.ora, create the file with an ENCRYPTION_WALLET_LOCATION entry matching the original host.Restore the keystore files
cwallet.sso (and ewallet.p12 if present) from your backup location to the directory configured for the keystore. The keystore files themselves are required because they contain the HSM user credentials needed to authenticate to the HSM.Tablespace restore
Tablespace-level restore follows the same requirements as full database restore: the keystore must be open and the MEK present on the HSM. Tablespace point-in-time recovery (TSPITR) is also supported.Recovery scenarios
Point-in-time recovery
Database point-in-time recovery (DBPITR) requires the keystore to remain open throughout the entire recovery window. If the recovery spans a period during which the MEK was rotated, all historical MEKs must still be available on the HSM.Media recovery after instance failure
For a standard media recovery scenario (datafile loss on one RAC node), no TDE-specific steps are required beyond ensuring the keystore is open when the recovered instance restarts. With a correctly configured standard auto-login keystore, this happens automatically.Disaster recovery considerations
The MEK is the root of trust for all TDE-encrypted data in the database. Loss of the MEK means loss of access to all encrypted data, regardless of how intact the database backup files themselves are.- Run regular Vectera Plus key backups. See the Excrypt HSM Administrator guide for you version for key backup procedures. Store backups in a physically separate location from the primary HSM.
- Do not rotate or destroy MEKs during the RMAN retention window. Any MEK referenced by a backup within retention must remain on the HSM (or be restorable from a Vectera Plus key backup) until that backup has aged out.
- Test HSM recovery procedures periodically. Include a full TDE-restore-to-alternate-host drill in DR exercises, not just a database restore. A database restore that succeeds at the block level but fails at the first
SELECTagainst an encrypted tablespace is not a successful drill. - Document the HSM user and crypto group mapping. The HSM credentials in
fxpkcs11.cfgmust match the HSM configuration at restore time. Keep this mapping in your DR runbook.

