This section starts with the general KMES configurations necessary for Oracle Database to store the TDE Master Encryption Key on the KMES. Then, it shows how to configure TLS communication between the KMES Series 3 and the Oracle Database instance.Documentation Index
Fetch the complete documentation index at: https://docs.futurex.com/llms.txt
Use this file to discover all available pages before exploring further.
Configure general KMES settings for the Oracle Database 19C integration
Perform the following tasks to configure the KMES Series 3 for communication with FXPKCS #11:- Create an Oracle Database role with the correct assigned permissions.
- Create an Oracle Database identity with the correct role.
- Create the key group for Oracle TDE keys
- Enable Host API commands.
Create a role
Perform the following steps to create a role for Oracle Database with the required permissions:On the Info tab, set the Type to Application, set a name for the role, such as
Oracle Database, and set Logins Required to 1.Under the Permissions tab, enable the following permissions:
| Permission | Subpermission |
|---|---|
| Certificate Authority | All subpermissions |
| Cryptographic Operations | All subpermissions |
| Device Groups | All subpermissions |
| Keys | All subpermissions |
Create an identity
Perform the following steps to create a new identity and assign it the Oracle Database role:On the Authentication tab, remove the default API Key mechanism, add the Password authentication mechanism, and configure the password.
Create the key group
Perform the following steps to create a key group for the Oracle TDE – KMES Series 3 integration. This key group contains the created or renewed Master Keys for Oracle TDE.You can choose any name for the key group, but remember the name because you need to use it later in the
<KEYGROUP-NAME> tag in the fxpkcs11.cfg file.In the Select Key Group Storage window, set the Key Type to Symmetric and the Storage Location to HSM Trusted. Then, select [ OK ]*.
In the Key Group Editor window, set the name of the key group, set the Owner Group to the Oracle Database role, and ensure that the Oracle Database role has Add permissions for the key group.
Enable the Host API commands
Because the connection to the FXPKCS11 library uses the Host API port, you must define which commands to enable for execution by the FXPKCS11 library. To set the enabled commands required for the Oracle TDE operation, complete the following steps:Go to Administration > Configuration >
Host API Options and enable the following commands:
| Command | Description |
|---|---|
| ECHO | Communication Test/Retrieve Version |
| RAFA | Filter Issuance Policy |
| RKCK | Create Key |
| RKCP | Get Command Permissions |
| RKCS | Create Symmetric Key Group |
| RKED | Encrypt or Decrypt Data |
| RKLN | Lookup Objects |
| RKLO | Login User |
| RKRC | Get Key |
Configure TLS communication
Perform the following tasks to configure TLS communication between the KMES Series 3 and the Oracle Database instance:- Create a Certificate Authority.
- Generate a CSR for the System/Host API connection pair.
- Sign the System/Host API CSR.
- Export the Root CA.
- Export the signed System/Host API TLS certificate.
- Load the exported certificates into the System/Host API connection pair.
- Generate a private key and CSR for the Oracle Database instance by using OpenSSL.
- Sign the CSR for the Oracle Database instance.
- Export the signed Oracle TDE certificate.
Create a CA
Perform the following steps to create a Certificate Authority (CA):In the Certificate Authority window, enter a name for the certificate container, leave all other fields set to the default values, and select [ OK ]*.
The certificate container that you just created appears in the Certificate Authorities menu.
Generate a CSR
Perform the following steps to generate a CSR for the System/Host API connection pair:Under the System/Host API connection pair, uncheck the Use Futurex certificates checkbox and select [ Edit ] next to PKI keys.
When prompted that SSL will not be functional until you import new certificates, select [ Yes ] to continue.
In the PKI Parameters window, leave the fields set to the default values and select [ OK ].
The Application Public Keys window now shows that a PKI key pair is Loaded.
On the Subject DN tab, you can leave the default System/Host API value set in the Common Name field or change it to a different value.
When notified that the certificate signing request was successfully written to the selected file location, select [ OK ].
Sign the System/Host API CSR
Perform the following steps to sign the System/Host API CSR:Export the CA certificate
Perform the following steps to export the Root CA certificate:In the file browser, select the location where you want to save the root CA Certificate. Specify a name for the file and select [ Open ].
Export the certificate
Perform the following steps to export the signed System/Host API certificate:In the file browser, select the location where you want to save the signed System/Host API certificate. Specify a name for the file and select [ Open ].
Load the certificates
Perform the following steps to load the exported certificates into the System/Host API connection pair:In the file browser, select both the root CA certificate and the signed System/Host API certificate and select [ Open ].
Select [ OK ] to save changes.
In the Network Options window, the System/Host API connection pair shows Signed loaded next to Certificates in the User Certificates section.
Generate a private key and CSR
Perform the following steps to generate a private key and CSR for the Oracle Database instance by using OpenSSL:You must run the commands in this section from a terminal application with OpenSSL.
Open a terminal and run the following command to generate a private key for the Oracle Database instance:
Shell
The private key outputs to a file named
tls_skey.pem in the current working directory.Run the following command to generate a CSR for the Oracle Database instance:When prompted, enter the certificate information, pressing the Enter key at every prompt to set the default value for each field.
Shell
The CSR outputs to a file named
tlscertreq.pem in the current working directory.Sign the CSR
Perform the following steps to sign the CSR for the Oracle Database instance:In the file browser, select the Oracle Database CSR.
Certificate information populates in the Create X.509 From CSR window.
On the Subject DN tab, change the preset drop-down option to Classic, and set a common name for the certificate, such as
Oracle TDE.Export the certificate
Perform the following steps to export the signed Oracle TDE certificate:In the file browser, go to the location where you want to save the Oracle TDE certificate. Specify a name for the file and select [ Open ].
Select [ OK ].
A message box states that the PEM file was successfully written to the location you specified.

