Database
Oracle Database TDE (12c)

Generate a TDE Master Encryption Key on the Vectera Plus

2min

To configure Oracle Database 12c TDE with an HSM, we recommend that you refer to the following Oracle knowledge base article:

This section shows a very basic example of configuring Oracle TDE with an HSM using PKCS #11. However, there are many nuances in an Oracle Database environment, so the following steps might not apply directly to certain situations and implementations. Use this section only as a general guide and thoroughly consult the preceding Oracle documentation link before implementing Oracle TDE with an HSM in your environment.

To use HSM-based encryption, you must generate a Master Encryption Key (MEK) and store it on the . TDE uses it for encrypting and decrypting the Oracle Table Keys.

This section covers the following Oracle Database implementation methods: A standard implementation of Oracle Database running on a server or desktop, and an Oracle Database implementation running in a Docker container.

Standard implementation
Docker container implementation
1

Set the Oracle environment by using the following commands:

Shell

2

Connect to the database:

Shell

3

Start the Oracle instance:

SQL

4

Open the hardware keystore by using the password of the identity created on the :

SQL

5

Perform one of the following options for the TDE Master Encryption Key:

  • Migrate a previously configured TDE Master Encryption Key by referring to this article.
  • Create the TDE Master Encryption Key by using the password of the identity that was created on the , by running the following command:
SQL


If the Master Encryption Key creation succeeds, you see the following message:

Text


If the database contains columns encrypted with a public key, the columns are decrypted and reencrypted with the Oracle table key, which is encrypted/decrypted with the AES symmetric key generated by HSM-based transparent data encryption.