Generate a TDE Master Encryption Key on the Vectera Plus
To configure Oracle Database 12c TDE with an HSM, we recommend that you refer to the following Oracle knowledge base article:
- Oracle Database 12c: https://docs.oracle.com/database/121/ASOAG/configuring-transparent-dataencryption.htm
This section shows a very basic example of configuring Oracle TDE with an HSM using PKCS #11. However, there are many nuances in an Oracle Database environment, so the following steps might not apply directly to certain situations and implementations. Use this section only as a general guide and thoroughly consult the preceding Oracle documentation link before implementing Oracle TDE with an HSM in your environment.
To use HSM-based encryption, you must generate a Master Encryption Key (MEK) and store it on the . TDE uses it for encrypting and decrypting the Oracle Table Keys.
This section covers the following Oracle Database implementation methods: A standard implementation of Oracle Database running on a server or desktop, and an Oracle Database implementation running in a Docker container.
Set the Oracle environment by using the following commands:
Connect to the database:
Start the Oracle instance:
Open the hardware keystore by using the password of the identity created on the :
Perform one of the following options for the TDE Master Encryption Key:
- Create the TDE Master Encryption Key by using the password of the identity that was created on the , by running the following command:
If the Master Encryption Key creation succeeds, you see the following message:
If the database contains columns encrypted with a public key, the columns are decrypted and reencrypted with the Oracle table key, which is encrypted/decrypted with the AES symmetric key generated by HSM-based transparent data encryption.