Тёмный

TDE - Oracle Advanced Transparent Data Encryption - Tablespace Level & Column Level Encryption 

Mallik034
Подписаться 21 тыс.
Просмотров 10 тыс.
50% 1

Oracle Advanced Transparent Data Encryption (TDE)
docs.oracle.com/cd/E11882_01/...
ENCRYPTION_WALLET_LOCATION=
(SOURCE=
(METHOD=FILE)
(METHOD_DATA=
(DIRECTORY=/u01/app/oracle/admin/DEVDB/wallet)))
cd /u01/app/oracle/product/11.2.0.4/dbhome_1/network/admin
cp sqlnet.ora_wallet sqlnet.ora
--set password based keystore
12c: ADMINISTER KEY MANAGEMENT CREATE KEYSTORE '/u01/app/oracle/admin/DEVDB/wallet' IDENTIFIED BY Welcome2020;
11g: ALTER SYSTEM SET ENCRYPTION KEY IDENTIFIED BY Welcome2020;
COL wrl_type FORMAT a12
COL wrl_parameter FORMAT a35
COL status FORMAT a15
select * from v$encryption_wallet;
--set auto login keystore
12c: ADMINISTER KEY MANAGEMENT CREATE AUTO_LOGIN KEYSTORE FROM KEYSTORE 'C:\app\AkPC\admin\tdewallet\orcl' IDENTIFIED BY Welcome2020;
11g: orapki wallet create -wallet $ORACLE_BASE/admin/DEVDB/wallet -auto_login -pwd Welcome2020
--open the keystore
12c: ADMINISTER KEY MANAGEMENT SET KEYSTORE OPEN IDENTIFIED BY Welcome2020;
11g: ALTER SYSTEM SET WALLET OPEN IDENTIFIED BY "Welcome2020";
--set master key / backup
12c: ADMINISTER KEY MANAGEMENT SET KEY IDENTIFIED BY Welcome2020 with backup;
11g: orapki wallet export/backup
--Set database master key
12c: ADMINISTER KEY MANAGEMENT SET KEY IDENTIFIED BY Welcome2020 with backup;
11g: ALTER SYSTEM SET ENCRYPTION KEY “New Key" IDENTIFIED BY “Old Key";
CREATE TABLESPACE encrypted_ts
DATAFILE '/u01/app/oracle/oradata/DEVDB/encrypted_ts.dbf' SIZE 128K
AUTOEXTEND ON NEXT 64K
ENCRYPTION USING 'AES256'
DEFAULT STORAGE(ENCRYPT);
CREATE TABLESPACE unencrypted_ts
DATAFILE '/u01/app/oracle/oradata/DEVDB/unencrypted_ts.dbf' SIZE 128K
AUTOEXTEND ON NEXT 64K;
SELECT tablespace_name, encrypted FROM dba_tablespaces;
CREATE TABLE TEST_ENC (TEXT VARCHAR2(100)) TABLESPACE encrypted_ts;
CREATE TABLE TEST_UNENC (TEXT VARCHAR2(100)) TABLESPACE unencrypted_ts;
insert into TEST_ENC values ('This is encrypted');
insert into TEST_UNENC values ('This is not encrypted');
create user test1 identified by test1;
grant dba to test1;
conn test1/test1
CREATE TABLE TEST1 (NO NUMBER(2), TEXT VARCHAR2(100)) TABLESPACE unencrypted_ts;
insert into TEST1 values (1, 'This is not encrypted');
commit;
ALTER TABLE TEST1 MODIFY (TEXT ENCRYPT USING 'AES256');
CREATE TABLE TEST2 (NO NUMBER(2), TEXT VARCHAR2(100) ENCRYPT USING 'AES256') TABLESPACE unencrypted_ts;
insert into TEST2 values (1, 'This is not encrypted');
commit;
ALTER SYSTEM FLUSH BUFFER_CACHE;
create user test2 identified by test2;
grant dba to test2;
conn test2/test2
SELECT * FROM DBA_ENCRYPTED_COLUMNS;
#TDE #TransparentDataEncryption #TSEncryption #ColumnEncryption #Encryption #11g #12c #Wallet #Oracle #RAC #Database #Exadata
Please do follow me and support me on,
LinkedIn: / mallik034
RU-vid: / mallik034
Fakebook: / mallik034
Blog: mallik034.blogspot.com
twitter: / mallik034
Instagram: / mallik034
FBPage: / mallik034oracledba
Skype: malluramadurg
Regards,
Mallikarjun Ramadurg
Mobile: +91 9880616848
WhatsApp: +91 9880616848
Email: malluramadurg@gmail.com
LinkedIn: / mallik034
RU-vid: / mallik034
Fakebook: / mallik034
Blog: mallik034.blogspot.com
twitter: / mallik034
Instagram: / mallik034
FBPage: / mallik034oracledba
Skype: malluramadurg

Опубликовано:

 

20 окт 2020

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 26   
@maveasna2096
@maveasna2096 2 месяца назад
The video is gold and well done explanation sir.
@uzzalbasak2517
@uzzalbasak2517 2 года назад
Very nice and clear explanation. strings command was Simply awesome .
@samirmomin203
@samirmomin203 3 года назад
Excellent Mallik, Thanks for the good knowledge sharing Session to clear the TDE basic concepts.
@Mallik034
@Mallik034 3 года назад
It's my pleasure
@avanthiguduru8418
@avanthiguduru8418 3 года назад
Excellent mallik, very good info
@Mallik034
@Mallik034 3 года назад
Thank you
@VinothKumar-hr6ey
@VinothKumar-hr6ey 3 года назад
Nice video sir, keep rocking 😊🙌
@Mallik034
@Mallik034 3 года назад
Thanks a ton. Keep watching my videos and more to come in coming days and keep enjoying my videos
@BHARARHROYAL
@BHARARHROYAL 3 года назад
Crystal clear expansion and please explain oracle key vault also. How to migrate TDE to OKV
@Mallik034
@Mallik034 3 года назад
Hey Bharath, Database vault is different concept as comparison with wallet and TDE. Let me take one basic understanding on database vault and then I will do comparison. Once these concept are understand clearly its good to go with migration and securing database with key vault. These are advanced security concepts. Definitely I will take few sessions on these concepts.
@parascharpe7983
@parascharpe7983 2 года назад
Thanks Mallik for this nice presentation it helped me in one of the db data encryption ** One thing I am not able to connect is why these .dbf file require and do we need to create it manually every time. ** second thing how we can check the Column level encryption has encrypted the data I mean can we see the encrypted data while triggering the select query on particular column. is there any way where i can see the table data with column value is encrypted.
@VikramKumar-vm3xy
@VikramKumar-vm3xy 3 года назад
Hello Mallik Thank you for this wonderful session. Specially the lab thing you have done along with theory. Just wanted to know where did we set authorized user list who can only get decrypted data and rest will get encrypted data? Did I miss something to understand this concept.
@Mallik034
@Mallik034 3 года назад
You have to grant the decryption role/permission to user then only they ar3 able to see the data otherwise for all it will be encrypted.
@VikramKumar-vm3xy
@VikramKumar-vm3xy 3 года назад
@@Mallik034 at which stage and how we grant the permission for specific user to get decrypt data?
@PeterWahlOracle
@PeterWahlOracle 2 года назад
@@Mallik034 Sorry, but there is no "decryption role" in Oracle.
@BHARARHROYAL
@BHARARHROYAL 3 года назад
Thanks for sharing all questions and answers mallik sir 1. If i loose the existing wallet password, how to recover it without knowing password . We can change the password to new password if old password is with us , but we loose the wallet password. >>> If we loose wallet password there is no way we can retrive the password >>> Best way to manage wallet to having wallet backups >>> Refer MOS note: 1342875.1 2. If we loose the wallet itself, should we leave the tableapaces unused, there is any otherway to make use of those encrypted tablespaces? >>> We have to restore wallet from its backup >>> If you loose your wallet, You can not access encrypted tablespace or columns >>> No way you can make use of these encrypted tablespace 3. There are tablespaces created earlier. Now tde got enabled, how to move data to encrypted tablespaces, do we have to use move table command or is there any alter tableapace command to make unencrypted to encrypted . >>> ALTER TABLESPACE users2 ENCRYPTION OFFLINE USING 'AES256' ENCRYPT; OR >>> You can crete new TS with encryption and move object from old TS to new encrypted TS 4. If primary database got wallet now and tablespaces got encrypted there after, how to make the standby use those tde encryption feature while standby even did not have encryption few while ago . >>> Whenevr you enable encryption on existing TS or create new TS with encryption automatically same thing will happen at standby side, You no need to do the same thing at standby side. >>> Only consideration is you need to copy your wallet to standby and edit the wallet location in sqlnet.ora in standby side 5. Refreshing the database needs oracle wallets to be moved, if already the databases were refreshed earlier using rman feature using from active database rman feature which do not use encrypted backups of datafiles, so again here we have to copy wallets, correct? >>> You need a backup of the wallet from source and the wallet password to allow database duplication with encrypted data at your target side.
@shanchen1142
@shanchen1142 3 месяца назад
nice! where can i get this powerpoint?
@satishvibes8757
@satishvibes8757 11 месяцев назад
Hi sir, What are the types of secure backups of the database?
@Mallik034
@Mallik034 10 месяцев назад
Tape backups
@SumanGirijaHi
@SumanGirijaHi 3 года назад
Few questions: 1.if i loose the existing wallet password , how to recover it without knowing password . We can change the password to new password if old password is with us , but we loose the wallet password . 2. If we loose the wallet itself , should we leave the tableapaces unused , there is any otherway to make use of those encrypted tablespaces ? 3. There are tablespaces created earlier . Now tde got enabled , how to move data to encrypted tablespaces , do we have to use move table command or is there any alter tableapace command to make unencrypted to encrypted . 4. If primary database got wallet now and tablespaces got encrypted thereafter , how to make the standby use those tde encryption feature while standby even did not have encryption few while ago . 5. Refreshing the database needs oracle wallets to be moved , if already the databases were refreshed earlier using rman feature using from active database rman feature which do not use encrypted backups of datafiles , so again here we have to copy wallets , correct ?
@Mallik034
@Mallik034 3 года назад
1. If i loose the existing wallet password, how to recover it without knowing password . We can change the password to new password if old password is with us , but we loose the wallet password. >>> If we loose wallet password there is no way we can retrive the password >>> Best way to manage wallet to having wallet backups >>> Refer MOS note: 1342875.1 2. If we loose the wallet itself, should we leave the tableapaces unused, there is any otherway to make use of those encrypted tablespaces? >>> We have to restore wallet from its backup >>> If you loose your wallet, You can not access encrypted tablespace or columns >>> No way you can make use of these encrypted tablespace 3. There are tablespaces created earlier. Now tde got enabled, how to move data to encrypted tablespaces, do we have to use move table command or is there any alter tableapace command to make unencrypted to encrypted . >>> ALTER TABLESPACE users2 ENCRYPTION OFFLINE USING 'AES256' ENCRYPT; OR >>> You can crete new TS with encryption and move object from old TS to new encrypted TS 4. If primary database got wallet now and tablespaces got encrypted there after, how to make the standby use those tde encryption feature while standby even did not have encryption few while ago . >>> Whenevr you enable encryption on existing TS or create new TS with encryption automatically same thing will happen at standby side, You no need to do the same thing at standby side. >>> Only consideration is you need to copy your wallet to standby and edit the wallet location in sqlnet.ora in standby side 5. Refreshing the database needs oracle wallets to be moved, if already the databases were refreshed earlier using rman feature using from active database rman feature which do not use encrypted backups of datafiles, so again here we have to copy wallets, correct? >>> You need a backup of the wallet from source and the wallet password to allow database duplication with encrypted data at your target side
@PeterWahlOracle
@PeterWahlOracle 2 года назад
Wallet or wallet password lost => database lost; there is no backdoor in TDE
@suryapedaprolu6019
@suryapedaprolu6019 3 года назад
Can we convert already existing tablespaces as encrypted?
@VinothKumar-hr6ey
@VinothKumar-hr6ey 3 года назад
Yes you, can create/configure wallet->create encrypted tablespace-> move data from unencrypted to encrypted tablespace
@suryapedaprolu6019
@suryapedaprolu6019 3 года назад
Excellent Malik, Thanks for clear explanation
@Mallik034
@Mallik034 3 года назад
Yes you can do that. 1. If i loose the existing wallet password, how to recover it without knowing password . We can change the password to new password if old password is with us , but we loose the wallet password. >>> If we loose wallet password there is no way we can retrive the password >>> Best way to manage wallet to having wallet backups >>> Refer MOS note: 1342875.1 2. If we loose the wallet itself, should we leave the tableapaces unused, there is any otherway to make use of those encrypted tablespaces? >>> We have to restore wallet from its backup >>> If you loose your wallet, You can not access encrypted tablespace or columns >>> No way you can make use of these encrypted tablespace 3. There are tablespaces created earlier. Now tde got enabled, how to move data to encrypted tablespaces, do we have to use move table command or is there any alter tableapace command to make unencrypted to encrypted . >>> ALTER TABLESPACE users2 ENCRYPTION OFFLINE USING 'AES256' ENCRYPT; OR >>> You can crete new TS with encryption and move object from old TS to new encrypted TS 4. If primary database got wallet now and tablespaces got encrypted there after, how to make the standby use those tde encryption feature while standby even did not have encryption few while ago . >>> Whenevr you enable encryption on existing TS or create new TS with encryption automatically same thing will happen at standby side, You no need to do the same thing at standby side. >>> Only consideration is you need to copy your wallet to standby and edit the wallet location in sqlnet.ora in standby side 5. Refreshing the database needs oracle wallets to be moved, if already the databases were refreshed earlier using rman feature using from active database rman feature which do not use encrypted backups of datafiles, so again here we have to copy wallets, correct? >>> You need a backup of the wallet from source and the wallet password to allow database duplication with encrypted data at your target side
Далее
Я ПОКУПАЮ НОВУЮ ТАЧКУ - МЕЧТУ!
39:05
Oracle 19c Transparent Data Encryption TDE with Wallet
1:12:44
Back to basics with Transparent Data Encryption (TDE)
41:16
04   Column Level Encryption
11:48
Просмотров 3,3 тыс.
Advanced security workshop 2-data redaction
37:33
Просмотров 1,3 тыс.