Index

Symbols  A  C  D  E  G  H  I  J  K  L  M  N  O  P  R  S  T  U  V  X  

Symbols


A

  • actual data 15.2
  • ad hoc tools
    • Oracle Data Redaction 14.4.2
  • ADMINISTER KEY MANAGEMENT
    • isolated mode operations 4.2
    • isolated mode operations not allowed 4.3
    • united mode operations allowed in 3.2
    • united mode operations not allowed 3.3
  • administrative access to policies, restricting 19.2
  • aggregate functions
    • affect on Data Redaction policy optimization 18.6
  • ALTER SYSTEM statement
    • how compares with ADMINISTER KEY MANAGEMENT statement 10.5
  • APEX_UTIL.GET_NUMERIC_SESSION_STATE function
    • Oracle Data Redaction policies (NV public function) 16.5.6
  • APEX_UTIL.GET_SESSION_STATE function
    • Oracle Data Redaction policies (V public function) 16.5.6
  • applications
    • database applications and Oracle Data Redaction 14.4.1
    • modifying to use Transparent Data Encryption 10.4
  • auto login keystores
    • and Transparent Data Encryption (TDE) 7.2.3.4
  • Automatic Storage Management (ASM)
    • keystore location configuration 7.1.12.1
    • keystore pointing to ASM location 7.1.12.2
    • moving software keystores from 7.1.9
    • non-OMF-compliant system pointing to ASM location 7.1.12.3

C

  • CDBs
    • cloning PDBs with encrypted data 8.2.3.2
    • cloning PDBs with encrypted data in isolated mode 9.2.3
    • cloning PDBs wth encrypted data, about 8.2.3.1
    • Data Redaction masking policies 14.5
    • moving PDB from one CDB to another 9.2.1
    • moving PDB from one CDB to another in united mode 8.2.1
    • PDBs with encrypted data 8.2.2
    • preserving keystore passwords in PDB move operations 9.2.1
    • preserving keystore passwords in PDB move operations in united mode 8.2.1
    • relocating PDBs with encrypted data across CDBs in united mode 8.2.3.4
    • remotely cloning PDBs with encrypted data in isolated mode 9.2.4, 9.2.5
    • remotely cloning PDBs with encrypted data in united mode 8.2.3.3
  • change data capture, synchronous 5.3
  • closing external keystores 8.1.3.1
  • closing software keystores 8.1.3.1
  • column encryption
    • about 2.4.2
    • changing algorithm 5.9
    • changing encryption key 5.9
    • creating encrypted table column with default algorithm 5.4.2
    • creating encrypted table column with non-default algorithm 5.4.3
    • creating index on encrypted column 5.6
    • data loads from external file 10.6
    • data types to encrypt 5.2
    • existing tables
      • about 5.5.1
      • adding encrypted column to 5.5.2
      • disabling encryption 5.5.4
      • encrypting unencrypted column 5.5.3
    • external tables 5.4.7
    • incompatibilities 13.1
    • limitations 13.1
    • performance, optimum 13.2
    • salt 5.7
    • security considerations 10.2.2
    • skipping integrity check 5.4.4
  • column sensitive type discovery
    • enabling when creating a Data Redaction policy 17.5.2
  • compliance
    • Transparent Data Encryption 2.2
  • compression of Transparent Data Encryption data 10.1
  • configuring software keystores
    • creating local auto-login keystore 3.5.2.3
  • control files

D

  • data at rest 2.1
  • database close operations
  • database links
    • with Oracle Data Redaction policies 18.5
  • database roles
    • Data Redaction policies 16.5.4
  • databases
  • data deduplication of Transparent Data Encryption data 10.1
  • data redaction
    • See: Oracle Data Redaction
  • Data Redaction supported functions 16.5.1
  • data storage
    • Transparent Data Encryption 10.3.2
  • DDL statements
    • Oracle Data Redaction policies 18.2
  • decryption
  • DISTINCT clause, Data Redaction policies 18.1
  • DML statements
    • Oracle Data Redaction policies 18.2

E

  • editing custom formats 17.4.3
  • editing policies 17.5.3
  • Editions
    • Transparent Data Encryption 11.6
  • ENCRYPT_NEW_TABLESPACES database initialization parameter 6.6.2
  • encrypted columns
    • data loads from external files 10.6
  • encrypting data
  • encryption 2.4.2
    • See also: Transparent Data Encryption (TDE)
    • algorithm, setting default 6.5
    • cloning PDBs with encrypted data 8.2.3.2
    • cloning PDBs with encrypted data in isolated mode 9.2.3
    • databases offline 6.10.2
    • databases online 6.10.3
    • encrypting future tablespaces 6.6.2
    • existing databases 6.10.1
    • procedure 6.6.2
    • relocating PDBs with encrypted data across CDBs in united mode 8.2.3.4
    • remotely cloning PDBs with encrypted data in isolated mode 9.2.4, 9.2.5
    • remotely cloning PDBs with encrypted data in united mode 8.2.3.3
    • supported encryption algorithms 6.9.1
    • tablespaces, offline 6.8.1
    • tablespaces, online 6.9.1
  • encryption algorithms, supported 6.9.1
  • encryption keys
    • setting in isolated mode 4.5.4
    • setting in united mode 3.5.4.2
  • Errors:
  • EXEMPT REDACTION POLICY privilege
    • using with Database Vault 19.2
  • expressions 16.5.1
  • EXTERNAL_STORE clause 7.1.3.4
  • external credential store, external keystores 7.1.3.1
  • external credential store, external keystores, sqlnet.ora 7.1.3.3
  • external credential store, external keystores, WALLET_ROOT 7.1.3.2
  • external credential store, password-based software keystores 7.1.3.1
  • external credential store, password-based software keystores, sqlnet.ora 7.1.3.3
  • external credential store, password-based software keystores, WALLET_ROOT 7.1.3.2
  • external files
    • loading data to tables with encrypted columns 10.6
  • external keystores 3.6.1
  • external store for passwords
  • external tables, encrypting columns in
    • ORACLE_DATPUMP 10.6
    • ORACLE_LOADER 10.6

G

  • GROUP BY clause, Data Redaction policies 18.1
  • guidelines
    • materialized views and Data Redaction 19.5
    • recycle bin and Data Redaction 19.7
    • SYS_CONTEXT values and Data Redaction 19.4
  • guidelines, general usage
    • redacted columns and DISTINCT clause 18.1
    • redacted columns and GROUP BY clause 18.1
    • redacted columns and ORDER BY clause 18.1
  • guidelines, security
    • ad hoc query attacks and Data Redaction 19.1
    • application context value handling by Data Redaction policies 19.1
    • day-to-day operations and Data Redaction 19.1
    • DDL statements and Data Redaction policies 19.1
    • exhaustive SQL queries and inference and Data Redaction 19.1

H

  • hardware security modules
  • HEARTBEAT_BATCH_SIZE initialization parameter 3.6.6.2

I

  • import/export utilities, original 5.3
  • indexes
    • creating on encrypted column 5.6
  • index range scans 2.4.3
  • inference, used to find data by repeatedly using a query 19.1
  • inline views
    • Data Redaction policies order of redaction 18.3
    • Data Redaction redaction 18.3
  • intruders
    • ad hoc query attacks 19.1
  • isolated mode 4.2, 4.3
    • about 4.1
    • about configuring wallet location and keystore type 4.4.1
    • ADMINISTER KEY MANAGEMENT operations allowed in 4.2
    • ADMINISTER KEY MANAGEMENT operations not allowed in 4.3
    • backing up software keystores 9.1.2
    • changing PDB keystore from CDB root 4.4.3
    • configuring external keystores, about 4.6.1
    • configuring HSM 4.6.3
    • configuring keystore location and keystore type 4.4.2
    • configuring software keystores, about 4.5.1
    • creating software keystore 4.5.2
    • creating TDE master encryption key for later use 9.1.6
    • encrypting data 4.5.5, 4.6.6
    • encryption key, setting 4.5.4
    • exporting, importing TDE master encryption keys 9.2.7.1
    • exporting or importing master encryption keys 9.2.7.2
    • external keystores, closing 9.1.4.2
    • external keystores, opening 4.6.4
    • lost control file 4.4.4
    • master encryption keys
      • moving key from PDB to CDB root 9.1.15
    • master encryption keys, migrating 4.6.5.2
    • migrating from HSM to password software keystore 9.1.14.2
    • migrating from password software keystore to HSM 9.1.14.1
    • moving encryption key into new keystore 9.1.9
    • moving PDB from one CDB to another 9.2.1
    • Oracle RAC 4.4.5
    • password change for external keystores 9.1.1.2
    • password change for software keystores 9.1.1.1
    • plugging PDBs with encrypted data into CDB 9.2.2.2
    • plugging PDB with master encryption keys stored in external keystore 9.2.2.4
    • secrets in a keystore, Oracle Database 9.1.12.1
    • secrets stored in external keystores 9.1.12.6
    • secrets stored in software keystores 9.1.12.2
    • setting new encryption key 4.6.5.1
    • software keystores, closing 9.1.4.1
    • software keystores, opening 4.5.3
    • uniting PDB keystore 9.1.15
    • unplugging PDBs 9.2.2.3

J

  • JSON
    • Oracle Data Redaction 18.15

K

  • keystore location
    • about setting for isolated mode 4.4.1
    • setting for isolated mode 4.4.2
    • setting for united mode 3.4.2, 3.4.3
  • keystores
    • about 2.4.4.1
    • architecture 2.4.2
    • ASM-based 7.1.12.1
    • auto login 7.2.3.4
    • auto-login, open and close operations in CDBs 8.2.4, 9.2.6
    • backing up isolated mode password-protected software keystores
    • backing up password-protected software keystores
    • backing up united mode password-protected software keystores
    • closing external keystores 8.1.3.1
    • closing in CDBs 8.2.4, 9.2.6
    • closing software keystores 8.1.3.1
    • creating when PDB is closed 9.1.16.1
    • database close operations 10.7
    • deleting 7.1.15
    • deleting unused 8.1.11.2
    • deleting unused, about 8.1.11.1
    • deleting unused in isolated mode 9.1.9
    • external 3.6.1
    • external, opening in isolated mode 4.6.4
    • hardware, changing password in isolated mode 9.1.1.2
    • hardware, changing password in united mode 8.1.1.2
    • hardware, opening in united mode 3.6.5.2
    • merging
      • about 7.1.7.1
      • auto-login into password-protected 7.1.7.4
      • one into another existing keystore 7.1.7.2
      • one into another existing keystore in isolated mode 9.1.3.1
      • reversing merge operation 7.1.7.5
      • two into a third new keystore 7.1.7.3
      • two into a third new keystore in isolated mode 9.1.3.2
    • migrating
      • creating master encryption key for external keystore-based encryption 7.1.10.1.3
      • external keystore to software keystore 7.1.10.2.1
      • keystore order after migration 7.1.10.3
      • password key into external keystore 7.1.10.1.2
    • migration using Oracle Key Vault 7.1.11
    • moving out of ASM 7.1.9
    • moving software keystore to a new location 7.1.8
    • non-OMF-compliant system pointing to ASM location 7.1.12.3
    • opening external 3.6.5
    • opening in CDBs 8.2.4, 9.2.6
    • Oracle Database secrets
    • password access 7.1.1
    • password preservation in PDB move operations 9.2.1
    • password preservation in PDB move operations in united mode 8.2.1
    • pointing to ASM location 7.1.12.2
    • reverting keystore creation operation 9.1.16.2
    • search order for 2.7
    • software, changing password in isolated mode 9.1.1.1
    • software, changing password in united mode 8.1.1.1
    • software, creating in united mode 3.5.2.2
    • software, opening in isolated mode 4.5.3
    • software, opening in united mode 3.5.3.2
    • TDE master encryption key merge differing from import or export 7.2.4.10
    • using auto-login external keystore 7.1.2.1
  • keystore type
    • about setting for isolated mode 4.4.1
    • setting for isolated mode 4.4.2
    • setting for united mode 3.4.3
    • setting for united mode using parameter 3.4.2

L

  • LENGTH functions, character string

M

  • masking
    • See: Oracle Data Redaction
  • materialized views
    • Data Redaction guideline 19.5
    • Transparent Data Encryption tablespace encryption 11.2.1
  • migration
    • migrating from HSM to password software keystore 9.1.14.2
    • migrating from password software keystore to HSM 9.1.14.1
  • moving encryption key into new keystore
  • multitenant container databases
    • See: CDBs

N

  • namespace functions
  • nested functions
    • Data Redaction policies order of redaction 18.3
  • NV public function (APEX_UTIL.GET_NUMERIC_SESSION_STATE function), Data Redaction policies 16.5.6

O

  • OLS_LABEL_DOMINATES public function
    • Data Redaction policies 16.5.5
  • ONE_STEP_PLUGIN_FOR_PDB_WITH_TDE dynamic system parameter 8.2.1, 9.2.1
  • opening external keystores 3.6.5, 3.6.5.1
  • opening software keystores 3.5.3.1
  • operations allowed in 3.2, 4.2
  • operations not allowed in 3.3, 4.3
  • ORA-00979 error
    • not a GROUP BY expression error 18.1
  • ORA-28081
    • Insufficient privileges - the command references a redacted object error 18.2
  • ORA-28365 error
    • wallet is not open 6.2
  • ORA-46680 error 8.2.2.1
  • ORA-46694 error 9.1.15
  • ORA-65040 error 9.1.16.1
  • Oracle Application Express
    • filtering using by session state in Data Redaction policies 16.5.6
  • Oracle Application Expression
  • Oracle Call Interface
    • Transparent Data Encryption 11.5
  • Oracle Database Real Application Security
  • Oracle Database Vault
    • using with Data Redaction 19.2
  • Oracle Data Guard
    • TDE and Oracle Key Vault 11.2.2
    • TDE master encryption keys, removing from standby database 8.1.12
    • Transparent Data Encryption 11.2.1
  • Oracle Data Pump
    • encrypted columns 11.1.2
    • encrypted data 11.1.1
    • encrypted data with database links 11.1.4
    • encrypted data with dump sets 11.1.3
    • exported data from Data Redaction policies 18.13.3
    • exporting Oracle Data Redaction objects 18.13.2.1
    • imported data from Data Redaction policies 18.13.4
    • Oracle Data Redaction security policy 18.13.1
  • Oracle Data Redaction 15.4
  • Oracle Data Redaction, database links 18.5
  • Oracle Data RedactionEnterprise Manager Cloud Control
    • deleting custom format 17.4.5
  • Oracle Data Redaction formats
    • creating in Cloud Control 17.4.2
    • deleting in Cloud Control 17.4.5
    • editing in Cloud Control 17.4.3
    • Enterprise Management Cloud Control, managing in 17.4.1
    • Enterprise Manager Cloud Control, sensitive column types 17.3
    • Enterprise Manager Cloud Control, viewing in 17.4.4
  • Oracle Data Redaction partial redaction
  • Oracle Data Redaction policies 16.5.3
  • Oracle Data Redaction policy expressions
    • Cloud Control, about 17.6.1
    • creating in Cloud Control 17.6.2
    • deleting in Cloud Control 17.6.5
    • editing in Cloud Control 17.6.3
    • viewing in Cloud Control 17.6.4
  • Oracle Enterprise Manager Cloud Control 17.5.3
  • Oracle Enterprise Manager Data Masking and Subsetting Pack
    • Oracle Data Redaction impact 18.14
  • Oracle GoldenGate
    • storing secrets in Oracle keystores 9.1.13.1
  • Oracle Key Vault
    • migration of keystores 7.1.11
  • Oracle Label Security
    • functions using Data Redaction expressions 16.5.2.5
  • Oracle-managed tablespaces 6.1
  • Oracle Real Application Clusters
    • Oracle Key Vault and TDE in multitenant configuration 11.3.2
    • Transparent Data Encryption 11.3.1
  • Oracle Recovery Manager
    • Transparent Data Encryption 7.1.14
  • Oracle Securefiles
  • Oracle Virtual Private Database (VPD)
  • orapki utility
    • how compares with ADMINISTER KEY MANAGEMENT statement 10.5
  • ORDER BY clause, Data Redaction policies 18.1
  • original import/export utilities 5.3

P

  • passwords
    • access to for ADMINISTER KEY MANAGEMENT operations 7.1.1
    • preserving in PDB move operations 9.2.1
    • preserving in PDB move operations in united mode 8.2.1
  • PDBs
    • Data Redaction policies 14.5
    • finding TDE keystore status for all PDBs 8.2.5
    • master encryption keys
    • unplugging with encrypted data 8.2.2.1
  • performance
    • Transparent Data Encryption 10.3.1
  • PKCS#11 library, switching over to updated library
  • pluggable databases
    • See: PDBs
  • policy expressions, Oracle Data Redaction 16.6.1

R

  • recycle bin
    • Data Redaction policies and 19.7
  • REDACTION_COLUMNS data dictionary view
    • invalid views 19.6
  • rekeying
    • master encryption key 7.2.3.4
    • TDE master encryption key in isolated mode 9.1.8
    • TDE master encryption key in united mode 8.1.8
  • reports
    • based Data Redaction policies 16.18
  • returning null values

S

  • salt
  • salt (TDE)
  • secrets
    • storing Oracle Database secrets in keystore
  • SecureFiles
  • sensitive credential data 6.7
  • software keystores
    • about 2.4.4.3
    • changing password in isolated mode 9.1.1.1
    • changing password in united mode 8.1.1.1
    • closing in isolated mode 9.1.4.1
    • closing in united mode 8.1.3.2
    • creating in united mode 3.5.2.2
    • opening, about 3.5.3.1
    • opening in isolated mode 4.5.3
    • opening in united mode 3.5.3.2
    • password-based using external keystore 7.1.3.1
    • password-based using external keystore, sqlnet.ora 7.1.3.3
    • password-based using external keystore, WALLET_ROOT 7.1.3.2
  • SUBSTR function
  • synchronous change data capture 5.3
  • SYS_CONTEXT function
    • Data Redaction policies 19.4
    • SYS_SESSION_ROLES namespace used in Data Redaction 16.5.4
  • SYS_SESSION_ROLES SYS_CONTEXT namespace
  • SYSTEM user
    • Data Redaction policies 19.3
  • SYS user
    • Data Redaction policies 19.3

T

  • TABLESPACE_ENCRYPTION_DEFAULT_ALGORITHM dynamic parameter 6.5
  • tablespace encryption
  • tablespace master encryption key
  • tablespaces
    • about encrypting 6.1
    • comparison between offline and online conversions 6.1
    • Oracle managed, closed TDE keystore impact on encrypted 6.2
    • rekeying encryption algorithm 7.2.3.5
    • tablespaces
  • tablespaces, offline decryption
  • tablespaces, offline encryption
  • tablespaces, online encryption
  • TDE
    • See: Transparent Data Encryption (TDE)
  • TDE column encryption
    • restrictions 5.3
  • TDE master encryption key 3.4.1
    • creating for later use in isolated mode 9.1.6
    • creating for later use in united mode 8.1.4.2
  • TDE master encryption keys
  • Transparent Data Encryption (TDE)
    • about 2.1
    • about configuration 2.6
    • benefits 2.2
    • column encryption
      • about 2.4.2, 5.1
      • adding encrypting column to existing table 5.5.2
      • changing algorithm 5.9
      • changing encryption key 5.9
      • creating encrypted column in external table 5.4.7
      • creating index on encrypted column 5.6
      • creating tables with default encryption algorithm 5.4.2
      • creating tables with non-default encryption algorithm 5.4.3
      • data types supported 5.2
      • disabling encryption in existing column 5.5.4
      • encrypting columns in existing tables 5.5.1
      • encrypting existing column 5.5.3
      • encryption and integrity algorithms 2.4.5
      • restrictions 5.3
      • salt in encrypted columns 5.7
    • columns with identity columns 5.3
    • compatibility with application software 13.1
    • compatibility with Oracle Database tools 13.1
    • compression of encrypted data 10.1
    • configuring external keystores
    • configuring external keystores in isolated mode
      • reconfiguring software keystore 4.6.5.2
    • configuring software keystores
      • about 3.4.1
      • creating auto-login keystore 3.5.2.3
      • setting software TDE master encryption key 3.5.4
    • data deduplication of encrypted data 10.1
    • editions 11.6
    • encryption and integrity algorithms 2.4.5
    • finding information about 7.3
    • frequently asked questions 13
    • incompatibilities 13.1
    • keystore management
      • ASM-based keystore 7.1.12.1
      • backing up password-protected software keystores 7.1.4.1
      • closing external keystores 8.1.3.1
      • closing software keystore 8.1.3.1
      • merging keystores, about 7.1.7.1
      • merging keystores, auto-login into password-protected 7.1.7.4
      • merging keystores, one into an existing 7.1.7.2
      • merging keystores, one into an existing in isolated mode 9.1.3.1
      • merging keystores, reversing merge operation 7.1.7.5
      • merging keystores, two into a third new keystore 7.1.7.3
      • merging keystores, two into a third new keystore in isolated mode 9.1.3.2
      • migrating password key and external keystore 7.1.10.1.2
      • migrating password key and external keystore, master encryption key creation 7.1.10.1.3
      • migrating password key and external keystore, reverse migration 7.1.10.2.1
      • TDE master encryption key attributes 7.2.1.1
    • keystore pointing to ASM location 7.1.12.2
    • keystores
    • keystore search order 2.7
    • master encryption key
    • master encryption key attributes
    • master encryption keys
      • setting in keystore, about 7.2.3.1
      • setting in keystore procedure 7.2.3.1
    • modifying applications for use with 10.4
    • multidatabase environments 11.7
    • multitenant environment 2.5
    • non-OMF-compliant system pointing to ASM location 7.1.12.3
    • Oracle Call Interface 11.5
    • Oracle Data Guard 11.2.1, 11.2.2
    • Oracle Data Pump
      • export and import operations on dump sets 11.1.3
      • export and import operations on encrypted columns 11.1.2
      • export operations on database links 11.1.4
    • Oracle Data Pump export and import operations
    • Oracle Real Application Clusters
      • about 11.3.1
      • Oracle Key Vault in multitenant configuration 11.3.2
    • Oracle Recovery Manager 7.1.14
    • PDBs
      • finding keystore status for all PDBs 8.2.5
    • performance
      • database workloads 13.2
      • decrypting entire data set 13.2
      • optimum 13.2
      • worst case scenario 13.2
    • performance overheads
    • privileges required 2.3
    • SecureFiles 11.4, 11.4.1
    • security considerations
    • storage overhead 10.3.2
    • storing Oracle GoldenGate secrets 9.1.13.1
    • tablespace encryption
    • tablespace encryption, setting with COMPATIBLE parameter 6.4.1.1
    • TDE master encryption key
      • rekeying in isolated mode 9.1.8
    • TDE master encryption key attributes
      • about 7.2.2.1
      • creating custom tags in isolated mode 9.1.10
      • creating custom tags in united mode 8.1.10
    • TDE master encryption keys
    • TDE Master Encryption Keys
    • views 7.3
  • Transparent Data Encryption (TDE)integrity
    • column encryption
      • creating tables without integrity checks (NOMAC) 5.4.4
      • improving performance 5.4.4
    • NOMAC parameter (TDE) 5.4.4
  • Transparent Data Encryption (TDE) keystores
    • deleting 7.1.15
    • features affected if deleted 7.1.16
    • moving software keystore to a new location 7.1.8
  • transportable tablespaces 5.3
  • tutorials
    • named Data Redaction policy expressions 16.6.5

U

  • united mode 3.2, 3.3
    • about 3.1
    • about managing cloned PDBs with encrypted data 8.2.3.1
    • ADMINISTER KEY MANAGEMENT operations allowed in 3.2
    • ADMINISTER KEY MANAGEMENT operations not allowed in 3.3
    • backing up software keystores 8.1.2
    • cloning PDB with encrypted data 8.2.3.2
    • configuring, procedure 3.4.3
    • configuring, procedure using parameters 3.4.2
    • configuring external keystores, about 3.6.2
    • configuring HSM 3.6.4
    • configuring software keystores, about 3.5.1
    • creating software keystore 4.5.2
    • creating TDE master encryption key for later use 8.1.4.2
    • encrypting data 3.5.5
    • encryption key, setting 3.5.4.2
    • external keystores, closing 8.1.3.3
    • external keystores, opening 3.6.5.2
    • finding keystore status for all PDBs 8.2.5
    • heartbeat batch size for external keystores 3.6.6.2
    • isolating PDB keystore 8.1.13
    • keystore open and close operations 8.2.4
    • master encryption keys
      • moving key from CDB root to PDB 8.1.13
    • moving TDE master encryption key into new keystore 8.1.11.2
    • password change for external keystores 8.1.1.2
    • password change for software keystores 8.1.1.1
    • relocating PDBs with encrypted data across CDBs in united mode 8.2.3.4
    • remotely cloning PDBs with encrypted data 9.2.5
    • remotely cloning PDB with encrypted data 8.2.3.3, 9.2.4
    • setting external keystore encryption key 3.6.6.3
    • software keystores, closing 8.1.3.2
    • software keystores, creating in 3.5.2.2
    • software keystores, opening 3.5.3.2
  • utilities, import/export 5.3

V

  • V$ENCRYPTION_WALLET view
    • keystore order after migration 7.1.10.3
  • views
  • V public function (APEX_UTIL.GET_SESSION_STATE function), Data Redaction policies 16.5.6

X

  • XML generation 18.8