11 Integrating Oracle Database Vault with Other Oracle Products
You can integrate Oracle Database Vault with other Oracle products, such as Oracle Enterprise User Security.
- Integrating Oracle Database Vault with Enterprise User Security
You can integrate Oracle Database Vault with Oracle Enterprise User Security. - Integrating Oracle Database Vault with Transparent Data Encryption
Transparent Data Encryption complements Oracle Database Vault in that it provides data protection when the data leaves the secure perimeter of the database. - Attaching Factors to an Oracle Virtual Private Database
You can attach factors to an Oracle Virtual Private Database. - Integrating Oracle Database Vault with Oracle Label Security
You can integrate Oracle Database Vault with Oracle Label Security, and check the integration with reports and data dictionary views. - Integrating Oracle Database Vault with Oracle Data Guard
An Oracle Database Vault-Oracle Data Guard integration requires first, the primary database configuration, then the standby database configration. - Registering Oracle Internet Directory Using Oracle Database Configuration Asssitant
You can use Oracle Internet Directory in an Oracle Database Vault-enabled database.
Integrating Oracle Database Vault with Enterprise User Security
You can integrate Oracle Database Vault with Oracle Enterprise User Security.
- About Integrating Oracle Database Vault with Enterprise User Security
Enterprise User Security centrally manages database users and authorizations in one place. - Configuring an Enterprise User Authorization
To configure an Enterprise User authorization, you must create an Oracle Database Vault rule set to control the user access. - Configuring Oracle Database Vault Accounts as Enterprise User Accounts
You can configure existing Oracle Database Vault user accounts as enterprise user accounts in a PDB.
About Integrating Oracle Database Vault with Enterprise User Security
Enterprise User Security centrally manages database users and authorizations in one place.
It is combined with Oracle Identity Management and is available in Oracle Database Enterprise Edition.
In general, to integrate Oracle Database Vault with Oracle Enterprise User Security, you configure the appropriate realms to protect the data that you want to protect in the database.
After you define the Oracle Database Vault realms as needed, you can create a rule set for the Enterprise users to allow or disallow their access.
Configuring an Enterprise User Authorization
To configure an Enterprise User authorization, you must create an Oracle Database Vault rule set to control the user access.
Integrating Oracle Database Vault with Transparent Data Encryption
Transparent Data Encryption complements Oracle Database Vault in that it provides data protection when the data leaves the secure perimeter of the database.
With Transparent Data Encryption, a database administrator or database security administrator can simply encrypt columns with sensitive content in application tables, or encrypt entire application tablespaces, without any modification to the application.
If a user passes the authentication and authorization checks, Transparent Data Encryption automatically encrypts and decrypts information for the user. This way, you can implement encryption without having to change your applications.
Once you have granted the Transparent Data Encryption user the appropriate privileges, then Transparent Data Encryption can be managed as usual and be used complimentary to Database Vault.
Figure 11-1 shows how Oracle Database Vault realms handle encrypted data.
Figure 11-1 Encrypted Data and Oracle Database Vault
Description of "Figure 11-1 Encrypted Data and Oracle Database Vault"
Related Topics
Attaching Factors to an Oracle Virtual Private Database
You can attach factors to an Oracle Virtual Private Database.
- Define a Virtual Private Database policy predicate that is a PL/SQL function or expression.
- For each function or expression, use the
DVF.F$
PL/SQL function that is created for each factor.
Related Topics
Integrating Oracle Database Vault with Oracle Label Security
You can integrate Oracle Database Vault with Oracle Label Security, and check the integration with reports and data dictionary views.
- How Oracle Database Vault Is Integrated with Oracle Label Security
An Oracle Database Vault-Oracle Label Security integration enables you to assign an OLS label to a Database Vault factor identity. - Requirements for Using Oracle Database Vault with Oracle Label Security
You must fulfill specific requirements in place before you use Oracle Database Vault with Oracle Label Security. - Using Oracle Database Vault Factors with Oracle Label Security Policies
To enhance security, you can integrate Oracle Database Vault factors with Oracle Label Security policies. - Tutorial: Integrating Oracle Database Vault with Oracle Label Security
An Oracle Database Vault-Oracle Label Security integration can grant different levels of access to two administrative users who have the same privileges. - Related Reports and Data Dictionary Views
Oracle Database Vault provides reports and data dictionary views that list information about the Oracle Database Vault-Oracle Label Security integration.
How Oracle Database Vault Is Integrated with Oracle Label Security
An Oracle Database Vault-Oracle Label Security integration enables you to assign an OLS label to a Database Vault factor identity.
In Oracle Label Security, you can restrict access to records in database tables or PL/SQL programs. For example, Mary may be able to see data protected by the HIGHLY SENSITIVE
label, an Oracle Label Security label on the EMPLOYEE
table that includes records that should have access limited to certain managers. Another label can be PUBLIC
, which allows more open access to this data.
In Oracle Database Vault, you can create a factor called Network
, for the network on which the database session originates, with the following identities:
-
Intranet: Used for when an employee is working on site within the intranet for your company.
-
Remote: Used for when the employee is working at home from a VPN connection.
You then assign a maximum session label to both. For example:
-
Assign the Intranet identity to the
HIGHLY SENSITIVE
Oracle Label Security label. -
Assign the Remote identity to the
PUBLIC
label.
This means that when Mary is working at home using her VPN connection, she has access only to the limited table data protected under the PUBLIC identity. But when she is in the office, she has access to the HIGHLY SENSITIVE
data, because she is using the Intranet identity.
In a traditional auditing environment, you can audit the integration with Oracle Label Security by using the Label Security Integration Audit Report. Oracle Database Vault writes the audit trail to the DVSYS.AUDIT_TRAIL$
table. If unified auditing is enabled, then you can create audit policies to capture this information. Be aware that as of Oracle Database release 21c, traditional auditing is deprecated.
Requirements for Using Oracle Database Vault with Oracle Label Security
You must fulfill specific requirements in place before you use Oracle Database Vault with Oracle Label Security.
-
Oracle Label Security is licensed separately. Ensure that you have purchased a license to use it.
-
Before you install Oracle Database Vault, you must have already installed Oracle Label Security.
-
The installation process for Oracle Label Security creates the
LBACSYS
user account. As a user who has been granted theDV_ACCTMGR
role, unlock this account and grant it a new password. For example:sqlplus bea_dvacctmgr@pdb_name Enter password: password ALTER USER LBACSYS ACCOUNT UNLOCK IDENTIFIED BY password;
-
If you plan to use the
LBACSYS
user account in Oracle Enterprise Manager, then log in to Enterprise Manager as userSYS
with theSYSDBA
administrative privilege, and grant this user theSELECT ANY DICTIONARY
andSELECT_CATALOG_ROLE
system privileges. -
Ensure that you have the appropriate Oracle Label Security policies defined.
-
If you plan to integrate an Oracle Label Security policy with a Database Vault policy, then ensure that the policy name for Oracle Label Security is less than 24 characters. You can check the names of Oracle Label Security policies by querying the
POLICY_NAME
column of theALL_SA_POLICIES
data dictionary view.
Using Oracle Database Vault Factors with Oracle Label Security Policies
To enhance security, you can integrate Oracle Database Vault factors with Oracle Label Security policies.
- About Using Oracle Database Vault Factors with Oracle Label Security Policies
And Oracle Database Vault-Oracle Label Security integration enables you to control the maximum security clearance for a database session. - Configuring Factors to Work with an Oracle Label Security Policy
You can define factors that contribute to the maximum allowable data label of an Oracle Label Security policy.
About Using Oracle Database Vault Factors with Oracle Label Security Policies
And Oracle Database Vault-Oracle Label Security integration enables you to control the maximum security clearance for a database session.
Oracle Database Vault controls the maximum security clearance for a database session by merging the maximum allowable data for each label in a database session by merging the labels of Oracle Database Vault factors that are associated to an Oracle Label Security policy.
In brief, a label acts as an identifier for the access privileges of a database table row. A policy is a name associated with the labels, rules, and authorizations that govern access to table rows.
Related Topics
Configuring Factors to Work with an Oracle Label Security Policy
You can define factors that contribute to the maximum allowable data label of an Oracle Label Security policy.
Note:
If you do not associate an Oracle Label Security policy with factors, then Oracle Database Vault maintains the default Oracle Label Security behavior for the policy.
Tutorial: Integrating Oracle Database Vault with Oracle Label Security
An Oracle Database Vault-Oracle Label Security integration can grant different levels of access to two administrative users who have the same privileges.
- About This Tutorial
You can use Oracle Database Vault factors with Oracle Label Security and Oracle Virtual Private Database (VPD) to restrict sensitive data access. - Step 1: Create Users for This Tutorial
You must create two administrative users for this tutorial. - Step 2: Create the Oracle Label Security Policy
Next, you can create the Oracle Label Security policy and grant users the appropriate privileges for it. - Step 3: Create Oracle Database Vault Rules to Control the OLS Authorization
After you create the Oracle Label Security policy, you can create Database Vault rules to work with it. - Step 4: Update the ALTER SYSTEM Command Rule to Use the Rule Set
Before the rule set can be used, you must update the ALTER SYSTEM command rule, which is a default command rule. - Step 5: Test the Authorizations
With all the components in place, you are ready to test the authorization. - Step 6: Remove the Components for This Tutorial
You can remove the components that you created for this tutorial if you no longer need them.
About This Tutorial
You can use Oracle Database Vault factors with Oracle Label Security and Oracle Virtual Private Database (VPD) to restrict sensitive data access.
You can restrict this data so that it is only exposed to a database session when the correct combination of factors exists, defined by the security administrator, for any given database session.
Step 1: Create Users for This Tutorial
You must create two administrative users for this tutorial.
Related Topics
Step 2: Create the Oracle Label Security Policy
Next, you can create the Oracle Label Security policy and grant users the appropriate privileges for it.
Step 3: Create Oracle Database Vault Rules to Control the OLS Authorization
After you create the Oracle Label Security policy, you can create Database Vault rules to work with it.
Step 4: Update the ALTER SYSTEM Command Rule to Use the Rule Set
Before the rule set can be used, you must update the ALTER SYSTEM command rule, which is a default command rule.
Step 5: Test the Authorizations
With all the components in place, you are ready to test the authorization.
Related Reports and Data Dictionary Views
Oracle Database Vault provides reports and data dictionary views that list information about the Oracle Database Vault-Oracle Label Security integration.
Table 11-1 lists the Oracle Database Vault reports.
Table 11-1 Reports Related to Database Vault and Oracle Label Security Integration
Report | Description |
---|---|
Factor Configuration Issues Report |
Lists factors in which the Oracle Label Security policy does not exist. |
Identity Configuration Issues Report |
Lists invalid label identities (the Oracle Label Security label for this identity has been removed and no longer exists). |
Security Policy Exemption Report |
Lists accounts and roles that have the |
Table 11-2 lists data dictionary views that provide information about existing Oracle Label Security policies used with Oracle Database Vault.
Table 11-2 Data Dictionary Views Used for Oracle Label Security
Data Dictionary View | Description |
---|---|
|
Lists the Oracle Label Security policies defined |
|
Lists the factors that are associated with Oracle Label Security policies |
|
Lists the Oracle Label Security label for each factor identifier in the |
Integrating Oracle Database Vault with Oracle Data Guard
An Oracle Database Vault-Oracle Data Guard integration requires first, the primary database configuration, then the standby database configration.
- Step 1: Configure the Primary Database
You must run the DGMGRL utility, register Database Vault, and then run theALTER SYSTEM
statement, to configure the primary database. - Step 2: Configure the Standby Database
You can perform the standby database configuration within the database to be used for the standby database. - How Auditing Works After an Oracle Database Vault-Oracle Active Data Guard Integration
After you have integrated Oracle Database Vault with Oracle Active Data Guard, how auditing is configured affects how audit records are generated.
Step 1: Configure the Primary Database
You must run the DGMGRL utility, register Database Vault, and then run the ALTER SYSTEM
statement, to configure the primary database.
-
For Linux and UNIX systems, ensure there is an
/etc/oratab
entry for the database on the node in which you are installing Oracle Database Vault. -
If you are using Data Guard Broker, then from the command prompt, disable the configuration as follows:
dgmgrl sys Enter password: password DGMGRL> disable configuration;
-
Register (that is, configure and enable) Oracle Database Vault on the primary server.
By default, Oracle Database Vault is installed as part of Oracle Database. You can check the registration status by querying the
DBA_DV_STATUS
data dictionary view. -
Log in to the PDB as user
SYS
with theSYSDBA
administrative privilege.sqlplus sys@pdb_name as sysdba Enter password: password
-
Run the following
ALTER SYSTEM
statements:ALTER SYSTEM SET AUDIT_SYS_OPERATIONS=TRUE SCOPE=SPFILE; ALTER SYSTEM SET OS_ROLES=FALSE SCOPE=SPFILE; ALTER SYSTEM SET RECYCLEBIN='OFF' SCOPE=SPFILE; ALTER SYSTEM SET REMOTE_LOGIN_PASSWORDFILE='EXCLUSIVE' SCOPE=SPFILE; ALTER SYSTEM SET SQL92_SECURITY=TRUE SCOPE=SPFILE; ALTER SYSTEM SET REMOTE_OS_AUTHENT=FALSE SCOPE=SPFILE; ALTER SYSTEM SET REMOTE_OS_ROLES=FALSE SCOPE=SPFILE;
-
Run the
ALTER SYSTEM
statement on each database instance to set the parameters as shown in Step 5. -
Close and then reopen each PDB.
CONNECT SYS@pdb_name AS SYSDBA Enter password: password ALTER PLUGGABLE DATABASE pdb_name CLOSE IMMEDIATE; ALTER PLUGGABLE DATABASE pdb_name OPEN;
Related Topics
Parent topic: Integrating Oracle Database Vault with Oracle Data Guard
Step 2: Configure the Standby Database
You can perform the standby database configuration within the database to be used for the standby database.
Parent topic: Integrating Oracle Database Vault with Oracle Data Guard
How Auditing Works After an Oracle Database Vault-Oracle Active Data Guard Integration
After you have integrated Oracle Database Vault with Oracle Active Data Guard, how auditing is configured affects how audit records are generated.
If you want to use the Active Data Guard physical standby database for read-only queries, then you must use pure unified auditing, not mixed mode. If mixed mode is used, then any query in the Active Data Guard physical standby that generates Oracle Database Vault audit records will be blocked. Oracle Database Vault cannot write to the traditional Database Vault audit table (DVSYS.AUDIT_TRAILS$
). Unified auditing will ensure that the Database Vault audit data is written into the operating system log files in an Oracle Active Data Guard physical standby database. You can move the data in these log files to the unified audit trail. Remember that to audit Database Vault activities, you must create unified audit policies, because the Database Vault traditional audit settings do not apply to unified auditing.
Parent topic: Integrating Oracle Database Vault with Oracle Data Guard
Registering Oracle Internet Directory Using Oracle Database Configuration Asssitant
You can use Oracle Internet Directory in an Oracle Database Vault-enabled database.
However, if you want to register Oracle Internet Directory (OID) using Oracle Database Configuration Assistant (DBCA), then you must first disable Oracle Database Vault.
Related Topics