[{"id":"ci_7594925d0795410ebe04f1a27fce0cbe9bcbfe8f6275a7b9cc7b1264e8289227","title":"Version Information and PDF Download","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/version-information-and-pdf-download","children":[]},{"id":"ci_8fa250f0da0532f439bc16925a3cf3b8fa4e9cad6a33cddb9da01bd8a68a18be","title":"Introduction","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/introduction","children":[{"id":"ci_3e8311ac821ceff7c214a7ae37646c8feecf9f37c00d2a7f5f64eb9362351557","title":"About This Guide","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/about-this-guide","children":[]},{"id":"ci_fd1bd15d96871b1c0bc27246380082bbee8521f4d8104bccdc97b2a92bf08037","title":"Target Audience","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/target-audience","children":[]},{"id":"ci_9b937d1fd2ee7bb64a99ce8ff238e8c6961f6d5d9bb004f706f391d6603bfed1","title":"Purpose of the Integration","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/purpose-of-the-integration","children":[]},{"id":"ci_3f5983ea0ef2106ac960df2a109b661ce67ce4de2d88629587cbc9270685588b","title":"Abbreviations","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/abbreviations","children":[]},{"id":"ci_313e08391ae8cca81f26bbce49855d720dc57eb5ae55abf4a84dee7603d8a58c","title":"Document Conventions","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/document-conventions","children":[]}]},{"id":"ci_b4204da9c75f4db6287176248d66266ccbdae0d6726e18a71c956c92c3bf17e3","title":"Product Overview","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/product-overview","children":[{"id":"ci_9ddf494b62d387832326134312797d11f2b42c3db78b55437a804089b8b581dd","title":"Overview of Oracle TDE","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/overview-of-oracle-tde","children":[]},{"id":"ci_c542b05a2c76eb688855aef4647226372007770fdebaa929ef60006704c39df8","title":"Overview of Utimaco CryptoServer HSM","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/overview-of-utimaco-cryptoserver-hsm","children":[]},{"id":"ci_cab858501c33779736dcc01e778d9a7107361d9bd9cfa532e6c13c383fa7360e","title":"Joint Value Proposition","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/joint-value-proposition","children":[]}]},{"id":"ci_b437bf28bf0cda76f18ff19d1feb70be1c882208f0b90155d1d305f1f2b4ce52","title":"Integration Requirements and Prerequisites","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/integration-requirements-and-prerequisites","children":[{"id":"ci_37e36ad633a5e9c67db93fab4f29c5a9a9440f46477fa27a1028effa814daf0c","title":"Tested Versions","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/tested-versions","children":[]},{"id":"ci_c5295bb02cb4687e92b50becb52ef7c3af985ca283bf6e53726c868dc5dbb55f","title":"Hardware and Software Requirements","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/hardware-and-software-requirements","children":[{"id":"ci_e481b56b3ed0771cfa4ad22be034566dfc5b04ba77e3f006f03b36b4900ef123","title":"Hardware Requirements","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/hardware-requirements","children":[]},{"id":"ci_9fd028486cdb5f98294d2d0085153e077b686308ca8dd0e104b9481516e1a73e","title":"Software Requirements","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/software-requirements","children":[]}]},{"id":"ci_7581ff2cf86204d8b043ac0bce17e9abd50c86e1e287ada61eb297bf6910e9dc","title":"Prerequisites","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/prerequisites","children":[]}]},{"id":"ci_3db2ec7c467ec222738d92578107511599336853d1c0fbb936c8c54cc861814e","title":"Installation and Configuration","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/installation-and-configuration","children":[{"id":"ci_34ee3a00b0bc572293ce9f515ca02f2b5f950cdad0d5bbacaa8cf15d64bc5a62","title":"Setting Up Utimaco SecurityServer Software","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/setting-up-utimaco-securityserver-software","children":[]},{"id":"ci_be9374f72527d66125d842bac9d9847cb94bc44df762fc5b44baf39354a21443","title":"Setting Up Oracle TDE","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/setting-up-oracle-tde","children":[]}]},{"id":"ci_834a724231a52255407386ff099ceabd1dcd7eeceddd8ab9dd96d7ae2655754b","title":"Integration Steps","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/integration-steps","children":[{"id":"ci_a568b41c6f67306a5d675a3df60b6ef99d4ff43faa513adca4d838bb770a6448","title":"Copying Utimaco PKCS#11 Library File","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/copying-utimaco-pkcs-11-library-file","children":[]},{"id":"ci_3a67b55a2fa697b4728f1dce90ffe065375cc857867826ded085030f0b918663","title":"Configuring Oracle DB to use Utimaco HSM","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/configuring-oracle-db-to-use-utimaco-hsm","children":[]},{"id":"ci_59d6f543f04d8dda89781d67b4f8af229639e5ad95969921119b548bff6eaf57","title":"Generating the Master Encryption Key (MEK) on to the HSM","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/generating-the-master-encryption-key-mek-on-to-the","children":[]}]},{"id":"ci_ca683f90c7733a050baab6c442b9a3fd3e0ea90bc6514a045ab7827f26cdd3db","title":"Verification and Testing","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/verification-and-testing","children":[{"id":"ci_f92ec08719941a22b9780ef3bddf67c4cca5b608afb4e9b0d287ea50e2a6a8ba","title":"Verifying Encrypted Columns in Tables","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/verifying-encrypted-columns-in-tables","children":[]},{"id":"ci_ccded73e9470c41a648584e7ff685a15d2d2566b521be547073c1265702dcb37","title":"Creating an Encrypted Tablespace","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/creating-an-encrypted-tablespace","children":[]},{"id":"ci_826ba3a7024e3d1cf97f54fdfd4776e6fcad92138897abb4a4204a1526718f6f","title":"Encrypting an Existing Tablespace with Online Conversion","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/encrypting-an-existing-tablespace-with-online-conv","children":[]},{"id":"ci_8444426e936c953c95fd316573d3dcbb870e4d4e5159083f6f70236e18ff3422","title":"Decrypting an Existing Tablespace with Online Conversion","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/decrypting-an-existing-tablespace-with-online-conv","children":[]},{"id":"ci_11868e4abc065420f57308dcba0cd3b27a682b780a9aa01112ff5804c813235f","title":"Rekeying an Existing Tablespace with Online Conversion","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/rekeying-an-existing-tablespace-with-online-conver","children":[]},{"id":"ci_3063517392477ababf6cfca14fe02126963417e833aa3b5508c09290afa197ed","title":"Encrypting an Existing Tablespace with Offline Conversion","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/encrypting-an-existing-tablespace-with-offline-con","children":[]},{"id":"ci_fe85f530b3c4c165323fa8dc3d83cb2a4dafcf26557371ff5d702e0b95af6107","title":"Decrypting an Existing Tablespace with Offline Conversion","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/decrypting-an-existing-tablespace-with-offline-con","children":[]},{"id":"ci_9774b02d3b0017e7544cc5cf0686c9d21f2a9f20e251e14a6f97c6b5e43681dd","title":"Migrating the Master Encryption Key from Software Keystore to the HSM Keystore","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/migrating-the-master-encryption-key-from-software-","children":[{"id":"ci_6568045e1fefcc87cdbb6056ef0bd12bf6c7af6cfd7503cb2fddd943b904338d","title":"Creating a Software Keystore","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/creating-a-software-keystore","children":[]},{"id":"ci_1d5412ea0c333c5355530b90f1b789542150f8eeabd2a1eea540d00c3f87938c","title":"Migrating the Software Keystore to the Utimaco HSM","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/migrating-the-software-keystore-to-the-utimaco-hsm","children":[]}]},{"id":"ci_b7a62ccaeec6d309708a19f37156a886ad6ad64ebf9bb16be3034b2c11b5bdb4","title":"Configuring TDE with Pluggable DB using HSM","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/configuring-tde-with-pluggable-db-using-hsm","children":[{"id":"ci_ca5540a94b23d62ff5dd4f96450d87f34fe9240043175998f6293c044e51a152","title":"About Containers in a CDB","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/about-containers-in-a-cdb","children":[]},{"id":"ci_581ef99313b8314a8d1ee28f30489b2fad55dcff0316e4d0982cd051c3dc52a1","title":"About PDBs","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/about-pdbs","children":[]},{"id":"ci_47bda33a345bbefa8b7622a5261f762ea12f79a938ecf6ae554da9658c7fc22b","title":"Configuring TDE with PDB using the HSM","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/configuring-tde-with-pdb-using-the-hsm","children":[]},{"id":"ci_719798a03633916ffffdf8dcc2f7fc44154541501060162a38dfe6e10bdb60c7","title":"Verifying the Master Encryption Key is Encrypting the PDB","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/verifying-the-master-encryption-key-is-encrypting-","children":[]}]},{"id":"ci_92d30cd8a8d86a5b3d2dbd181aa8597350f478ed0c86a9e2614110fd5d4cee44","title":"Logs and Validation Steps","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/logs-and-validation-steps","children":[{"id":"ci_99ab559e3971211ada795cc8bb0ac73993d5f8c4a031df925e6165160ea8d105","title":"PKCS#11 Logs","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/pkcs-11-logs","children":[]},{"id":"ci_1d9b88fb8dfda84aabff059483649f9f0c6d5106d829252d77d212fa92d38117","title":"Oracle Database Logs","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/oracle-database-logs","children":[]}]}]},{"id":"ci_4f683f54fb9dbe567c72fe20728281f2a5bc2144f42a9494b4df409e16842c5b","title":"Optional Features","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/optional-features","children":[{"id":"ci_d12c35d5966ce766da71c03e85d6a72393dc2aecd5ec92e5e4049a34be73e6ec","title":"Configuring Auto Login for the Hardware Keystore","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/configuring-auto-login-for-the-hardware-keystore","children":[]}]},{"id":"ci_9a1ed493084c349e8595a320f843abb534ad5742652b64a078d33ba164a557a5","title":"Troubleshooting","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/troubleshooting","children":[{"id":"ci_837e5e0ff5603466f1af449ad7d94f4abb4b0756002d2767b4e448bdffee4702","title":"Common Issues and How to Resolve Them","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/common-issues-and-how-to-resolve-them","children":[]},{"id":"ci_487de39f4d49919416176712ea0dc06ce72ed7ab2f4a8c2217ab04fed284c4ec","title":"Log Locations and Interpretation","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/log-locations-and-interpretation","children":[]}]},{"id":"ci_71881de639eebd2ff2b19cb0bdaaee574bc31bc921e5aedeb6f88acc03b27327","title":"Contact and Support Information","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/contact-and-support-information","children":[]},{"id":"ci_43a318f35c2e2849bc4109c5c8a42fa232d65b79ab8134b178cad32ffb402c7a","title":"Appendices","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/appendices","children":[{"id":"ci_d5427565e08279446985acad968d6912c66872281f7a162ead1c572cc8f6598e","title":"References (links to external docs)","path":"/oracle-tde-with-utimaco-securityserver/1.0.0/references-links-to-external-docs","children":[]}]}]