Permission
LINUX:
The following commands can be used to alter the permissions to allow apache read access to the fields:
$ chmod 640 $RUEI_DATA/ewallet.p12
$ chmod 640 $RUEI_DATA/cwallet.sso
The output of this command should now be:
$ ls -ltr $RUEI_DATA |grep wallet
-rw-r-----+ 1 moniforce moniforce 7688 Sep 16 09:16 ewallet.p12
-rw-r-----+ 1 moniforce moniforce 7716 Sep 16 09:16 cwallet.sso
Windows:
set folder and file OWNER
GOALPassword credentials for connecting to databases can now be stored in a client-side Oracle wallet, a secure software container used to store authentication and signing credentials. This wallet usage can simplify large-scale deployments that rely on password credentials for connecting to databases. When this feature is configured, application code, batch jobs, and scripts no longer need embedded user names and passwords. Risk is reduced because such passwords are no longer exposed in the clear, and password management policies are more easily enforced without changing application code whenever user names or passwords change. The feature Secure External Password Store can be used without any restriction in all product editions, you do not require a license for the Advanced Security Option (ASO). SOLUTIONWhen clients are configured to use the secure external password store, applications can connect to a database with the following connect /@db_connect_string where db_connect_string is a valid connect string to access the intended database. In this case, the database credentials, username and password, are securely stored in an Oracle wallet created for this purpose. The autologin feature of this wallet is turned on so the system does not need a password to open the wallet. From the wallet, it gets the credentials to access the database for the user they represent. Configuring Clients to Use the External Password Store 1) Create a wallet on the client by using the following syntax at the command line: mkstore -wrl 2) Create database connection credentials in the wallet by using the following syntax at the command line: mkstore -wrl example: ("N102" in the following example is a connect descriptor located in the tnsnames.ora.) mkstore -wrl /home/mseibt/pstore -createCredential N102 Enclose usernames and passwords that have special characters in single quotes. 3) In the client sqlnet.ora file, enter the WALLET_LOCATION parameter and set it to the directory location of the wallet you created in Step 1. WALLET_LOCATION = 4) In the client SQLNET.WALLET_OVERRIDE = TRUE This setting causes all When external authentication is in use, an authenticated user with such a wallet can use the CONNECT /@db_connect_string syntax to access the previously specified databases without providing a user name and password. However, if a user fails that external authentication, then these connect statements will also fail. If an application uses SSL for encryption, then the sqlnet.ora parameter, SQLNET.AUTHENTICATION_SERVICES, specifies SSL and an SSL wallet is created. If this application wants to use secret store credentials to authenticate to databases (instead of the SSL certificate), then those credentials must be stored in the SSL wallet. After SSL authentication, if SQLNET.WALLET_OVERRIDE = TRUE, then the user names and passwords from the wallet are used to authenticate. If SQLNET.WALLET_OVERRIDE = FALSE the SSL certificate is used. Configured sqlnet.ora. WALLET_LOCATION = 5) With the external password store configured, connect as sqlplus /@N102 Managing External Password Store Credentials 1) Listing the contents of the external password store: mkstore -wrl /home/mseibt/pstore -listCredential 2) Adding database login credentials to an existing client wallet: mkstore -wrl /home/mseibt/pstore -createCredential N101 3) Modifying database login credentials in a wallet: mkstore -wrl /home/mseibt/pstore -modifyCredential N102 4) Deleting database login credentials from a wallet: mkstore -wrl /home/mseibt/pstore -deleteCredential N101 5) Listing wallet entries: mkstore -wrl /home/mseibt/pstore -list 6) Listing entry values: mkstore -wrl /home/mseibt/pstore -viewEntry oracle.security.client.connect_string1 7) Modifying entry values: mkstore -wrl /home/mseibt/pstore -modifyEntry oracle.security.client.password1 newpass |