Book Image

Oracle Goldengate 12c Implementers Guide

By : John P Jeffries
Book Image

Oracle Goldengate 12c Implementers Guide

By: John P Jeffries

Overview of this book

The book is aimed at Oracle database administrators, project managers, and solution architects who wish to extend their knowledge of GoldenGate. The reader is assumed to be familiar with Oracle databases. No knowledge of GoldenGate is required.
Table of Contents (16 chapters)
12
A. GGSCI Commands
13
B. GoldenGate Installed Components
14
C. Acronyms
15
Index

Security features


First available in the Oracle GoldenGate 11g Release 2, encryption is governed by one of the following four supported algorithms that use 64-, 128-, 192-, and 256-bit cypher keys:

  • AES128 uses the AES-128 cipher with a key size of 128 bits

  • AES192 uses the AES-192 cipher with a key size of 192 bits

  • AES256 uses the AES-256 cipher with a key size of 256 bits

  • Blowfish uses a symmetric 64-bit block size and a variable length key size from 32 bits to 128 bits

Advanced Encryption Security (AES) has been adopted as an industry standard and offers stronger encryption over the deprecated Blowfish algorithm that should no longer be used. However, it is still supported to maintain backward compatibility.

The AES cypher keys can be configured by two possible methods:

  • The wallet method

  • The ENCKEYS method

The wallet method

Oracle GoldenGate 12c supports the Oracle wallet method that can be used to centrally and securely store the database user logon credentials and encryption keys.

Note

The user...