Basic configuration
- Connect to Oracle Database using a client program such as SQL*Plus or SQL Developer.
- Start the "Oracle Listener" service. Verify that it accepts TCP connections.
- Create an empty database instance. This database instance will be used by Deep Security Manager.
- Create a database account that will be used by Deep Security Manager to connect to the database. When creating the account, follow these guidelines:
- Assign the CONNECT and RESOURCE roles and UNLIMITED TABLESPACE, CREATE SEQUENCE, CREATE TABLE and CREATE TRIGGER permissions.
- Don't use special characters in Deep Security Manager's database user name. Although Oracle allows special characters when configuring the database user object if they are surrounded by quotes, Deep Security does not support special characters for the database user.
Oracle RAC configuration
If you're using Oracle RAC, disable the Firewall module or customize the Firewall settings according to the instructions in Firewall settings with Oracle RAC.
Multi-tenancy configuration
If Deep Security Manager will have multiple tenants:
- Keep the main database name short. It will be easier to read your tenants' database names. (For example, if the main database is "MAINDB", the first tenant's database name will be "MAINDB_1", the second tenant's database name will be "MAINDB_2", and so on.)
- Also grant CREATE USER, DROP USER, ALTER USER, GRANT ANY PRIVILEGE and GRANT ANY ROLE to the Deep Security Manager's database user.
- Don't use the Oracle container database (CDB) configuration. It is not supported with Deep Security Manager multi-tenancy.