Register or Deregister a Database with Data Safe
To use Oracle Data Safe, you register your database with Oracle Data Safe. To discontinue using it, you deregister your database.
Before You Begin
Tip:
For a "try it out" alternative that demonstrates using Data Safe with Autonomous Database, run the labs 2 to 13 in Oracle Autonomous Database Dedicated for Security Administrators Workshop.Before you can register your database with Data Safe, Data Safe must be configured to access databases in your dedicated infrastructure configuration, as described in Create an Oracle Data Safe Private Endpoint. Usually this one-time configuration is performed by the fleet administrator of the dedicated infrastructure configuration in coordination with the network administrator of the tenancy.
If Database Vault is enabled on the database you are registering or deregistering, you need to perform special steps to accommodate the additional database security provided by Database Vault:
-
To register or deregister, the Database Vault Account Manager must first grant specific access rights to the
ADMIN
database user, as described in Register an Autonomous Database on Dedicated Exadata Infrastructure. After the registration or deregistration operation completes, the Database Vault Account Manager can revoke these rights and so restore the Database Vault configuration to its previous state. -
After registering, the Database Vault Owner must grant specific access rights to the
DS$ADMIN
database user, as described in Grant Roles to the Oracle Data Safe Service Account on Your Autonomous Database.
Procedure
-
Go to the Details page of the Autonomous Database you want to register or deregister with Oracle Data Safe.
For instructions, see View Details of a Dedicated Autonomous Database.
-
On the Details page, under Data Safe, click register or deregister depending on the status of the database.
A confirmation dialog box is displayed.
-
Enter the password of the
ADMIN
database user and then click Confirm to start the registration or deregistration operation.You can track completion of the operation using its work request, as described in Use Work Requests to Monitor Long-Running Operations.
Parent topic: Secure Autonomous Database