This topic provides information about creating external database
connections using the OCI Console and API. The external database connection resource enables
you to connect an external database handle to an Oracle Database instance located outside of
OCI.
Note
Currently the External Database service
supports only Management Agent Cloud Service (MACS) agents for creating a connection to
your external databases. Enterprise Manager Cloud Control Agents are not supported at
this time. For more information about MACS, see Management Agent.
Required IAM Policy
To use Oracle Cloud Infrastructure, you must be granted security access
in a policy by an administrator. This access is required whether you're using
the Console or the REST API with an SDK, CLI, or other tool. If you get a message
that you don't have permission or are unauthorized, verify with your administrator
what type of access you have and which compartment to work in.
Create a Connection to an External Pluggable Database 🔗
Perform the following steps to create a connection to an external pluggable database.
Open the navigation menu. Select Oracle
Database, and then select External Database.
Under External Database, select Pluggable
Databases.
Select your Compartment. A list of external
databases is displayed.
In the list of external databases,
click the name of the database for which you want to create the connection. Details of the external database
you selected are displayed.
Under Resources, Click Connectors.
Click Connect to external pluggable database. The Connect to an external pluggable database dialog opens.
Connector display name: Provide a
user-friendly name to help you easily identify the resource.
Connector type: Provide a
connector type for the external database. You can select from the
following:
External site: Create an Oracle
Cloud Bridge connection within an OCI VCN to access an external database located
in a Cloud Bridge external site. This option is compatible with the Database
Management and Data Safe services.
MACS: Create an OCI Management Agent Cloud
Service (MACS) connector to access your external database. You must configure
the agent prior to connecting your external database. Select this option if you
are using TCPS.
External site ID: Provide an
external site ID. This is required only if you select external site.
Connector agent ID: Provide a
connector agent ID. This is required only if you select MACS.
Specify Connection string
information for the connection.
DNS hostname or SCAN name: Provide virtual IP
(VIP) address or single client access name (SCAN) for the database on your
premises that you are connecting to the OCI.
Port: Provide the port being used by the
database outside OCI for database connections.
Service: Provide the service name being
used by the database outside OCI for database connections.
Protocol: Provide the protocol
being used by the database outside OCI for database connections. You can select
from either TCP or TCPS.
Note
TCPS is TCP/IP with SSL. This protocol enables
an Oracle application on a client to communicate with remote databases through
TCP/IP and SSL. Using SSL provides higher security than TCP alone. For more
information, see TCP/IP with SSL Protocol
in Database Net Services Administrator's Guide.
If you have selected TCPS
protocol, select between the following options:
Use existing secret
Create a new secret
When you select Use existing
secret, provide the following detail:
Provide a Database user password secret in your
compartment.
When you click Create a new
secret, the Create TLS Secret windows opens. Provide the
following details, and then click Create TLS secret.
Secret name: Name for the secret you are
creating.
Description: [Optional] Description for the
secret.
Choose a compartment: The compartment where the
secret must be stored.
Vault in your compartment: Vault in your compartment
where the secret is stored.
Encryption key in your compartment: Encryption key in
your compartment where the secret must be stored.
SSL Trust Store Type: Type
of the SSL trust store. Available options are PKCS12 and
JKS. BCFKS is the only available option in US
government regions.
SSL Trust Store
Location: Fully qualified path of the SSL trust store on the
agent host.
SSL Trust Store
Password: Password of the SSL trust store.
SSL Key Store Type:
[Read-only] Type of the key store. It is automatically chosen to be the
same as the SSL trust store type.
SSL Key Store Location:
Fully qualified path of the key store on the agent host.
SSL Key Store Password:
Password of the key store.
SSL Server Certificate
Distinguished Name: Unique name for the SSL server
certificate.
The JSON format for creating a new secret is as
follows:
Specify Database connection
credentials for the connection.
Username: Provide the user name for the
database credentials to be used by this connection.
Password: Provide the pasword for the
database credentials to be used by this connection.
Credential name prefix: This
string is the first part of the full credential name. Your prefix is prepended
to a system-generated Credential name prefix to create the full credential
name.
Credential name: (Read-only)
Credential name of the connection.
Role: Provide the role for the database
credentials to be used by this connection. You can select between NORMAL and
SYSDBA.
Specify Network information for the
connection.
Virtual cloud network: The VCN in which to
create the connection. Click Change compartment to select a VCN in a
different compartment.
Subnet: The subnet in which to create the
connection.
Network security groups: Optionally, you can
specify one or more network security groups (NSGs) for your database. To use
NSGs, switch on Use network security groups to control traffic toggle.
NSGs function as virtual firewalls, enabling you to apply a set of ingress and
egress security rules. A maximum of five NSGs can be specified. Note that you
must have a virtual cloud network selected to be able to assign NSGs.
Private IP address for VNIC: The IP
address for the connection.
Tags: If you have permissions to create a
resource, then you also have permissions to apply free-form tags to that
resource. To apply a defined tag, you must have permissions to use the tag
namespace. If you are not sure whether to apply tags, skip this option (you can
apply tags later) or ask your administrator. For more information, see Resource Tags.
Click Connect.
Create a Connection to an External Container Database 🔗
Perform the following steps to create a connection to an external container database.
Open the navigation menu. Select Oracle
Database, and then select External Database.
Under External Database, select
Container Databases.
Select your Compartment. A list of external
databases is displayed.
In the list of external databases,
click the name of the database for which you want to create the connection. Details of the external database
you selected are displayed.
Click Connect to external container database. The Connect to an external container database dialog opens.
Connector display name: Provide a
user-friendly name to help you easily identify the resource.
Connector type: Provide a
connector type for the external database. You can select from the
following:
External site: Create an Oracle
Cloud Bridge connection within an OCI VCN to access an external database located
in a Cloud Bridge external site. This option is compatible with the Database
Management and Data Safe services.
MACS: Create an OCI Management Agent Cloud
Service (MACS) connector to access your external database. You must configure
the agent prior to connecting your external database. Select this option if you
are using TCPS.
External site ID: Provide an
external site ID. This is required only if you select external site.
Connector agent ID: Provide a
connector agent ID. This is required only if you select MACS.
Specify Connection string
information for the connection.
DNS hostname or SCAN name: Provide virtual IP
(VIP) address or single client access name (SCAN) for the database on your
premises that you are connecting to the OCI.
Port: Provide the port being used by the
database outside OCI for database connections.
Service: Provide the service name being
used by the database outside OCI for database connections.
Protocol: Provide the protocol
being used by the database outside OCI for database connections. You can select
from either TCP or TCPS.
Note
TCPS is TCP/IP with SSL. This protocol enables
an Oracle application on a client to communicate with remote databases through
TCP/IP and SSL. Using SSL provides higher security than TCP alone. For more
information, see TCP/IP with SSL Protocol
in Database Net Services Administrator's Guide.
If you have selected TCPS
protocol, select between the following options:
Use existing secret
Create a new secret
When you select Use existing
secret, provide the following detail:
Provide a Database user password secret in your
compartment.
When you click Create a new
secret, the Create TLS Secret windows opens. Provide the
following details, and then click Create TLS secret.
Secret name: Name for the secret you are
creating.
Description: [Optional] Description for the
secret.
Choose a compartment: The compartment where the
secret must be stored.
Vault in your compartment: Vault in your compartment
where the secret is stored.
Encryption key in your compartment: Encryption key in
your compartment where the secret must be stored.
SSL Trust Store Type: Type
of the SSL trust store. Available options are PKCS12 and
JKS. BCFKS is the only available option in US
government regions.
SSL Trust Store
Location: Fully qualified path of the SSL trust store on the
agent host.
SSL Trust Store
Password: Password of the SSL trust store.
SSL Key Store Type:
[Read-only] Type of the key store. It is automatically chosen to be the
same as the SSL trust store type.
SSL Key Store Location:
Fully qualified path of the key store on the agent host.
SSL Key Store Password:
Password of the key store.
SSL Server Certificate
Distinguished Name: Unique name for the SSL server
certificate.
The JSON format for creating a new secret is as
follows:
Specify Database connection
credentials for the connection.
Username: Provide the user name for the
database credentials to be used by this connection.
Password: Provide the pasword for the
database credentials to be used by this connection.
Credential name prefix: This
string is the first part of the full credential name. Your prefix is prepended
to a system-generated Credential name prefix to create the full credential
name.
Credential name: (Read-only)
Credential name of the connection.
Role: Provide the role for the database
credentials to be used by this connection. You can select between NORMAL and
SYSDBA.
Specify Network information for the
connection.
Virtual cloud network: The VCN in which to
create the connection. Click Change compartment to select a VCN in a
different compartment.
Subnet: The subnet in which to create the
connection.
Network security groups: Optionally, you can
specify one or more network security groups (NSGs) for your database. To use
NSGs, switch on Use network security groups to control traffic toggle.
NSGs function as virtual firewalls, enabling you to apply a set of ingress and
egress security rules. A maximum of five NSGs can be specified. Note that you
must have a virtual cloud network selected to be able to assign NSGs.
Private IP address for VNIC: The IP
address for the connection.
Tags: If you have permissions to create a
resource, then you also have permissions to apply free-form tags to that
resource. To apply a defined tag, you must have permissions to use the tag
namespace. If you are not sure whether to apply tags, skip this option (you can
apply tags later) or ask your administrator. For more information, see Resource Tags.
Click Connect.
Create a Connection to an External Non-Container Database 🔗
Perform the following steps to create a connection to an external non-container database.
Open the navigation menu. Select Oracle
Database, and then select External Database.
Under External Database, select
Non-Container Databases.
Select your Compartment. A list of external
databases is displayed.
In the list of external databases,
click the name of the database for which you want to create the connection. Details of the external database
you selected are displayed.
Click Connect to external non-CDB. The Connect to an external non-container database dialog opens.
Connector display name: Provide a
user-friendly name to help you easily identify the resource.
Connector type: Provide a
connector type for the external database. You can select from the
following:
External site: Create an Oracle
Cloud Bridge connection within an OCI VCN to access an external database located
in a Cloud Bridge external site. This option is compatible with the Database
Management and Data Safe services.
MACS: Create an OCI Management Agent Cloud
Service (MACS) connector to access your external database. You must configure
the agent prior to connecting your external database. Select this option if you
are using TCPS.
External site ID: Provide an
external site ID. This is required only if you select external site.
Connector agent ID: Provide a
connector agent ID. This is required only if you select MACS.
Specify Connection string
information for the connection.
DNS hostname or SCAN name: Provide virtual IP
(VIP) address or single client access name (SCAN) for the database on your
premises that you are connecting to the OCI.
Port: Provide the port being used by the
database outside OCI for database connections.
Service: Provide the service name being
used by the database outside OCI for database connections.
Protocol: Provide the protocol
being used by the database outside OCI for database connections. You can select
from either TCP or TCPS.
Note
TCPS is TCP/IP with SSL. This protocol enables
an Oracle application on a client to communicate with remote databases through
TCP/IP and SSL. Using SSL provides higher security than TCP alone. For more
information, see TCP/IP with SSL Protocol
in Database Net Services Administrator's Guide.
If you have selected TCPS
protocol, select between the following options:
Use existing secret
Create a new secret
When you select Use existing
secret, provide the following detail:
Provide a Database user password secret in your
compartment.
When you click Create a new
secret, the Create TLS Secret windows opens. Provide the
following details, and then click Create TLS secret.
Secret name: Name for the secret you are
creating.
Description: [Optional] Description for the
secret.
Choose a compartment: The compartment where the
secret must be stored.
Vault in your compartment: Vault in your compartment
where the secret is stored.
Encryption key in your compartment: Encryption key in
your compartment where the secret must be stored.
SSL Trust Store Type: Type
of the SSL trust store. Available options are PKCS12 and
JKS. BCFKS is the only available option in US
government regions.
SSL Trust Store
Location: Fully qualified path of the SSL trust store on the
agent host.
SSL Trust Store
Password: Password of the SSL trust store.
SSL Key Store Type:
[Read-only] Type of the key store. It is automatically chosen to be the
same as the SSL trust store type.
SSL Key Store Location:
Fully qualified path of the key store on the agent host.
SSL Key Store Password:
Password of the key store.
SSL Server Certificate
Distinguished Name: Unique name for the SSL server
certificate.
The JSON format for creating a new secret is as
follows:
Specify Database connection
credentials for the connection.
Username: Provide the user name for the
database credentials to be used by this connection.
Password: Provide the pasword for the
database credentials to be used by this connection.
Credential name prefix: This
string is the first part of the full credential name. Your prefix is prepended
to a system-generated Credential name prefix to create the full credential
name.
Credential name: (Read-only)
Credential name of the connection.
Role: Provide the role for the database
credentials to be used by this connection. You can select between NORMAL and
SYSDBA.
Specify Network information for the
connection.
Virtual cloud network: The VCN in which to
create the connection. Click Change compartment to select a VCN in a
different compartment.
Subnet: The subnet in which to create the
connection.
Network security groups: Optionally, you can
specify one or more network security groups (NSGs) for your database. To use
NSGs, switch on Use network security groups to control traffic toggle.
NSGs function as virtual firewalls, enabling you to apply a set of ingress and
egress security rules. A maximum of five NSGs can be specified. Note that you
must have a virtual cloud network selected to be able to assign NSGs.
Private IP address for VNIC: The IP
address for the connection.
Tags: If you have permissions to create a
resource, then you also have permissions to apply free-form tags to that
resource. To apply a defined tag, you must have permissions to use the tag
namespace. If you are not sure whether to apply tags, skip this option (you can
apply tags later) or ask your administrator. For more information, see Resource Tags.