Database Administrator III 1. If the $ORACLE_BASE is set, this is $ORACLE_BASE/admin/DB_UNIQUE_NAME/wallet, otherwise it is $ORACLE_HOME/admin/DB_UNIQUE_NAME/wallet, where DB_UNIQUE_NAME comes from the initialization parameter file.Although encrypted tablespaces can share the default database wallet, Oracle recommends you use a separate wallet for transparent data encryption functionality by specifying the ENCRYPTION_WALLET_LOCATION parameter in the sqlnet.ora file. -rw-r. Redo Buffers 7872512 bytes All network connections between Key Vault and database servers are encrypted and mutually authenticated using SSL/TLS. Lets see how to configure TDE. wallet_root string /u02/app/oracle/admin/oradbwr/ TDE is fully integrated with Oracle database. All rights reserved. Connected to: I have extensive experience in data related teams, giving me a variety of skills and the ability to work . mkdir "${ORACLE_BASE}/admin/${DB_UNIQUE_NAME}/wallet/tde". In this setup, the master key is stored directly in the third-party device rather than in the included Oracle Wallet. Save my name, email, and website in this browser for the next time I comment. Considerations for Converting Single-Instance Databases to Oracle RAC 3-22 Scenario 1: Using DBCA 3-23 Step 1: Create an Image of the Single-Instance Database 3-24 Example: Result of Step 1 3-25 Step 2: Create an Oracle Cluster for RAC 3-26 Example: Result of Step 2 3-27 Step 3: Copy the Preconfigured Database Image 3-28 Wallets provide an easy solution for small numbers of encrypted databases. In this blog post we are going to have a step by step instruction to Enable Transparent Data Encryption (TDE). -rw-r. Your email address will not be published. Below steps can be used for Oracle 11g,12c , 18c, 19c Databases Step 1: Take a Backup of [] 3DES is the abbreviation for Triple Data Encryption Standard. After the data is encrypted, this data is transparently decrypted for authorized users or applications when they access this data. . Oracle Usage. (6) Now we are all set to encrypt the table column, I hope you like this post on how to do TDE encryption in Oracle 12c step by step, How To Restore TDE Wallet Files From Backup in Oracle Databasehow to check if oracle database is encryptedTDE encryption in oracle 11g step by step, Your email address will not be published. (SOURCE= MySQL Enterprise TDE uses a two-tier encryption key architecture, consisting of a master encryption key and tablespace keys providing easy key management and rotation. Total System Global Area 2936008960 bytes As my mentor mentions it RAC with TDE enabled is like a monkey with grenade. From the query above you can check that it is still not autologin. (b)Generate the Master key using a two-step process. perfect doc for TDE enable on RAC PDB/CDB database, Your email address will not be published. With the release Oracle 18c later 19c this functionality was added again step by step. Some application vendors do a deeper integration and provide TDE configuration steps using their own toolkits. [oracle@Prod22 ~]$ sqlplus / as sysdba To view the purposes they believe they have legitimate interest for, or to object to this data processing use the vendor list link below. Step 2. Take file backup of wallet files ewallet.p12 and cwallet.sso in standby DB. In Oracle Autonomous Databases and Database Cloud Services it is included, configured, and enabled by default. To prevent unauthorized decryption, TDE stores the encryption keys in a security module external to the database, called a keystore. Transparent Data Encryption (TDE) encrypts database files to secure your data. One of the updates in Oracle Database 19c affects the online encryption functionality. Disconnected from Oracle Database 19c Enterprise Edition Release 19.0.0.0.0 Production Please note that, I know you could have considered putting wallet in ASM, a shared space for it, but I think wallet in ASM is pretty hard to mange and migrate to another place, e.g. Multiple synchronization points along the way capture updates to data from queries that executed during the process. TDE is transparent to business applications and does not require application changes. 4. [oracle@Prod22 tde]$ pwd Gather information again to see if the Tablespace is encrypted now. NAME TYPE VALUE ERROR: Unable to verify the graphical display setup. Turn off the transport and apply (if standby exists). Database Buffers 2466250752 bytes You can use any existing tablespace also. TDE tablespace encryption doesn't require changes to the application, is transparent to the end users, and provides automated, built-in key management. Setting up TDE (Transparent Data Encryption) in 19c is very easy and these are the steps needed. SQL> create table test (snb number, real_exch varchar2(20)); Encryption anddecryption occur at the database storage level, with no impact to the SQL interface that applications use(neither inbound SQL statements, nor outbound SQL query results). Steps to Create a Physical Standby Databa se 3 -3 Preparing the Primary Database 3 -4 FORCE LOGGING Mode 3 -5 Version 19.11.0.0.0 TDE can encrypt entire application tablespaces or specific sensitive columns. We and our partners use data for Personalised ads and content, ad and content measurement, audience insights and product development. This parameter has been deprecated. Oracle offers a comprehensive and fully integrated stack of cloud applications and platform services. NAME TYPE VALUE Also, see here for up-to-date summary information regarding Oracle Database certifications and validations. Database downtime is limited to the time it takes to perform Data Guard switch over. In addition to using SQL commands, you can manage TDE master keys using Oracle Enterprise Manager 12c or 13c. total 8 An example of data being processed may be a unique identifier stored in a cookie. See here for the librarys FIPS 140 certificate (search for the text Crypto-C Micro Edition; TDE uses version 4.1.2). If a wallet already exists skip this step. Encrypting confidential assets. Auto-login keystore is enabling and working, we should additionally check the encrypted data. Oracle GoldenGate 19c: How to configure EXTRACT / REPLICAT. Oracle 11.2. If you would like to change your settings or withdraw consent at any time, the link to do so is in our privacy policy accessible from our home page.. Copy the backup file and the private key file to the server where you are going to restore the Transparent data encryption (TDE) enabled database backup. If you dont specify an encryption_password, then the data is exported unencrypted (you may get a warning about this, but it will keep going). If you specify an encryption_password for expdp, then the data is now encrypted using this new password. SQL> alter system set WALLET_ROOT=" " scope=spfile sid='*'; --- Shared Location . We should exclude any external factors before comparing both data files by stopping the database. A new parameter called skip_tde_key_import is introduced. Copy the wallet to all standby nodes as well as any DR nodes. It stops unauthorized attempts from the operating system to access database data stored in files, without impacting how applications access the data using SQL. Login as the system user. ORACLE instance started. The TDE option is a permanent option that cant be removed from an option group. Similarly, when a TDE master encryption key rekey operation takes place, the new key becomes available to each of the Oracle RAC instances. You can use TDE column-encryption functionality to encrypt selected columns of tables. Restart the database and try to access the table which we created in step 7. Create Keystores. Make sure the wallet is open and has autologin enabled on both nodes (on primary and standby) and has the same master keys on both sides. TDE is part of the Oracle Advanced Security, which also includes Data Redaction. 1 oracle oinstall 209715712 Jun 21 19:12 redo03.log Create a wallet/keystore location. There are no limitations for TDE tablespace encryption. Tablespace altered. When a table contains encrypted columns, TDE uses a single TDE table key regardless of the number of encrypted columns. product page on Oracle Technology Network, White Paper: Encryption and Redaction with Oracle Advanced Security, FAQ: Oracle Advanced Security Transparent Data Encryption (TDE), FAQ: Oracle Advanced Security Data Redaction, White Paper: Converting to TDE with Data Guard (12c) using Fast Offline Conversion, Configuring Data Redaction for a Sample Call Center Application. [oracle@Prod22 ORADBWR]$ ls -lrt Transparent data encryption helps us to protect our data from being stolen. Steps to configure Transparent Data Encryption in Oracle Configure the Software Keystore Location. Learn about Rackspace Managed Oracle Applications. Keystore can be closed even SYSTEM, SYAUX and UNDO is encrypted. For single-instance databases, the steps are almost the same, just skipping step D to continue. As you can see in the wallet_type column value is unknown, which means the wallet is not configured yet. TDE is fully integrated with the Oracle database. My requirement is column level encryption and followed all the steps as you have shown in Oracle 19C. Keystore operations (such as opening or closing the keystore, or rekeying the TDE master encryption key) can be issued on any one Oracle RAC instance. GSMB, If you have a standby for this primary database, turn off the redo log transport and apply, Shutdown the application that is using this database. if(typeof ez_ad_units!='undefined'){ez_ad_units.push([[300,250],'techgoeasy_com-leader-1','ezslot_1',195,'0','0'])};__ez_fad_position('div-gpt-ad-techgoeasy_com-leader-1-0');Lets create a directory. Oracle provides additional data at rest encryption technologies that can be paired with TDE to protect unstructured file data, storage files of non-Oracle databases, and more as shown in the table below. From the above paths,we have 12.1.0.2 version which can be directly upgraded to 19c. Wallet configuration in SQLNET.ORA therefore no longer needed. Oracle Transparent Data Encryption (TDE) enables the organizations to encrypt sensitive application data on storage media completely transparent to the application. Start Tablespace encryption a) run the following command on VNC as terminal no.1 b) run the following command on VNC as . wallet, Step 2: Create the password protected key store. If we are doing a clone using cold backup or using RMAN backup, we have to make sure that the wallet is copied from the source env to the target and that parameters are configured properly on the target env. Oracle Transparent Data Encryption is used in . 1 oracle oinstall 52436992 Jun 21 21:29 tde_tbs1_encrypted.dbf Oracle E-Business Suite Technology Stack - Version 12.2 and later: 19c DBUA TDE-Encrypted Database Upgrade Fails During Timezone Step with ORA-600 [kcbtse_encdec_tb 19c DBUA TDE-Encrypted Database Upgrade Fails During Timezone Step with ORA-600 [kcbtse_encdec_tbsblk_11] in alert.log If the malicious user tries to open the file using a HEX editor (like UltraEdit), then only non-printable characters will be present. 1. Database Cloud Service (DBCS) integrates with the OCI Vault service. Steps by Step Transparent Data Encryption (TDE) column-level encryption in Oracle E-Business Suite (EBS) R12 environment. Auto-Login Keystore enables us to open and close password-protected keystore automatically whenever we need. if(typeof ez_ad_units!='undefined'){ez_ad_units.push([[300,250],'techgoeasy_com-medrectangle-4','ezslot_5',109,'0','0'])};__ez_fad_position('div-gpt-ad-techgoeasy_com-medrectangle-4-0');We can Close using the below command, (4) Now, before enabling encryption, we need to activate the master key. Database closed. is there something I missing to understand? Set the master encryption key by executing the following command: Hi, I am working in IT industry with having more than 10 year of experience, worked as an Oracle DBA with a Company and handling different databases like Oracle, SQL Server , DB2 etc The environment is single instance database. Database mounted. On the other side, we got nothing from the encrypted data file. Required fields are marked *. how to extract plain text from a normal, non-encrypted data file, more ways to copy ASM files from one place to another, or vice versa, the plain text in the normal data file is shown, How to Install Oracle Database 19.18 on Linux, How to Install Oracle Database 19c on Linux, How to Install Oracle Instant Client 19c on Linux, How to Resolve ORA-01720: grant option does not exist. File created. And the team is still working hard on a solution to make the non-CDB to PDB plugin flawless and automated for such cases. We suggest you try the following to help find what youre looking for: TDE transparently encrypts data at rest in Oracle Databases. Oracle Database Articles & Cloud Tutorials. 1 oracle oinstall 2555 Jun 21 19:12 ewallet_2021062113423541_TDE_backup.p12 SQL*Plus: Release 19.0.0.0.0 Production on Mon Jun 21 19:30:53 2021 This approach works for both 11g and 12c databases. Minimum Qualifications. Bachelor's degree from an accredited four-year college or university, with major coursework in Computer Science, Management Information Systems or a related field. TDE tablespace encryption does not encrypt data that is stored outside of the tablespace. For more information about Oracle (NYSE:ORCL), visit oracle.com. STEP 2: Configure the Keystore Location and Type, STEP 5: Configure Auto Login Keystore and check the status, STEP 7: Set the Keystore TDE Encryption Master Key. Dec. 9 - Oracle Database 19c SIG December Meeting - Oracle . NOTE - Don't implement this on production database. Thats because of historic bugs related with RAC having TDE enabled. Create or obtain a certificate protected by the master key 3. Oracle provides solutions to encrypt sensitive data in the application tier although this has implications for databases that you must consider in advance (see details here). Check on which tablespaces that schema has objects, To encrypt a tablespace just use this command, If you just want to encrypt a table column then you should use this command. This is a fully online operation. This means that most restrictions that apply to TDE column encryption, such as data type restrictions and index type restrictions, do not apply to TDE tablespace encryption. For comparing normal data and encrypted data, we prepare a control test. 1 oracle oinstall 356524032 Jun 21 21:26 undotbs01.dbf TDE helps protect data stored on media (also called data at rest) in the event that the storage media or data file is stolen. As you noticed, string A123456789 has been inserted into both tables for doing some comparison later. TDE tablespace encryption encrypts all of the data stored in an encrypted tablespace and the corresponding redo data. Thanks for posting this . (LogOut/ ENCRYPT_NEW_TABLESPACES parameter specifies whether the new tablespaces to be created should be implicitly encrypted. Your email address will not be published. Solutions are available for both online and offline migration. The actual performance impact on applications can vary. TDE tablespace encryption leverages Oracle Exadata to further boost performance. Typically, wallet directory is located in $ORACLE_BASE/admin/db_unique_name/wallet. Create a master key 2. We should make sure the environment before doing it. clprod.env, Total System Global Area 16106127360 bytes. administer key management set keystore open identified by oracledbwr; SQL> administer key management set key using tag oracledbwr_Tablespace_TDE force keystore identified by oracledbwr with backup using TDE_backup; -rw-r. 1 oracle oinstall 1038098432 Jun 21 21:21 system01.dbf Transparent Data Encryption (TDE) column encryption protects confidential data, such as credit card and Social Security numbers, that is stored in table columns.. TDE column encryption uses the two-tiered key-based architecture to transparently encrypt and decrypt sensitive table columns. TDE provides multiple techniques to migrate existing clear data to encrypted tablespaces or columns. In this post, I will discuss about enabling Transparent Data Encryption TDE in Oracle 19c. Edit the $ORACLE_HOME/network/admin/sqlnet.ora files, adding the following entry. Existing tablespaces can be encrypted online with zero downtime on production systems or encrypted offline with no storage overhead during a maintenance period. (LogOut/ TDE tablespace encryption has better, more consistent performance characteristics in most cases. keystore altered. It is available as an additional licensed option for the Oracle Database Enterprise Edition. We should copy the entire wallet to node 2 for enabling to use TDE. However, you can move the wallet into ASM later if you have changed your mind. Update/edit the encrypt_prod_tspaces2.sql and run it to start the encryption for other tablespaces. Step 9. TDE wallet should also be backed up once weekly along with Full File system backup. This feature automatically encrypts data before it is written to storage and automatically decrypts data when the data is read from storage. Before we can set the TDE master key in the keystore, we should open it. You can set the ENCRYPT_NEW_TABLESPACES database initialization parameter to automatically encrypt future tablespaces that you create. standby or testing database. Suppose you want to encrypt all the tablespaces of a schema. Lets take the steps for both CDB and non-CDB. For the tablespaces created before this setup, you can do an online encryption. If the target CDB didn't have TDE, you should configure and enable the wallet for the database. GSMB, From 19c onwords no need go for Offline Encryption.This method creates a new datafile with encrypted data. Configure the Software Keystore Location: In previous releases, the SQLNET.ENCRYPTION_WALLET_LOCATION parameter was used to define the Keystore directory location. Be extra cautious when enabling TDE in RAC. My requirement is column level encryption and followed all the steps as you have shown in Oracle 19C. Oracle Support/Development team will not help in resolving any issues arising due to such operations. So, instead of sqlnet, we are going to use the new parameters WALLET_ROOT and TDE CONFIGURATION. What is TDE (Transparent Data Encryption), How To Restore TDE Wallet Files From Backup in Oracle Database, how to check if oracle database is encrypted, TDE encryption in oracle 11g step by step, How to check encrypted tablespace in the Database, How To Export -Import TDE Master Encryption Key. TDE_CONFIGURATION can be set dynamically. This TDE master encryption key is used to encrypt the TDE tablespace encryption key, which in turn is used to encrypt and decrypt data in the tablespace. Ideally wallet directory should be empty. 3DES168: Sets the key length to 168 bits. We should restart the database to take WALLET_ROOT effect. It's a dynamic parameter, no need to restart the database. tde_configuration string, SQL> show parameter wallet_root 2. Tablespace keys are managed automatically over secure protocols while the master encryption key is stored in a centralized key management solution such as: Now either we can enable with CONTAINER=ALL then it will be generated for all the PDB. The OCI Vault keys used for protecting databases are stored in a highly available, durable, and managed service. If you like the content shared please like, comment, and subscribe for new articles. It stops unauthorized attempts by the operating system to access database data stored in files, without [] --For 19c Oracle onwards: Set the WALLET_ROOT and TDE_CONFIGURATION parameters. NAME TYPE VALUE Transparent Data Encryption (TDE) enables you to encrypt sensitive data, such as credit card numbers, stored in tables and tablespaces. Which is used to encrypt the sensitive data at table level and tablespace level also. I have talked about how to extract plain text from a normal, non-encrypted data file before. In this article, we are going to learn about Oracle TDE implementation. Once the DB is restored please make sure to rekey the wallet on the target side and delete the older master keys. At least four (4) years of Database Administration experience on Oracle RDBMS (12c/19c preferred). Building a firewall around the database servers. The search order for finding the wallet is as follows: if(typeof ez_ad_units!='undefined'){ez_ad_units.push([[300,250],'techgoeasy_com-box-4','ezslot_3',192,'0','0'])};__ez_fad_position('div-gpt-ad-techgoeasy_com-box-4-0');If present, the location specified by the ENCRYPTION_WALLET_LOCATION parameter in the sqlnet.ora file.If present, the location specified by the WALLET_LOCATION parameter in the sqlnet.ora file.The default location for the wallet. total 2721356 GSMB, (LogOut/ Yes, but it requires that the wallet containing the master key is copied (or made available, for example using Oracle Key Vault) to the secondary database. There're more ways to copy ASM files from one place to another, or vice versa. 1 oracle oinstall 2297 Jun 17 23:05 init.ora.5172021231259. TDE integration with Exadata Hybrid Columnar Compression (EHCC) compresses data first, improving cryptographic performance by greatly reducing the total amount of data to encrypt and decrypt. Copy (overwrite) the wallet files ewallet.p12, cwallet.sso from primary DB to standby DB. Transparent data encryption helps us to protect our data from being stolen. SQL> grant connect,resource to hari; We should let the database know where to find the wallet by setting related parameters. ", Oracle ZFS - An encrypting file system for Solaris and other operating systems, Oracle ACFS - An encrypting file system that runs on Oracle Automatic Storage Management (ASM), Oracle Linux native encryption modules including dm-crypt and eCryptFS, Oracle Secure Files in combination with TDE. Note: no separate effort is required on standby instance in case of creating new tablespace with tde encryption enabled. Keep wallets for TDE encryption keys and TLS certificates separate for easier management. 5. These certifications are mainly for profiling TDE performance under different application workloads and for capturing application deployment tips, scripts, and best practices. Oracle provides encryption algorithms that are broadly accepted, and will add new standard algorithms as they become available. A variety of helpful information is available on this page including product data sheet, customer references, videos, tutorials, and more. You must configure Keystore location and type by setting WALLET_ROOT and TDE_CONFIGURATION parameters in pfile or spfile. CMEK (customer-managed encryption keys) are supported for TDE encryption. Encrypted data is transparently decrypted for a database user or application that has access to data. .19c.env Transparent Data Encryption: What's New In 19c: What . We need to create a directory for Keystore inside the ORACLE_BASE location. If you import this data into an encrypted tablespace, it will be encrypted, if you import into an unencrypted tablespace, then the data will be unencrypted. We and our partners use cookies to Store and/or access information on a device. For single-instance databases, the steps are almost the same, just skipping step D to continue. Once TDE is configured on the data, only the authorized users can access this data. document.getElementById("ak_js_1").setAttribute("value",(new Date()).getTime()); if(typeof ez_ad_units!='undefined'){ez_ad_units.push([[320,100],'techgoeasy_com-large-billboard-2','ezslot_9',129,'0','0'])};__ez_fad_position('div-gpt-ad-techgoeasy_com-large-billboard-2-0');report this ad, Enter your email address to subscribe to this blog and receive notifications of new posts by email, TDE encryption in Oracle 12c step by step. You can also modify an option group that includes the TDE option by adding or removing other options. (5) We can check the information about the keystore in V$ENCRYPTION_WALLET view. [oracle@Prod22 ~]$ sqlplus hari/hari Also, TDE can encrypt entire database backups (RMAN) and Data Pump exports. We can observe whether the behavior of TDE is persistent or not after a restart. Unauthorized users, such as intruders who are attempting security attacks, cannot read the data from storage and back up media unless they have the TDE master encryption key to decrypt it. ./clprod.env, Source the container database environment The Major cloud providers that provide Oracle DB as Service are Oracle (OCI) and AWS. Fixed Size 8900864 bytes Continue with Recommended Cookies, Learn Oracle, PHP, HTML,CSS,Perl,UNIX shell scripts, April 21, 2022 by techgoeasy Leave a Comment. 1 oracle oinstall 209715712 Jun 21 21:27 redo01.log (5) We can check the information about the Keystore in V$ENCRYPTION_WALLET view. document.getElementById( "ak_js_1" ).setAttribute( "value", ( new Date() ).getTime() ); This site uses Akismet to reduce spam. This encryption is known as encrypting data at rest. This approach includes certain restrictions described in Oracle Database 12c product documentation. This parameter has been deprecated.Oracle recommends that you use the WALLET_ROOT static initialization parameter and TDE_CONFIGURATION dynamic initialization parameter instead. . You cant disable TDE from a DB instance once that instance is associated with an option group with the Oracle TDE option. In the event that the data files on a disk or backup media are stolen, the data is not compromised. Data encrypted with TDE is decrypted when it is read from database files. [oracle@Prod22 tde]$ ls -lrt Users have the option to continue keeping the TDE master encryption keys in Oracle-managed file-based encryption on the DB System or use the OCI vault service to store and manage the master encryption keys. If you have any benchmark about comparing those algorithm, please comment your thinking below. TDE transparently encrypts data at rest in Oracle Databases. -rw-r. To perform import and export operations, use Oracle Data Pump. ITNEXT is a platform for IT developers & software engineers to share knowledge, connect, collaborate, learn and experience next-gen technologies. Here we follow the conventional location of xdb_wallet in a single-instance or a RAC DB. Required fields are marked *. 1 oracle oinstall 209715712 Jun 21 18:41 redo02.log Make sure this is done only after all the other tablespaces are encrypted completely. This determines the encryption algorithm used on new tablespaces after setting: as well as the encryption algorithm for the SYSTEM tablespace: Note: This parameter needs to be set *before* creating a TDE wallet, or *before* the first set key operation when Oracle Key Vault is used, in order to be effective for the SYSTEM tablespace. 19c database, Oracle Database Security Assessment Tool-Version, https://www.linkedin.com/in/hariprasathdba, https://www.facebook.com/groups/894402327369506/. keystore altered. [oracle@Prod22 pfile]$ ls -lrt -rw-. USE Advworks GO CREATE DATABASE ENCRYPTION KEY WITH ALGORITHM . Moreover, tablespace encryption in particular leverages hardware-based crypto acceleration where it is available, minimizing the performance impact even further to the near-zero range. Variable Size 452984832 bytes As you can see, the plain text in the normal data file is shown. October 14, 2021 by Manvendra Singh. -rw-r. Now we have a wallet, but its status is closed. You can set up column-level encryption on single-column or multiple-column tables, depending on the user requirement. We have downloaded packages of Oracle instant client and uploaded 2 of them to the user's home directory. Oracle Database 19c Enterprise Edition Release 19.0.0.0.0 Production Step1:-Change Archivelog mode and force logging mode. New Delhi - 110096, Step 1: Start database and Check TDE status, Step 4: Create password protected keystore, Step 7: Create tablespace with encryption, Step 10: Close Password wallet and open the Auto login keystore, Oracle Database 21c Installation On Oracle Linux 7 | Oracle 21c Download, Managing the Oracle Database Flash Recovery Area, How to setup Data Guard Broker Configuration. GSMB, select key_id,tag,keystore_type,creation_time from v$encryption_keys; create tablespace tde_oracledbwr_tbs datafile /u02/app/oracle/oradata/ORADBWR/tde_tbs1.dbf size 50M; -> Without encryption create tablespace. Skip to content. GSMB, NAME TYPE VALUE Change). Copy the wallet files ewallet.p12, cwallet.sso from primary DB (/u01/app/oracle/admin/${DB_UNIQUE_NAME}/wallet/tde) to standby DB (/u01/app/oracle/admin/${DB_UNIQUE_NAME}/wallet/tde). In this guide I will show you how to implemente Oracle TDE on RAC, but you should be able to modify the procedure for a standalone database. Apply Patching on Database and OJVM Patch 32578972: COMBO OF OJVM RU COMPONENT 19.11.0.0.210420 + DB RU 19.11.0.0.210420, Oracle Database Security Assessment Tool-Version 2.2.2, Automatically Terminated The Blocking Session By Setting MAX_IDLE_BLOCKER_TIME, Apply Patching On Oracle 21c Database Release Update 21.7.0.0.0, Oracle 21c Point In Time Recovery of Pdb Database, Oracle 21c Cloning a PDB Database Using Sqldeveloper Tool.