You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/data-factory/connector-troubleshoot-oracle.md
+41-1Lines changed: 41 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ description: Learn how to troubleshoot issues with the Oracle connector in Azure
5
5
author: jianleishen
6
6
ms.subservice: data-movement
7
7
ms.topic: troubleshooting
8
-
ms.date: 10/23/2024
8
+
ms.date: 06/04/2025
9
9
ms.author: jianleishen
10
10
ms.custom: has-adal-ref, synapse
11
11
---
@@ -82,6 +82,46 @@ There are three error messages associated with this error code. Check the cause
82
82
-**Recommendation**: Specify the connection string property `CryptoProtocolVersion=TLSv1.2`.
83
83
84
84
85
+
## Error message: ORA-12650: No common encryption or data integrity algorithm
86
+
87
+
**Symptoms**: You meet the following error message: `ORA-12650: No common encryption or data integrity algorithm`
88
+
89
+
**Cause**: The client and server failed to agree on a common encryption/data integrity behavior or algorithm during negotiation. The default client-side configurations are as follows:
90
+
91
+
-`encryptionClient`: `required`
92
+
-`encryptionTypesClient`: `(AES256)`
93
+
-`cryptoChecksumClient`: `required`
94
+
-`cryptoChecksumTypesClient`: `(SHA512)`
95
+
96
+
**Recommendation**:
97
+
98
+
1. Check the server-side configurations, including SQLNET.ENCRYPTION_SERVER and SQLNET.CRYPTO_CHECKSUM_SERVER. Update the linked service additional properties `encryptionClient` and `cryptoChecksumClient` on the client side if needed. Note that the actual behavior is determined by the negotiation outcome between the client and server configuration, as shown below.
1. Check the server-side configurations, including SQLNET.ENCRYPTION_TYPES_SERVER and SQLNET.CRYPTO_CHECKSUM_TYPES_SERVER. Update linked service additional properties `encryptionTypesClient` and `cryptoChecksumTypesClient` on the client side to ensure that a common algorithm can be found between them. You can set `encryptionTypesClient` to `(AES128, AES192, AES256, 3DES112, 3DES168)` and `cryptoChecksumTypesClient` to `(SHA1, SHA256, SHA384, SHA512)` to include all supported client-side algorithms.
108
+
109
+
110
+
## Decimal precision too large error
111
+
112
+
**Symptoms**: When copying NUMBER type columns from Oracle, the copy may fail or the data written to the sink cannot be further consumed by other tools because the decimal precision is too large.
113
+
114
+
**Cause**: To avoid data loss, the decimal precision used to represent the Oracle NUMBER type is 256, which exceeds the max precision supported by the sink connector or downstream consumer.
115
+
116
+
**Recommendation**:
117
+
118
+
Resolve this issue by using one of the two methods provided below:
119
+
120
+
- Use a query to explicitly cast the column to BINARY_DOUBLE. For example:
121
+
`SELECT CAST(ColA AS BINARY_DOUBLE) AS ColB FROM TableA.`
122
+
123
+
- Set the linked service additional property `supportV1DataTypes` to `true`, which ensures that version 2.0 uses the same data type mappings as version 1.0.
124
+
85
125
## Related content
86
126
87
127
For more troubleshooting help, try these resources:
0 commit comments