|
1 | | -Oracle-Application-Level-Encryption-Decryption |
2 | | -============================================== |
3 | 1 |
|
4 | | -Oracle based application level Encryption and Decryption utilities for 10g and 11g(AES enabled) |
5 | | - |
6 | | -Ref: http://devopam.github.io/Oracle-Application-Level-Encryption-Decryption/ |
7 | | - |
8 | | -1. Please place all the source code files provided in one single location ( preferably a single directory ) |
9 | | -a. error_log.ddl |
10 | | -b. ex_crypto_pkg.ddl |
11 | | -c. ex_crypto_pkg_body.ddl |
12 | | -d. run_before_install.sql |
13 | | - |
14 | | -2. Please run the file : run_before_install.sql to verify that there is no conflict with an existing object in your database. |
15 | | -If there are any objects in the list generated by script then you may wish to manually inspect the DB object(s) before executing |
16 | | -the next steps to avoid any data / object loss. |
17 | | - |
18 | | -3. Compile the script : error_log.ddl |
19 | | -The script expects tablespace named 'ext_data_ts' to be present and accessible. |
20 | | -Please replace the same with appropriate tablespace name OR remove the tablespace clause as applicable. |
21 | | - |
22 | | -e.g : from unix prompt - after logging into oracle , fire the command |
23 | | -@error_log.ddl |
24 | | - |
25 | | -4. Compile the script : ex_crypto_pkg.ddl |
26 | | - |
27 | | -5. Execute wrap utility for hiding the : |
28 | | -E.g : In a unix box , which has oracle connectivity defined (i.e. $ORACLE, $TNS_HOME etc. are defined) execute this command |
29 | | -wrap iname=ex_crypto_pkg_body.ddl |
30 | | - |
31 | | -This will generate a file named : ex_crypto_pkg_body.plb |
32 | | - |
33 | | -Compile this file as usual : |
34 | | -E.g : from unix prompt - after logging into oracle , fire the command |
35 | | -@ ex_crypto_pkg_body.plb |
36 | | - |
37 | | -6. Verify that the encryption package is working properly by using the sample below: |
38 | | - |
39 | | -SELECT ex_crypto.f_decrypt(ex_crypto.f_encrypt('Exilant Technologies Pvt. Ltd.')) FROM DUAL; |
40 | | - |
41 | | ---This command will validate both encryption and decryption functions. For detailed function list , please refer to Usage Instructions. |
42 | | - |
43 | | -7. Delete the source file(s) : |
44 | | -a. ex_crypto_pkg.ddl |
45 | | -b. ex_crypto_pkg_body.ddl |
46 | | -c. ex_crypto_pkg_body.plb |
47 | | - |
48 | | -8. Uninstall process: |
49 | | -Please ensure that the error log table and logging procedure don't have any other dependency or are getting used anywhere. |
50 | | -Also, it is suggested to take a backup of error log table , in case the error logging module is to be used separately. |
51 | | - |
52 | | -Compile the script : |
53 | | -uninstall_encryption.sql |
54 | | - |
55 | | -This will systematically remove all components installed as part of the crypto module. |
| 2 | +Install related instructions provided here: |
| 3 | +http://devopam.github.io/Oracle-Application-Level-Encryption-Decryption/ |
56 | 4 |
|
| 5 | +Usage related help information provided here: |
| 6 | +ex_crypto Usage Documentation.pdf |
0 commit comments