open-vault/website/source/docs/secrets/databases/oracle.html.md
Brian Kassouf 89b81bcb4c Oracle plugin docs (#3131)
* Add oracle database docs

* Add oracle database docs

* Fix commas in json output

* Update oracle.html.md
2017-08-15 17:24:01 -07:00

74 lines
2.5 KiB
Markdown

---
layout: "docs"
page_title: "Oracle Database Plugin"
sidebar_current: "docs-secrets-databases-oracle"
description: |-
The Oracle Database plugin for Vault's Database backend generates database credentials to access Oracle Database severs.
---
# Oracle Database Plugin
Name: `oracle-database-plugin`
The Oracle Database Plugin is an external plugin for the Database
backend. This plugin generates database credentials dynamically based on
configured roles for the Oracle database.
The Oracle Database Plugin does not live in the core Vault code tree and can be found
at its own git repository here: [hashicorp/vault-plugin-database-oracle](https://github.com/hashicorp/vault-plugin-database-oracle)
See the [Database Backend](/docs/secrets/databases/index.html) docs for more
information about setting up the Database Backend.
## Quick Start
After the Database Backend is mounted you can run the plugin and configure a
connection to the Oracle Database.
First the plugin must be built and registered to Vault's plugin catalog. To
build the plugin see the plugin's code repository. Once the plugin is built and
the binary is placed in Vault's plugin directory the catalog should be updated:
```
$ vault write sys/plugins/catalog/oracle-database-plugin \
sha_256=<expected SHA256 value> \
command=oracle-database-plugin
```
Once the plugin exists in the plugin catalog the Database backend can configure
a connection for the Oracle Database:
```
$ vault write database/config/oracle \
plugin_name=oracle-database-plugin \
connection_url="system/Oracle@localhost:1521/OraDoc.localhost" \
allowed_roles="readonly"
The following warnings were returned from the Vault server:
* Read access to this endpoint should be controlled via ACLs as it will return the connection details as is, including passwords, if any.
```
Once the Oracle connection is configured we can add a role:
```
$ vault write database/roles/readonly \
db_name=oracle \
creation_statements="CREATE USER {{name}} IDENTIFIED BY {{password}}; GRANT CONNECT TO {{name}}; GRANT CREATE SESSION TO {{name}};" \
default_ttl="1h" \
max_ttl="24h"
Success! Data written to: database/roles/readonly
```
This role can now be used to retrieve a new set of credentials by querying the
"database/creds/readonly" endpoint.
## API
The full list of configurable options can be seen in the [Oracle database
plugin API](/api/secret/databases/oracle.html) page.
For more information on the Database secret backend's HTTP API please see the [Database secret
backend API](/api/secret/databases/index.html) page.