Skip to main content


Following are the options specific to the Oracle:

  • Connection Name: Enter a unique Connection Name. This fields accepts letters, numbers, and symbols.

  • SSL: For an additional layer of security, check the SSL (Secure Socket Layer) checkbox.

  • Connection Type: Choose between two connection types in oracle:

    1. Basic: Provide the following details for a basic connection.

      1. Hostname: Enter the Hostname of the Oracle server or select from the list of available IPs. You can also search for the hostnames and IP addresses of databases by Find DBMS tasks.

      2. IP Address: Enter the IP Address for the connection.

      3. Port Number: Enter the Port Number for establishing a connection. You can also edit the port number later, if required.SID or Service Name: Enter the Service ID (SID) or Service Name.

    2. TNS: Provide the following details for a basic connection:

      1. TNS Name: Enter the TNS Name of the Oracle server.

      2. IP Address: Enter the IP Address for the connection.

  • Authentication Method: The following authentication methods are available for Oracle Server:

    • Oracle: Authenticates the connection using Oracle Server Username and Password.

    • Kerberos: Authenticates the connection using the Kerberos Username and Key Path.

    • Kerberos with Principal: Authenticates using Kerberos system’s Principal name and password.

*Note: For using the authentication method, Kerberos, and Kerberos with Principal, the environment should be set up on the IDP. Following are the steps to perform the same: 

  1. Check that correct krb5.conf file is available on the IDP machine. If not, copy the krb5.conf file on Windows directory or /etc/ directory.

  2. Ping KDC server and database server using hostname from IDP to verify network connectivity. Add entries in /etc/hosts file, if required.

  3. Verify that the clock time should be same on IDP, KDC and DB2, Oracle server machine. 

  4. (For Kerberos) You can use keytabs instead of ticket cache to login via Kerberos. A keytab (Key Table) stores long term keys for one or more principals. By default, IDP performs Kerberos authentication using keytab. Corresponding property to enforce this is “useKeytabOnly”. The default value for “useKeytabOnly” is TRUE. In Masker IDP, the property can be located in “Properties.config” file and in Discover IDP, the property can be located in “Settings.xml” file.

    If you don’t want to use keytab, then obtain TGT (Ticket Granting Ticket) manually at IDP. 

    1. Login to OS with the Kerberos user.

    2. Run “kinit user” command to obtain TGT. Verify using “klist” command. 

      1. kinit is available in Java/jre/bin folder.

      2. The default paths are set when client is configured, but if faced with any issues add the following property in “javaOptions” in present in IDP installation. Once this step has been done, restart the IDP.<path to krb5 cache file><path to krb5.conf>

    3. Connect through PK Protect by entering the required information. 

  • Use Connection String: A Connection String specifies the information about the data source and the means of connecting to it. Check the Use Connection String checkbox and provide the connection string. Use this option if you want to secure the connection using connection string instead of SSL.

  • Connection Attribute: Select the attribute name from the Connection Attribute drop-down. This functionality allows you to add tags to the created connection.

  • Databases/Schemas: Enter the name of the database in the Filter By Schema/DB Name text box. Check the Include System Schema/DB Name checkbox to include the required schemas and databases and click Fetch Metadata. It will list down the available databases/schemas for the connection.

    Check the databases/schemas name that you want to add as the target databases/schemas. The checked databases or schemas will appear in the Target Databases/Schemas panel.

*Note: It is recommended to set the value as Single Connection for Select Connection Limit field while executing a detection task for RDBMS in order to connect to Oracle database using TNS connection with Kerberos and Kerberos with Principal authentication method.

To proceed further for remaining steps, refer Step 2 in RDBMS Detection Connection.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.