When managing Oracle Transparent Data Encryption (TDE), it’s often necessary to verify whether a wallet password is correct—especially before performing operations such as opening the wallet, rotating keys, or restoring backups. The safest way to do this is by using the mkstore utility outside the database environment, without requiring any database open/close actions.
Below is a simple and secure method to validate your TDE wallet password.
Why Use mkstore for Validation?
mkstore allows you to test the wallet password independently of the database.
This approach ensures:
-
No impact on the running database
-
No wallet state changes
-
A direct and reliable password validation method
Steps to Validate a TDE Wallet Password
1. Copy Only the ewallet.p12 File
Copy the wallet file (ewallet.p12) to a temporary directory:
-
Do not copy
cwallet.sso
The.ssofile enables auto-login, which bypasses the password prompt.
Excluding it ensures thatmkstoremust ask for the password.
Example:
cp /path/to/original/ewallet.p12 /tmp/wallet_validation/
2. Run the mkstore Command
From the Oracle home bin directory, execute:
mkstore -wrl <wallet_directory> -list
Replace <wallet_directory> with the path to your copied wallet (e.g., /tmp/wallet_validation/).
mkstore will prompt you to enter the wallet password.
3. Interpret the Result
-
Valid Password:
The command displays wallet contents (aliases/entries). -
Invalid Password:
You will see an error indicating that the password is incorrect.
This method confirms the correctness of your TDE wallet password without any risk to the running database or the original wallet.
Why Avoid Copying cwallet.sso?
cwallet.sso enables auto-login mode.
If present, the wallet opens automatically and no password check occurs, defeating the purpose of validation.
By copying only ewallet.p12, you ensure that mkstore enforces password authentication.
Example Commands
cp /u01/app/oracle/admin/db_wallet/ewallet.p12 /tmp/wallet_validation/
mkstore -wrl /tmp/wallet_validation/ -list
🟩 Summary
Validating a TDE wallet password using mkstore is:
-
Safe
-
Non-intrusive
-
Independent of database state
-
Ideal before sensitive operations like wallet open, key changes, or backup restores
This simple check can help prevent downtime and errors related to incorrect wallet passwords.