This chapter provides a complete listing of the sqlnet.ora
file configuration parameters. This chapter includes the following topics:
The sqlnet.ora
file is the profile configuration file. It resides on the client machines and the database server. Profiles are stored and implemented using this file. The database server can be configured with access control parameters in the sqlnet.ora
file. These parameters specify whether clients are allowed or denied access based on the protocol.
The sqlnet.ora
file enables you to do the following:
Specify the client domain to append to unqualified names
Prioritize naming methods
Enable logging and tracing features
Route connections through specific processes
Configure parameters for external naming
Configure Oracle Advanced Security
Use protocol-specific parameters to restrict access to the database
By default, the sqlnet.ora
file is located in the ORACLE_HOME/network/admin
directory. The sqlnet.ora
file can also be stored in the directory specified by the TNS_ADMIN
environment variable.
Notes:
The settings in the sqlnet.ora
file apply to all pluggable databases (PDBs) in a multitenant container database environment.
Oracle Net Services supports the IFILE parameter in the sqlnet.ora
file, with up to three levels of nesting. The parameter is added manually to the file. The following is an example of the syntax:
IFILE=/tmp/listener_em.ora IFILE=/tmp/listener_cust1.ora IFILE=/tmp/listener_cust2.ora
Refer to Oracle Database Reference for additional information.
This section lists and describes the following sqlnet.ora
file parameters:
To turn signal handling on or off for Linux and UNIX systems.
no
yes
to turn signal handling off
no
to leave signal handling on
BEQUEATH_DETACH=yes
To specify the session data unit (SDU) size, in bytes to connections.
Oracle recommends setting this parameter in both the client-side and server-side sqlnet.ora
file to ensure the same SDU size is used throughout a connection. When the configured values of client and database server do not match for a session, the lower of the two values is used.
You can override this parameter for a particular client connection by specifying the SDU parameter in the connect descriptor for a client.
See Also:
Oracle Database Net Services Administrator's Guide for complete SDU usage and configuration information8192 bytes (8 KB)
512 to 2097152 bytes
DEFAULT_SDU_SIZE=4096
To enable or disable Oracle Net to send or receive out-of-band break messages using urgent data provided by the underlying protocol.
If turned off
, then the parameter enables Oracle Net to send and receive break messages. If turned on
, then the parameter disables the ability to send and receive break messages. Once enabled, this feature applies to all protocols used by this client.
off
DISABLE_OOB=on
See Also:
Operating system-specific documentation to determine if the protocols you are using support urgent data requests. TCP/IP is an example of a protocol that supports this feature.To set the domain from which the client most often looks up names resolution requests.
When this parameter is set, the default domain name is automatically appended to any unqualified net service name or service name.
For example, if the default domain is set to us.example.com
, then the connect string CONNECT scott@sales
gets searched as sales.us.example.com
. If the connect string includes the domain extension, such as CONNECT scott@sales.us.example.com
, then the domain is not appended to the string.
None
NAMES.DEFAULT_DOMAIN=example.com
To specify the order of the naming methods used for client name resolution lookups.
NAMES.DIRECTORY_PATH=(tnsnames, ldap, ezconnect)
The following table shows the NAMES.DIRECTORY_PATH values for the naming methods.
Naming Method Value | Description |
---|---|
tnsnames (local naming method) |
Set to resolve a network service name through the tnsnames.ora file on the client. |
ldap ( directory naming method) |
Set to resolve a database service name, net service name, or network service alias through a directory server. |
ezconnect or hostname (Easy Connect naming method) |
Select to enable clients to use a TCP/IP connect identifier, consisting of a host name and optional port and service name. |
nis (external naming method) |
Set to resolve service information through an existing Network Information Service (NIS). |
NAMES.DIRECTORY_PATH=(tnsnames)
To specify whether the LDAP naming adapter should attempt to authenticate using a specified wallet when it connects to the LDAP directory to resolve the name in the connect string.
The parameter value is Boolean.
If the parameter is set to TRUE
, then the LDAP connection is authenticated using a wallet whose location must be specified in the WALLET_LOCATION parameter.
If the parameter is set to FALSE
, then the LDAP connection is established using an anonymous bind.
false
NAMES.LDAP_AUTHENTICATE_BIND=true
To specify number of seconds for a non-blocking connect timeout to the LDAP server.
The parameter value -1 is for infinite timeout.
15 seconds
Values are in seconds. The range is -1
to the number of seconds acceptable for your environment. There is no upper limit.
names.ldap_conn_timeout = -1
To specify whether the LDAP naming adapter should leave the session with the LDAP server open after name lookup is complete.
The parameter value is Boolean.
If the parameter is set to TRUE
, then the connection to the LDAP server is left open after the name lookup is complete. The connection will effectively stay open for the duration of the process. If the connection is lost, then it is re-established as needed.
If the parameter is set to FALSE
, then the LDAP connection is terminated as soon as the name lookup completes. Every subsequent lookup opens the connection, performs the lookup, and closes the connection. This option prevents the LDAP server from having a large number of clients connected to it at any one time.
false
NAMES.LDAP_PERSISTENT_SESSION=true
To specify the map file to be used to map Network Information Service (NIS) attributes to an NIS mapname.
sqlnet.maps
NAMES.NIS.META_MAP=sqlnet.maps
To specify the buffer space limit for receive operations of sessions.
You can override this parameter for a particular client connection by specifying the RECV_BUF_SIZE parameter in the connect descriptor for a client.
This parameter is supported by the TCP/IP, TCP/IP with SSL, and SDP protocols.
Note:
Additional protocols might support this parameter on certain operating systems. Refer to the operating system-specific documentation for additional information about additional protocols that support this parameter.See Also:
Oracle Database Net Services Administrator's Guide for additional information about configuring this parameterThe default value for this parameter is operating system specific. The default for Linux 2.6 operating system is 87380 bytes.
RECV_BUF_SIZE=11784
To specify the protocol family or address family constant for the SDP protocol on your system.
27
Any positive integer
SDP.PF_INET_SDP=30
To specify a text file containing the banner contents that warn the user about possible user action auditing.
The complete path of the text file must be specified in the sqlnet.ora
file on the server. Oracle Call Interface (OCI) applications can make use of OCI features to retrieve this banner and display it to the user.
None
Name of the file for which the database owner has read permissions.
SEC_USER_AUDIT_ACTION_BANNER=/opt/oracle/admin/data/auditwarning.txt
To specify a text file containing the banner contents that warn the user about unauthorized access to the database.
The complete path of the text file must be specified in the sqlnet.ora
file on the server. OCI applications can make use of OCI features to retrieve this banner and display it to the user.
None
Name of the file for which the database owner has read permissions.
SEC_USER_UNAUTHORIZED_ACCESS_BANNER=/opt/oracle/admin/data/unauthwarning.txt
To specify the buffer space limit for send operations of sessions.
You can override this parameter for a particular client connection by specifying the SEND_BUF_SIZE parameter in the connect descriptor for a client.
This parameter is supported by the TCP/IP, TCP/IP with SSL, and SDP protocols.
Note:
Additional protocols might support this parameter on certain operating systems. Refer to the operating system-specific documentation for additional information about additional protocols that support this parameter.See Also:
Oracle Database Net Services Administrator's Guide for additional information about configuring this parameterThe default value for this parameter is operating system specific. The default for Linux 2.6 operating system is 16 KB.
SEND_BUF_SIZE=11784
To set the minimum authentication protocol allowed for clients, and when a server is acting as a client, such as connecting over a database link, when connecting to Oracle Database instances.
The term VERSION
in the parameter name refers to the version of the authentication protocol, not the Oracle Database release.
If the version does not meet or exceed the value defined by this parameter, then authentication fails with an ORA-28040: No matching authentication protocol
error.
See Also:
Oracle Database Security Guide12a
for Oracle Database 12c Release 1 (12.1) release 12.1.0.2 or later
12
for the critical patch updates CPUOct2012 and later Oracle Database 11g authentication protocols (recommended)
11
for Oracle Database 11g authentication protocols (default)
10
for Oracle Database 10g authentication protocols
8
for Oracle8i authentication protocol
11
If an Oracle Database 12c database hosts a database link to an Oracle Database 10g database, then the SQLNET.ALLOWED_LOGON_VERSION_CLIENT
parameter should be set as follows in order for the database link connection to proceed:
SQLNET.ALLOWED_LOGON_VERSION_CLIENT=10
To set the minimum authentication protocol allowed when connecting to Oracle Database instances.
The term VERSION
in the parameter name refers to the version of the authentication protocol, not the Oracle Database release.
If the client version does not meet or exceed the value defined by this parameter, then authentication fails with an ORA-28040: No matching authentication protocol
error or an ORA-03134: Connections to this server version are no longer supported
error.
See Also:
Oracle Database Security GuideA setting of 8
permits most password versions, and allows any combination of the DBA_USERS.PASSWORD_VERSIONS
values 10G
, 11G
, and 12C
.
A SQLNET.ALLOWED_LOGON_VERSION_SERVER
setting of 12a
permits only the 12C
password version.
A greater value means the server is less compatible in terms of the protocol that clients must understand in order to authenticate. The server is also more restrictive in terms of the password version that must exist to authenticate any specific account. The ability for a client to authenticate depends on the DBA_USERS.PASSWORD_VERSIONS
value on the server for that account.
Note the following implications of setting the value to 12
or 12a
:
The setting SEC_CASE_SENSITIVE_LOGON=FALSE
must not be used because case insensitivity requires the use of the 10G
password version. If it is set as FALSE
, then user accounts and secure roles become unusable because Exclusive Mode excludes the use of the 10G
password version. The SEC_CASE_SENSITIVE_LOGON
initialization parameter enables or disables case sensitivity for passwords.
Note:
The use of the Oracle instance initialization parameterSEC_CASE_SENSITIVE_LOGON
is deprecated in favor of setting the SQLNET.ALLOWED_LOGON_VERSION_SERVER
parameter to 12
or 12a
to ensure that passwords are treated in a case-sensitive fashion.To take advantage of the password protections introduced in Oracle Database 11g, users must change their passwords. The new passwords are case sensitive. When an account password is changed, the earlier 10G
case-insensitive password version is automatically removed.
Releases of OCI clients earlier than Oracle Database 10g and all versions of JDBC thin clients cannot authenticate to the Oracle database using password-based authentication.
If the client uses Oracle9i Database, then the client will receive an ORA-03134
error message. To allow the connection, set the SQLNET.ALLOWED_LOGON_VERSION_SERVER
value to 8
. Ensure the DBA_USERS.PASSWORD_VERSIONS
value for the account contains the value 10G
. It may be necessary to reset the password for that account.
Note the following implication of setting the value to 12a
:
When an account password is changed, the earlier 10G
case-insensitive password version and the 11G
password version are both automatically removed.
The client must support certain abilities of an authentication protocol before the server will authenticate. If the client does not support a specified authentication ability, then the server rejects the connection with an ORA-28040: No matching authentication protocol
error message.
The following is the list of all client abilities. Some clients do not have all abilities. Clients that are more recent have all the capabilities of the older clients, but older clients tend to have less abilities than more recent clients.
O7L_MR
: The ability to perform the Oracle Database 10g authentication protocol using the 12C
password version.
O5L_NP
: The ability to perform the Oracle Database 10g authentication protocol using the 11G
password version, and generating a session key encrypted for critical patch update CPUOct2012.
O5L
: The ability to perform the Oracle Database 10g authentication protocol using the 10G
password version.
O4L
: The ability to perform the Oracle9i database authentication protocol using the 10G
password version.
O3L
: The ability to perform the Oracle8i database authentication protocol using the 10G
password version.
A higher ability is more recent and secure than a lower ability. Clients that are more recent have all the capabilities of the older clients.
The following table describes the allowed values, password versions, and descriptions:
Value of the ALLOWED_LOGON_VERSION_SERVER Parameter | Generated Password Version | Ability Required of the Client | Meaning for Clients |
---|---|---|---|
12a Foot 1 |
12C |
O7L_MR |
Only Oracle Database 12c release 12.1.0.2 or later clients can connect to the server. |
12 Foot 2 |
11G , 12C |
O5L_NP |
Only clients which have applied critical patch update CPUOct2012 or later, or release 11.2.0.3 clients with an equivalent update can connect to the server. |
11 |
10G , 11G , 12C |
O5L |
Clients using Oracle Database 10g and later can connect to the server.
Clients using releases earlier than Oracle Database release 11.2.0.3 that have not applied critical patch update CPUOct2012 or later patches must use the |
10 |
10G , 11G , 12C |
O5L |
Clients using Oracle Database 10g and later can connect to the server.
Clients using releases earlier than Oracle Database release 11.2.0.3 that have not applied critical patch update CPUOct2012 or later patches must use the |
9 |
10G , 11G , 12C |
O4L |
Oracle9i Database or later clients can connect to the server. |
8 |
10G , 11G , 12C |
O3L |
Oracle8i Database and later clients can connect to the server. |
Footnote 1 This is considered "Exclusive Mode" because it excludes the use of both 10G
and 11G
password versions.
Footnote 2 This is considered "Exclusive Mode" because it excludes the use of the 10G
password version.
12a
for Oracle Database 12c release 12.1.0.2 or later authentication protocols (strongest protection)
12
for the critical patch updates CPUOct2012 and later Oracle Database 11g authentication protocols (recommended)
11
for Oracle Database 11g authentication protocols (default)
10
for Oracle Database 10g authentication protocols
9
for Oracle9i Database authentication protocol
8
for Oracle8i Database authentication protocol
11
SQLNET.ALLOWED_LOGON_VERSION_SERVER=11
To enable one or more authentication services. If authentication has been installed, then it is recommended that this parameter be set to either none
or to one of the listed authentication methods.
When using the SQLNET.AUTHENTICATION_SERVICES
value all
, the server attempts to authenticate using each of the following methods. The server falls back to the ones lower on the list if the ones higher on the list were unsuccessful.
Authentication based on a service external to the database, such as a service on the network layer, Kerberos, or RADIUS.
Authentication based on the operating system user's membership in an administrative operating system group. Group names are platform-specific. This authentication is applicable to administrative connections only.
Authentication performed by the database.
Authentication based on credentials stored in a directory server.
Operating system authentication allows access to the database using any user name and any password when an administrative connection is attempted, such as using the AS SYSDBA
clause when connecting using SQL*Plus. An example of a connection is as follows.
sqlplus ignored_username/ignored_password AS SYSDBA
When the operating-system user who issued the preceding command is already a member of the appropriate administrative operating system group, then the connection is successful. This is because the user name and password are ignored by the server due to checking the group membership first.
See Also:
Oracle Database Security Guide for additional information about authentication methodsall
Note:
When installing the database with Database Configuration Assistant (DBCA), this parameter may be set tonts
in the sqlnet.ora
file.Authentication methods available with Oracle Net Services:
none
for no authentication methods, including Microsoft Windows native operating system authentication. When SQLNET.AUTHENTICATION_SERVICES
is set to none
, a valid user name and password can be used to access the database.
all
for all authentication methods.
beq
for native operating system authentication for operating systems other than Microsoft Windows
kerberos5
for Kerberos authentication
nts
for Microsoft Windows native operating system authentication
radius
for Remote Authentication Dial-In User Service (RADIUS) authentication
tcps
for SSL authentication
SQLNET.AUTHENTICATION_SERVICES=(kerberos5)
See Also:
Oracle Database Security GuideTo set a unique identifier for the client computer.
This identifier is passed to the listener with any connection request, and is included in the audit trail. The identifier can be any alphanumeric string up to 128 characters long.
None
SQLNET.CLIENT_REGISTRATION=1432
To enable or disable data compression. If both the server and client have this parameter set to ON
, then compression is used for the connection.
Note:
TheSQLNET.COMPRESSION
parameter applies to all database connections, except for Oracle Data Guard streaming redo and SecureFiles LOBs (Large Objects).off
on
to enable data compression.
off
to disable data compression.
SQLNET.COMPRESSION=on
To specify the compression level.
The compression levels are used at time of negotiation to verify which levels are used at both ends, and to select one level.
For Database Resident Connection Pooling (DRCP), only the compression level low
is supported.
low
high
to use high CPU usage and high compression ratio.
SQLNET.COMPRESSION_LEVELS=(high)
To specify the minimum data size, in bytes, for which compression is needed.
Compression is not be done if the size of the data to be sent is less than this value.
1024 bytes
SQLNET.COMPRESSION_THRESHOLD=1024
To specify the checksum behavior for the client.
See Also:
Oracle Database Security Guideaccepted
accepted
to enable the security service if required or requested by the other side.
rejected
to disable the security service, even if required by the other side.
requested
to enable the security service if the other side allows it.
required
to enable the security service and disallow the connection if the other side is not enabled for the security service.
SQLNET.CRYPTO_CHECKSUM_CLIENT=accepted
To specify the checksum behavior for the database server.
accepted
accepted
to enable the security service if required or requested by the other side.
rejected
to disable the security service, even if required by the other side.
requested
to enable the security service if the other side allows it.
required
to enable the security service and disallow the connection if the other side is not enabled for the security service.
SQLNET.CRYPTO_CHECKSUM_SERVER=accepted
See Also:
Oracle Database Security GuideTo specify a list of crypto-checksum algorithms for the client to use.
All available algorithms
MD5
for the RSA Data Security MD5 algorithm.
SHA1
for the Secure Hash Algorithm.
SHA256
for SHA-2 uses 256 bits with the hashing algorithm.
SHA384
for SHA-2 uses 384 bits with the hashing algorithm.
SHA512
for SHA-2 uses 512 bits with the hashing algorithm.
SQLNET.CRYPTO_CHECKSUM_TYPES_CLIENT=(SHA256, MD5)
See Also:
Oracle Database Security GuideTo specify a list of crypto-checksum algorithms for the database server to use.
All available algorithms
MD5
for the RSA Data Security's MD5 algorithm
SHA1
for the Secure Hash algorithm.
SHA256
for SHA-2 uses 256 bits with the hashing algorithm.
SHA384
for SHA-2 uses 384 bits with the hashing algorithm.
SHA512
for SHA-2 uses 512 bits with the hashing algorithm.
SQLNET.CRYPTO_CHECKSUM_TYPES_SERVER=(SHA256, MD5)
See Also:
Oracle Database Security GuideTo provide Oracle Database Firewall public keys to Advanced Security Option (ASO) by specifying the file that stores the Oracle Database Firewall public keys.
None
Full path name of the operating system file that has the public keys.
SQLNET.DBFW_PUBLIC_KEY="/path_to_file/dbfw_public_key_file.txt"
To specify the amount of time in seconds that information about the down
state of server hosts is kept in client process cache.
Clients discover the down
state of server hosts when attempting connections. When a connection attempt fails, the information about the down
state of the server host is added to the client process cache. Subsequent connection attempts by the same client process move the down
hosts to the end of the address list, thereby reducing the priority of such hosts. When the time specified by the SQLNET.DOWN_HOSTS_TIMEOUT
parameter has passed, the host is purged from the process cache, and its priority in the address list is restored.
600 seconds (10 minutes)
Any positive integer
SQLNET.DOWN_HOSTS_TIMEOUT=60
To turn encryption on for the client.
accepted
accepted
to enable the security service if required or requested by the other side.
rejected
to disable the security service, even if required by the other side.
requested
to enable the security service if the other side allows it.
required
to enable the security service and disallow the connection if the other side is not enabled for the security service.
SQLNET.ENCRYPTION_CLIENT=accepted
See Also:
Oracle Database Security GuideTo turn encryption on for the database server.
accepted
accepted
to enable the security service if required or requested by the other side.
rejected
to disable the security service, even if required by the other side.
requested
to enable the security service if the other side allows it.
required
to enable the security service and disallow the connection if the other side is not enabled for the security service.
SQLNET.ENCRYPTION_SERVER=accepted
See Also:
Oracle Database Security GuideTo specify a list of encryption algorithms for the client to use.
All available algorithms.
One or more of the following:
3des112
for triple DES with a two-key (112-bit) option
3des168
for triple DES with a three-key (168-bit) option
aes128
for AES (128-bit key size)
aes192
for AES (192-bit key size)
aes256
for AES (256-bit key size)
des
for standard DES (56-bit key size)
des40
for DES (40-bit key size)
rc4_40
for RSA RC4 (40-bit key size)
rc4_56
for RSA RC4 (56-bit key size)
rc4_128
for RSA RC4 (128-bit key size)
rc4_256
for RSA RC4 (256-bit key size)
SQLNET.ENCRYPTION_TYPES_CLIENT=(rc4_56)
See Also:
Oracle Database Security GuideTo specify a list of encryption algorithms for the database server to use.
All available algorithms.
One or more of the following:
3des112
for triple DES with a two-key (112-bit) option
3des168
for triple DES with a three-key (168-bit) option
aes128
for AES (128-bit key size)
aes192
for AES (192-bit key size)
aes256
for AES (256-bit key size)
des
for standard DES (56-bit key size)
des40
for DES40 (40-bit key size)
rc4_40
for RSA RC4 (40-bit key size)
rc4_56
for RSA RC4 (56-bit key size)
rc4_128
for RSA RC4 (128-bit key size)
rc4_256
for RSA RC4 (256-bit key size)
SQLNET.ENCRYPTION_TYPES_SERVER=(rc4_56, des, ...)
See Also:
Oracle Database Security GuideTo specify a time interval, in minutes, to send a check to verify that client/server connections are active.
Setting a value greater than 0 ensures that connections are not left open indefinitely, due to an abnormal client termination. If the system supports TCP keepalive tuning, then Oracle Net Services automatically uses the enhanced detection model, and tunes the TCP keepalive parameters
If the probe finds a terminated connection, or a connection that is no longer in use, then it returns an error, causing the server process to exit.
This parameter is primarily intended for the database server, which typically handles multiple connections at any one time.
Limitations on using this terminated connection detection feature are:
It is not allowed on bequeathed connections.
Though very small, a probe packet generates additional traffic that may downgrade network performance.
Depending on which operating system is in use, the server may need to perform additional processing to distinguish the connection probing event from other events that occur. This can also result in degraded network performance.
0
0
10
SQLNET.EXPIRE_TIME=10
To specify the time, in seconds, for a client to connect with the database server and provide the necessary authentication information.
If the client fails to establish a connection and complete authentication in the time specified, then the database server terminates the connection. In addition, the database server logs the IP address of the client and an ORA-12170: TNS:Connect timeout occurred
error message to the sqlnet.log
file. The client receives either an ORA-12547: TNS:lost contact
or an ORA-12637: Packet receive failed
error message.
The default value of this parameter is appropriate for typical usage scenarios. However, if you need to explicitly set a different value, then Oracle recommends setting this parameter in combination with the INBOUND_CONNECT_TIMEOUT_listener_name parameter in the listener.ora
file. When specifying the values for these parameters, note the following recommendations:
Set both parameters to an initial low value.
Set the value of the INBOUND_CONNECT_TIMEOUT_
listener_name
parameter to a lower value than the SQLNET.INBOUND_CONNECT_TIMEOUT
parameter.
For example, you can set INBOUND_CONNECT_TIMEOUT_
listener_name
to 2 seconds and SQLNET.INBOUND_CONNECT_TIMEOUT
parameter to 3 seconds. If clients are unable to complete connections within the specified time due to system or network delays that are normal for the particular environment, then increment the time as needed.
60 seconds
SQLNET.INBOUND_CONNECT_TIMEOUT=3
See Also:
"Control Parameters" for additional information about INBOUND_CONNECT_TIMEOUT_
listener_name
Oracle Database Net Services Administrator's Guide for additional information about configuring these parameters
To specify the complete path name to the Kerberos credentials cache file.
The MSLSA
option specifies the file is on Microsoft Windows, and is running Microsoft KDC.
The OS_MEMORY
option specifies that an operating system-managed memory credential is used for the credential cache file. This option is supported for all operating systems with such a feature.
/usr/tmp/krbcache
on Linux and UNIX operating systems
c:\tmp\krbcache
on Microsoft Windows operating systems
SQLNET.KERBEROS5_CC_NAME=/usr/tmp/krbcache SQLNET.KERBEROS5_CC_NAME=MSLSA SQLNET.KERBEROS5_CC_NAME=OS_MEMORY
See Also:
Oracle Database Security GuideTo specify how many seconds can pass before a Kerberos credential is considered out of date.
300
SQLNET.KERBEROS5_CLOCKSKEW=1200
See Also:
Oracle Database Security GuideTo specify the complete path name to the Kerberos configuration file, which contains the realm for the default Key Distribution Center (KDC) and maps realms to KDC hosts.
The KDC maintains a list of user principals and is contacted through the kinit
program for the user's initial ticket.
The AUTO_DISCOVER
option allows the automatic discovery of KDC and realms. It is the default configuration for Kerberos clients. If there are multiple realms to be specified, then Oracle recommends creating configuration files instead of using the AUTO_DISCOVER
option. This option is supported for all operating systems with such a feature.
/krb5/krb.conf
on Linux and UNIX operating systems
c:\krb5\krb.conf
on Microsoft Windows operating systems
Directory path to krb.conf
file
AUTO_DISCOVER
SQLNET.KERBEROS5_CONF=/krb5/krb.conf
See Also:
Oracle Database Security GuideTo specify the directory for the Kerberos configuration file. The parameter also specifies the file is created by the system, and not by the client.
The configuration file uses DNS lookup to obtain the realm for the default KDC, and maps realms to the KDC hosts. This option is supported for all operating systems with such a feature.
/krb5
on Linux and UNIX operating systems
c:\krb5
on Microsoft Windows operating systems
SQLNET.KERBEROS5_CONF_LOCATION=/krb5
To specify the complete path name to the Kerberos principal/secret key mapping file, which is used to extract keys and decrypt incoming authentication information.
/etc/v5srvtab
on Linux and UNIX operating systems
c:\krb5\v5srvtab
on Microsoft Windows operating systems
SQLNET.KERBEROS5_KEYTAB=/etc/v5srvtab
See Also:
Oracle Database Security GuideTo specify the complete path name to the Kerberos realm translation file, which provides a mapping from a host name or domain name to a realm.
/krb5/krb.realms
on Linux and UNIX operating systems
c:\krb5\krb.realms
on Microsoft Windows operating systems
SQLNET.KERBEROS5_REALMS=/krb5/krb.realms
See Also:
Oracle Database Security GuideTo specify replay cache is stored in operating system-managed memory on the server, and that file-based replay cache is not used.
The OS_MEMORY
option specifies the replay cache is stored in operating system-managed memory on the server, and file-based replay cache is not used.
SQLNET_KERBEROS5_REPLAY_CACHE=OS_MEMORY
To specify the time, in seconds, for a client to establish an Oracle Net connection to the database instance.
If an Oracle Net connection is not established in the time specified, then the connect attempt is terminated. The client receives an ORA-12170: TNS:Connect timeout occurred
error.
The outbound connect timeout interval is a superset of the TCP connect timeout interval, which specifies a limit on the time taken to establish a TCP connection. Additionally, the outbound connect timeout interval includes the time taken to be connected to an Oracle instance providing the requested service.
Without this parameter, a client connection request to the database server may block for the default TCP connect timeout duration (60 seconds) when the database server host system is unreachable.
The outbound connect timeout interval is only applicable for TCP, TCP with SSL, and IPC transport connections.
This parameter is overridden by the CONNECT_TIMEOUT
parameter in the address description.
None
SQLNET.OUTBOUND_CONNECT_TIMEOUT=10
To specify an alternate RADIUS server to use in case the primary server is unavailable.
The value can be either the IP address or host name of the server.
None
SQLNET.RADIUS_ALTERNATE=radius2
See Also:
Oracle Database Security GuideTo specify the listening port of the alternate RADIUS server.
1645
SQLNET.RADIUS_ALTERNATE_PORT=1667
See Also:
Oracle Database Security GuideTo specify the number of times the database server should resend messages to the alternate RADIUS server.
3
SQLNET.RADIUS_ALTERNATE_RETRIES=4
See Also:
Oracle Database Security GuideTo specify the location of the primary RADIUS server, either by its host name or IP address.
Local host
SQLNET.RADIUS_AUTHENETICATION=officeacct
See Also:
Oracle Database Security GuideTo specify the class containing the user interface used to interact with the user.
DefaultRadiusInterface
SQLNET.RADIUS_AUTHENTICATION_INTERFACE=DefaultRadiusInterface
See Also:
Oracle Database Security GuideTo specify the listening port of the primary RADIUS server.
1645
SQLNET.RADIUS_AUTHENTICATION_PORT=1667
See Also:
Oracle Database Security GuideTo specify the number of times the database server should resend messages to the primary RADIUS server.
3
SQLNET.RADIUS_AUTHENTICATION_RETRIES=4
See Also:
Oracle Database Security GuideTo specify the time, in seconds, that the database server should wait for a response from the primary RADIUS server.
5
SQLNET.RADIUS_AUTHENTICATION_TIMEOUT=10
See Also:
Oracle Database Security GuideTo turn challenge response on or off.
off
on | off
SQLNET.RADIUS_CHALLENGE_RESPONSE=on
See Also:
Oracle Database Security GuideTo specify the location of the RADIUS secret key.
The ORACLE_HOME/network/security/radius.key
file.
SQLNET.RADIUS_SECRET=oracle/bin/admin/radiuskey
See Also:
Oracle Database Security GuideTo turn accounting on
and off
. If enabled, then packets are sent to the active RADIUS server at listening port plus one.
off
on | off
SQLNET.RADIUS_SEND_ACCOUNTING=on
See Also:
Oracle Database Security GuideTo specify the time, in seconds, for a database server to wait for client data after establishing a connection. A client must send some data within the time interval.
Setting this parameter is recommended for environments in which clients shut down on occasion or abnormally. If a client does not send any data in time specified, then the database server logs ORA-12535: TNS:operation timed out
and ORA-12609: TNS: Receive timeout occurred
messages to the sqlnet.log
file. Without this parameter, the database server may continue to wait for data from clients that may be down or are experiencing difficulties.
You can also set this parameter on the client-side to specify the time, in seconds, for a client to wait for response data from the database server after connection establishment. Without this parameter, the client may wait a long period of time for a response from a database server saturated with requests. If you choose to set the value, then set the value to an initial low value and adjust according to system and network capacity. If necessary, use this parameter with the SQLNET.SEND_TIMEOUT parameter.
None
SQLNET.RECV_TIMEOUT=3
See Also:
Oracle Database Net Services Administrator's Guide for additional information about configuring these parametersTo specify the time, in seconds, for a database server to complete a send operation to clients after establishing a connection.
Setting this parameter is recommended for environments in which clients shut down occasionally or abnormally.
If the database server cannot complete a send operation in the time specified, then it logs ORA-12535: TNS:operation timed out
and ORA-12608: TNS: Send timeout occurred
messages to the sqlnet.log
file. Without this parameter, the database server may continue to send responses to clients that are unable to receive data due to a downed computer or a busy state.
You can also set this parameter on the client-side to specify the time, in seconds, for a client to complete send operations to the database server after connection establishment. Without this parameter, the client may continue to send requests to a database server already saturated with requests. If you choose to set the value, then set the value to an initial low value and adjust according to system and network capacity. If necessary, use this parameter with the SQLNET.RECV_TIMEOUT parameter.
None
SQLNET.SEND_TIMEOUT=3
See Also:
Oracle Database Net Services Administrator's Guide for additional information about configuring this parameterTo determine whether the client should override the strong authentication credential with the password credential in the stored wallet to log in to the database.
When wallets are used for authentication, the database credentials for user name and password are securely stored in an Oracle wallet. The auto-login feature of the wallet is turned on so the database does not need a password to open the wallet. From the wallet, the database gets the credentials to access the database for the user.
Wallet usage can simplify large-scale deployments that rely on password credentials for connecting to databases. When this feature is configured, application code, batch jobs, and scripts do not need embedded user names and passwords. Risk is reduced because such passwords are no longer exposed in the clear, and password management policies are more easily enforced without changing application code whenever user names or passwords change.
Users connect using the connect /@
database_name
command instead of specifying a user name and password explicitly. This simplifies the maintenance of the scripts and secures the password management for the applications.
Middle-tier applications create an Oracle Applications wallet at installation time to store the application's specific identity. The password may be randomly generated rather than hardcoded. When an Oracle application accesses the database, it sets appropriate values for SQLNET.AUTHENTICATION_SERVICES
and WALLET_LOCATION
. The new wallet-based password authentication code uses the password credential in the Oracle Applications wallet to log on to the database.
true | false
SQLNET.WALLET_OVERRIDE=true
See Also:
In order to use wallets, a wallet must be configured on the client. Refer to Oracle Database Security Guide for additional information about configuring the clients.To configure a revocation check for a certificate.
See Also:
Oracle Database Security Guidenone
none
to turn off certificate revocation checking. This is the default.
requested
to perform certificate revocation in case a Certificate Revocation List (CRL) is available. Reject SSL connection if the certificate is revoked. If no appropriate CRL is found to determine the revocation status of the certificate and the certificate is not revoked, then accept the SSL connection.
required
to perform certificate revocation when a certificate is available. If a certificate is revoked and no appropriate CRL is found, then reject the SSL connection. If no appropriate CRL is found to ascertain the revocation status of the certificate and the certificate is not revoked, then accept the SSL connection.
SSL_CERT_REVOCATION=required
To specify the name of the file where you can assemble the CRL for client authentication.
This file contains the PEM-encoded CRL files, in order of preference. You can use this file alternatively or in addition to the SSL_CERT_PATH parameter. This parameter is only valid if SSL_CERT_REVOCATION is set to either requested
or required
.
None
SSL_CERT_FILE=
To specify the destination directory of the CRL of CA.
The files in this directory are hashed symbolic links created by Oracle Wallet Manager.
This parameter is only valid if SSL_CERT_REVOCATION is set to either requested
or required
.
None
SSL_CERT_PATH=
To control which combination of encryption and data integrity is used by the Secure Sockets Layer (SSL). Cipher suites that use Advanced Encryption Standard (AES) only work with Transport Layer Security (TLS 1.0).
None
SSL_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
SSL_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
SSL_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
SSL_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
SSL_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
SSL_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
SSL_RSA_WITH_AES_128_CBC_SHA256
SSL_RSA_WITH_AES_128_GCM_SHA256
SSL_RSA_WITH_AES_128_CBC_SHA
SSL_RSA_WITH_AES_256_CBC_SHA
SSL_RSA_WITH_AES_256_CBC_SHA256
SSL_RSA_WITH_AES_256_GCM_SHA384
SSL_RSA_WITH_RC4_128_MD5
SSL_RSA_WITH_RC4_128_SHA
SSL_RSA_WITH_3DES_EDE_CBC_SHA
SSL_DH_anon_WITH_3DES_EDE_CBC_SHA
SSL_DH_anon_WITH_RC4_128_MD5
Note:
SSL_DH_anon_WITH_3DES_EDE_CBC_SHA
and SSL_DH_anon_WITH_RC4_128_MD5
do not the provide authentication of the communicating parties, and can be vulnerable to man-in-the-middle attacks. Oracle recommends that you do not use these cipher suites to protect sensitive data. However, they are useful if the communicating parties want to remain anonymous or simply do not want the overhead caused by mutual authentication.SSL_CIPHER_SUITES=(ssl_rsa_with_aes_128_cbc_sha256)
See Also:
Oracle Database Security Guide for additional information about cipher suite valuesTo specify the purpose of the key in the certificate.
When this parameter is specified, the certificate with the matching extended key is used.
client authentication
SSL_EXTENDED_KEY_USAGE="client authentication"
To enforce that the distinguished name (DN) for the database server matches its service name.
If you enforce the match verifications, then SSL ensures that the certificate is from the server. If you select to not enforce the match verification, then SSL performs the check but allows the connection, regardless if there is a match. Not enforcing the match allows the server to potentially fake its identify.
In addition to the sqlnet.ora
file, configure the tnsnames.ora
parameter SSL_SERVER_CERT_DN to enable server DN matching.
no
yes
| on
| true
to enforce a match. If the DN matches the service name, then the connection succeeds. If the DN does not match the service name, then the connection fails.
no
| off
| false
to not enforce a match. If the DN does not match the service name, then the connection is successful, but an error is logged to the sqlnet.log
file.
SSL_SERVER_DN_MATCH=yes
See Also:
Oracle Database Security GuideTo force the version of the SSL connection.
Clients and database servers must use a compatible version.
undetermined
undetermined | 2.0 | 3.0
SSL_VERSION=2.0
See Also:
Oracle Database Security GuideTo specify the time, in seconds, for a client to establish a TCP connection (PROTOCOL=tcp
in the TNS connect address) to the database server.
If a TCP connection to the database host is not established in the time specified, then the connection attempt is terminated. The client receives an ORA-12170: TNS:Connect timeout occurred
error.
The timeout applies to each IP address that resolves to a host name. For example, if a host name resolves to an IPv6 and an IPv4 address, and if the host is not reachable through the network, then the connection request times out twice because there are two IP addresses. In this example, the default timeout setting of 60 would cause a timeout in 120 seconds.
60
TCP.CONNECT_TIMEOUT=10
To specify which clients are denied access to the database.
This parameter is only valid when the TCP.VALIDNODE_CHECKING parameter is set to yes
.
This parameter can use wildcards for IPv4 addresses and CIDR notation for IPv4 and IPv6 addresses.
TCP.EXCLUDED_NODES=(hostname | ip_address, hostname | ip_address, ...)
TCP.EXCLUDED_NODES=(finance.us.example.com, mktg.us.example.com, 192.0.2.25, 172.30.*, 2001:DB8:200C:417A/32)
To specify which clients are allowed access to the database. This list takes precedence over the TCP.EXCLUDED_NODES
parameter if both lists are present.
TCP.INVITED_NODES=(hostname | ip_address, hostname | ip_address, ...)
This parameter is only valid when the TCP.VALIDNODE_CHECKING parameter is set to yes
.
This parameter can use wildcards for IPv4 addresses and CIDR notation for IPv4 and IPv6 addresses.
TCP.INVITED_NODES=(sales.us.example.com, hr.us.example.com, 192.0.*, 2001:DB8:200C:433B/32)
To preempt delays in buffer flushing within the TCP/IP protocol stack.
yes
yes | no
TCP.NODELAY=yes
To configure the maximum length of the queue for pending connections on a TCP listening socket.
System-defined maximum value. The defined maximum value for Linux is 128.
Any integer value up to the system-defined maximum.
TCP.QUEUESIZE=100
To enable and disable valid node checking for incoming connections.
If this parameter is set to yes
, then incoming connections are allowed only if they originate from a node that conforms to list specified by TCP.INVITED_NODES or TCP.EXCLUDED_NODES parameters.
The TCP.INVITED_NODES and TCP.EXCLUDED_NODES parameters are valid only when the TCP.VALIDNODE_CHECKING parameter is set to yes
.
no
yes | no
TCP.VALIDNODE_CHECKING=yes
To specify the destination directory for the TNSPING utility trace file, tnsping.trc
.
The ORACLE_HOME/network/trace
directory.
TNSPING.TRACE_DIRECTORY=/oracle/traces
To turn TNSPING utility tracing on at a specified level or to turn it off.
off
off
for no trace output
user
for user trace information
admin
for administration trace information
support
for Oracle Support Services trace information
TNSPING.TRACE_LEVEL=admin
To specify client routing to Oracle Connection Manager.
If set to true
, then the parameter routes the client to a protocol address for Oracle Connection Manager.
If set to false
, then the client picks one of the address lists at random and fails over to the other address list if the chosen ADDRESS_LIST
fails. With USE_CMAN
=true
, the client always uses the first address list.
If no Oracle Connection Manager addresses are available, then connections are routed through any available listener address.
false
true | false
USE_CMAN=true
To append (SERVER=dedicated)
to the CONNECT_DATA
section of the connect descriptor used by the client.
It overrides the current value of the SERVER parameter in the tnsnames.ora
file.
If set to on
, then the parameter USE_DEDICATED_SERVER
automatically appends (SERVER=dedicated)
to the connect data for a connect descriptor. This way connections from this client use a dedicated server process, even if shared server is configured.
off
on
to append (SERVER=dedicated)
off
to send requests to existing server processes
USE_DEDICATED_SERVER=on
See Also:
Oracle Database Net Services Administrator's Guide for complete configuration informationTo specify the location of wallets. Wallets are certificates, keys, and trustpoints processed by SSL.
The key/value pair for Microsoft certificate store (MCS) omits the METHOD_DATA
parameter because MCS does not use wallets. Instead, Oracle PKI (public key infrastructure) applications obtain certificates, trustpoints and private keys directly from the user's profile.
If an Oracle wallet is stored in the Microsoft Windows registry and the wallet's key (KEY)
is SALESAPP
, then the storage location of the encrypted wallet is HKEY_CURRENT_USER\SOFTWARE\ORACLE\WALLETS\SALESAPP\EWALLET.P12
. The storage location of the decrypted wallet is HKEY_CURRENT_USER\SOFTWARE\ORACLE\WALLETS\SALESAPP\CWALLET.SSO.
The syntax depends on the wallet, as follows:
Oracle wallets on the file system:
WALLET_LOCATION= (SOURCE= (METHOD=file) (METHOD_DATA= (DIRECTORY=directory) [(PKCS11=TRUE/FALSE)]))
Microsoft certificate store:
WALLET_LOCATION= (SOURCE= (METHOD=mcs))
Oracle wallets in the Microsoft Windows registry:
WALLET_LOCATION=
(SOURCE=
(METHOD=reg)
(METHOD_DATA=
(KEY=registry_key)))
Entrust wallets:
WALLET_LOCATION= (SOURCE= (METHOD=entr) (METHOD_DATA= (PROFILE=file.epf) (INIFILE=file.ini)))
WALLET_LOCATION
supports the following parameters:
SOURCE
: The type of storage for wallets, and storage location.
METHOD
: The type of storage.
METHOD_DATA
: The storage location.
DIRECTORY
: The location of Oracle wallets on file system.
KEY
: The wallet type and location in the Microsoft Windows registry.
PROFILE
: The Entrust profile file (.epf
).
INIFILE
: The Entrust initialization file (.ini
).
None
true | false
Oracle wallets on file system:
WALLET_LOCATION= (SOURCE= (METHOD=file) (METHOD_DATA= (DIRECTORY=/etc/oracle/wallets/databases)))
Microsoft certificate store:
WALLET_LOCATION= (SOURCE= (METHOD=mcs))
Oracle Wallets in the Microsoft Windows registry:
WALLET_LOCATION= (SOURCE= (METHOD=REG) (METHOD_DATA= (KEY=SALESAPP)))
Entrust Wallets:
WALLET_LOCATION= (SOURCE= (METHOD=entr) (METHOD_DATA= (PROFILE=/etc/oracle/wallets/test.epf) (INIFILE=/etc/oracle/wallets/test.ini)))
Since Oracle Database 11g, Oracle Database includes an advanced fault diagnosability infrastructure for preventing, detecting, diagnosing, and resolving problems. The problems are critical errors such as those caused by database code bugs, metadata corruption, and customer data corruption.
When a critical error occurs, it is assigned an incident number, and diagnostic data for the error, such as traces and dumps, is immediately captured and tagged with the incident number. The data is then stored in the Automatic Diagnostic Repository (ADR), a file-based repository outside the database.
This section describes the parameters used when ADR is enabled. Non-ADR parameters listed in the sqlnet.ora
file are ignored when ADR is enabled. "Non-ADR Diagnostic Parameters in sqlnet.ora" describes the parameters used when ADR is disabled. ADR is enabled by default.
The following sqlnet.ora
parameters are used when ADR is enabled (when DIAG_ADR_ENABLED
is set to on
):
To specify the base directory into which tracing and logging incidents are stored when ADR is enabled.
The default on the server side is ORACLE_BASE
, or ORACLE_HOME/log
, if ORACLE_BASE
is not defined.
Any valid directory path to a directory with write permission.
ADR_BASE=/oracle/network/trace
See Also:
Oracle Call Interface Programmer's Guide for the default directory on the client sideTo specify whether ADR tracing is enabled.
If the DIAG_ADR_ENABLED
parameter is set to OFF
, then non-ADR file tracing is used.
on
on
| off
DIAG_ADR_ENABLED=on
To turn client tracing on at a specified level or to turn it off.
This parameter is also applicable when non-ADR tracing is used.
off or 0
off
or 0
for no trace output
user
or 4
for user trace information
admin
or 10
for administration trace information
support
or 16
for Oracle Support Services trace information
TRACE_LEVEL_CLIENT=user
To turn server tracing on at a specified level or to turn it off.
This parameter is also applicable when non-ADR tracing is used.
off or 0
off
or 0
for no trace output
user
or 4
for user trace information
admin
or 10
for administration trace information
support
or 16
for Oracle Support Services trace information
TRACE_LEVEL_SERVER=admin
To add a time stamp in the form of dd-mmm-yyyy hh:mm:ss:mil
to every trace event in the client trace file, which has a default name of sqlnet.trc
.
This parameter is also applicable when non-ADR tracing is used.
on
on
or true
| off
or false
TRACE_TIMESTAMP_CLIENT=true
To add a time stamp in the form of dd-mmm-yyyy hh:mm:ss:mil
to every trace event in the database server trace file, which has a default name of svr_
pid
.trc
.
This parameter is also applicable when non-ADR tracing is used.
on
on
or true
| off
or false
TRACE_TIMESTAMP_SERVER=true
This section lists the sqlnet.ora
parameters used when ADR is disabled.
Notes:
The default value of DIAG_ADR_ENABLED ison
. Therefore, the DIAG_ADR_ENABLED
parameter must explicitly be set to off
in order for non-ADR tracing to be used.To specify the destination directory for the client log file.
Use this parameter when ADR is not enabled.
ORACLE_HOME/network/log
Any valid directory path.
LOG_DIRECTORY_CLIENT=/oracle/network/log
To specify the destination directory for the database server log file.
Use this parameter when ADR is not enabled.
ORACLE_HOME/network/trace
Any valid directory path to a directory with write permission.
LOG_DIRECTORY_SERVER=/oracle/network/trace
To specify the name of the log file for the client.
Use this parameter when ADR is not enabled.
ORACLE_HOME/network/log/sqlnet.log
The default value cannot be changed.
To specify the name of the log file for the database server.
Use this parameter when ADR is not enabled.
sqlnet.log
Any valid directory path to a directory with write permission.
LOG_FILE_SERVER=svr.log
To specify the destination directory for the client trace file.
Use this parameter when ADR is not enabled.
The current working directory.
Any valid directory path to a directory with write permission.
TRACE_DIRECTORY_CLIENT=/oracle/traces
To specify the destination directory for the database server trace file. Use this parameter when ADR is not enabled.
ORACLE_HOME/network/trace
Any valid directory path to a directory with write permission.
TRACE_DIRECTORY_SERVER=/oracle/traces
To specify the name of the client trace file.
Use this parameter when ADR is not enabled.
ORACLE_HOME/network/trace/cli.trc
Any valid file name.
TRACE_FILE_CLIENT=clientsqlnet.trc
To specify the destination directory for the database server trace output.
Use this parameter when ADR is not enabled.
ORACLE_HOME/network/trace/svr_pid.trc
Any valid file name. The process identifier (pid) is appended to the name automatically.
TRACE_FILE_SERVER=svrsqlnet.trc
To specify the size of the client trace files in kilobytes (KB).
When the size is met, the trace information is written to the next file. The number of files is specified with the TRACE_FILENO_CLIENT parameter. Use this parameter when ADR is not enabled.
TRACE_FILELEN_CLIENT=100
To specify the size of the database server trace files in kilobytes (KB).
When the size is met, the trace information is written to the next file. The number of files is specified with the TRACE_FILENO_SERVER parameter. Use this parameter when ADR is not enabled.
TRACE_FILELEN_SERVER=100
To specify the number of trace files for client tracing.
When this parameter is set with the TRACE_FILELEN_CLIENT parameter, trace files are used in a cyclical fashion. The first file is filled first, then the second file, and so on. When the last file has been filled, then the first file is re-used, and so on.
The trace file names are distinguished from one another by their sequence number. For example, if the default trace file of sqlnet.trc
is used, and this parameter is set to 3, then the trace files would be named sqlnet1.trc
, sqlnet2.trc
and sqlnet3.trc
.
In addition, trace events in the trace files are preceded by the sequence number of the file. Use this parameter when ADR is not enabled.
None
TRACE_FILENO_CLIENT=3
To specify the number of trace files for database server tracing.
When this parameter is set with the TRACE_FILELEN_SERVER parameter, trace files are used in a cyclical fashion. The first file is filled first, then the second file, and so on. When the last file has been filled, then the first file is re-used, and so on.
The trace file names are distinguished from one another by their sequence number. For example, if the default trace file of svr_
pid
.trc
is used, and this parameter is set to 3, then the trace files would be named svr1_
pid
.trc
, svr2_
pid
.trc
and svr3_
pid
.trc
.
In addition, trace events in the trace files are preceded by the sequence number of the file. Use this parameter when ADR is not enabled.
None
TRACE_FILENO_SERVER=3
To specify whether a unique trace file is created for each client trace session.
When the value is set to on
, a process identifier is appended to the name of each trace file, enabling several files to coexist. For example, trace files named sqlnet
pid
.trc
are created if default trace file name sqlnet.trc
is used. When the value is set to off
, data from a new client trace session overwrites the existing file. Use this parameter when ADR is not enabled.
on
on
or off
TRACE_UNIQUE_CLIENT=on