Oracle Fusion Data Intelligence(FDI) - Connect to Oracle Autonomous Databases(ADB) with private endpoints.
- Pratheek Talla - NZOUG

- 3 days ago
- 3 min read
This Blog outlines the steps required for securely connecting public FDI to an Oracle Autonomous Database (ADB) private endpoint.
With increasing security and compliance requirements, many organisations prefer private connectivity over public endpoints when integrating cloud services. If you are using Oracle Fusion Data Intelligence (FDI) and need to connect to an Oracle Autonomous Database (ADB) configured with a Private Endpoint, this guide walks you through the architecture, prerequisites, and step-by-step approach.
1. Understanding the Architecture
When using a Private Endpoint, your Autonomous Database is not exposed to the public internet. Instead, it is accessible only within a Virtual Cloud Network (VCN).
In this setup:
Oracle Fusion Data Intelligence (FDI) runs in Oracle-managed tenancy.
Autonomous Database (ADB) is deployed in your OCI tenancy.
Connectivity is established using:
Private Endpoint
VCN Peering (Local or Remote)
FastConnect (if hybrid)
Proper route tables and security rules
The goal is to allow FDI to securely access ADB over private networking.
Below mentioned the simplified reference architecture showing FDI with a public endpoint and ADB deployed on a private endpoint in the same tenancy and region. This setup is for illustrative purposes and only applicable when FDI and the database are in the same region and tenancy.

Prerequisites
Before configuring the connection, ensure:
Autonomous Database is provisioned with Private Endpoint enabled
You have access to:
OCI Console
VCN configuration
Route tables and Security Lists / NSGs
Proper IAM policies are configured
Database wallet (if required)
Required database credentials created
High-Level Steps
Step 1: Confirm ADB Private Endpoint Configuration
In OCI:
· Navigate to Autonomous Database
· Verify:
o Private Endpoint is enabled
o Private IP address assigned
o VCN and Subnet details
Ensure the subnet allows traffic from FDI source CIDR ranges.

Step 2: Configure Networking Between FDI and Your VCN
Since FDI runs in an Oracle-managed tenancy, you must enable private connectivity via:
Option A: VCN Peering
· Set up Local Peering Gateway (LPG) if within same region
· Or Remote Peering Gateway (RPG) if cross-region
Option B: FastConnect (Hybrid)
If connecting from on-premise architecture integrated with FDI, use FastConnect.
Update:
· Route Tables
· Security Lists
· Network Security Groups (NSG)
Allow:
· TCP Port 1522 (mTLS default for ADB)
· Or Port 1521 (if configured)

Step 3: Update Security Rules
In your ADB subnet:
Add Ingress Rule:
· Source: FDI private CIDR
· Protocol: TCP
· Port: 1522
If using NSGs:
· Attach NSG to ADB
· Allow FDI IP ranges

Step 4: Configure Connection in FDI
In Oracle Fusion Data Intelligence:
1. Navigate to Data Configuration → Data Sources
2. Create a new connection
3. Choose:
o Oracle Autonomous Database
4. Provide:
o Private Hostname (not public endpoint)
o Service Name (e.g., high, medium, _low)
o Port (1522 recommended)
o Username & Password
If using mTLS:
· Upload Wallet
· Configure JDBC string properly
Example JDBC format:
jdbc:oracle:thin:@(description=
(retry_count=20)
(retry_delay=3)
(address=(protocol=tcps)(port=1522)(host=<private-hostname>))
(connect_data=(service_name=<service_name>))
(security=(ssl_server_dn_match=yes))
)
4. IAM Policies Required
Example policy:
Allow group <FDI_Admin_Group> to manage autonomous-database-family in compartment <Compartment_Name>
Ensure:
· Network administrators can manage VCN
· FDI service principal has access
5. Validation & Testing
After configuration:
· Test connection from FDI
· Validate DNS resolution of private hostname
· Check:
o Route tables
o Security rules
o NSG
o Peering status
Common errors:
· ORA-12541: No listener → Likely routing issue
· ORA-29024: Certificate validation failure → Wallet or TLS mismatch
· Timeout → Security rule or port blocked
6. Best Practices
· Use mTLS (Port 1522) for secure connectivity
· Restrict ingress CIDR to minimum required
· Use NSGs instead of Security Lists where possible
· Monitor using OCI Logging & ADB metrics
Regularly rotate database credentials
Summary
Connecting Oracle Fusion Data Intelligence to an Autonomous Database Private Endpoint strengthens security by eliminating public exposure.
The key components are:
· Proper VCN design
· Secure routing
· Correct security rules
· Accurate connection configuration in FDI
Once configured correctly, this architecture provides:
✔ Secure private connectivity✔ Enhanced compliance posture✔ Reliable high-performance data integration
NZOUG Advise : If you're implementing this in a production environment, it’s recommended to validate connectivity in Non-Prod first and document network flows clearly for your cloud and security teams.




Comments