Hey Daniel,
Were you able to get your set up working?
We have been use TCPS for some time. Assisted oracle in getting their product to work with CAC, was that a long process. We use to have to run 2 different listeners 1 for native encryption and 1 for TCPS. We us a mix of hard and soft certs depending on the user type.
We have Toad and Sql Developer working with both.
The only parameter we use on the client side is the wallet location (mcs or wallet location).
Another thing to keep in mind, is if you are using soft cert via ODP.NET there is a bug in ODP.NET "Oracle Client Side" that it picks the first cert to authenticate. Meaning if you have more then 1 cert loaded it always picks the first one.
The .NET people on my team are pushing for an enhancement to fix it.
I feel the server/oracle should dictate the security but thats just my opinion.
SSL_VERSION = 1.2
SSL_CLIENT_AUTHENTICATION = TRUE
#fixes double encryption
SQLNET.IGNORE_ANO_ENCRYPTION_FOR_TCPS=TRUE
#NOT IN OUR STAGE
SQLNET.AUTHENTICATION_SERVICES= (TCPS,BEQ,IPC)
#sql client version allowed no affect on encryption
SQLNET.ALLOWED_LOGON_VERSION_SERVER=12
SQLNET.ALLOWED_LOGON_VERSION_CLIENT=12
#ENCRYPTION_TYPES -removed ,aes192,aes128
SQLNET.ENCRYPTION_TYPES_SERVER= (AES256)
SQLNET.ENCRYPTION_TYPES_CLIENT= (AES256)
#prior to 19c this would fail with cac sqlnet.ignore_ano_encryption_for_tcps setting fixes it
SQLNET.ENCRYPTION_CLIENT = REQUIRED
SQLNET.ENCRYPTION_SERVER = REQUIRED
#CHECKSUM_TYPES
SQLNET.CRYPTO_CHECKSUM_TYPES_CLIENT= (SHA384)
SQLNET.CRYPTO_CHECKSUM_TYPES_SERVER= (SHA384)
SQLNET.CRYPTO_CHECKSUM_CLIENT = REQUIRED
SQLNET.CRYPTO_CHECKSUM_SERVER = REQUIRED
#For Oracle Native Encryption
SQLNET.FIPS_140=TRUE
SQLNET.WALLET_OVERRIDE=FALSE
Anyways not sure if any of this is useful but just thought Id share
Dave