FIPS 140-3 is not just a checkbox. It’s a federal cryptographic standard. If you connect to an Oracle database with SQL*Plus in a FIPS 140-3 enforced environment, every handshake, every cipher, every random number matters. The wrong algorithm and the connection fails. The right one and your queries run. Simple. Brutal.
SQL*Plus, by default, may not align with a locked-down FIPS 140-3 policy. Older configurations rely on cryptographic modules that no longer meet the bar. Oracle Database and its client tools can run in a FIPS-validated mode, but only when built, configured, and run with modules that match the NIST-approved set. This means OpenSSL or Oracle's PKCS#11 implementation must be set to FIPS mode before SQL*Plus starts. It means no SHA-1, no non-approved curves, no weak random sources.
When FIPS 140-3 is enabled at the OS or network stack, SQL*Plus negotiates TLS using only approved ciphers. If anything in the chain is out of compliance—driver, listener, wallet—your session dies before login. To pass, the SQLNET.ORA and SSL configurations must explicitly point to FIPS-validated libraries. The database wallet must store keys with an approved cipher suite. The handshake must succeed without downgrade.