⚠ Java Audit Defence & SAM Strategy

Third-Party SAM Tools and Oracle Java Audits in 2026: What’s Accepted, How to Configure Them, and How to Use the Data to Defend Your PositionTool Selection, Configuration, Data Quality, Audit Defence Strategy, and Negotiation Tactics

Oracle Java audits routinely reach seven-figure claims. The right SAM tool, correctly configured, is your primary defence. This guide covers every dimension: which tools Oracle accepts, how to configure them for comprehensive Java discovery, how to ensure your data is airtight, and how to deploy that data against Oracle’s claims.

📅 February 2026 ⏱ 28 min read 📄 Redress Compliance Advisory
📘 Part of our Oracle Java Audit Defence practice. See also: Oracle Advisory Services · Oracle Audit Playbook · OracleJavaAudit.com
75%
Orgs audited or reviewed in past 3 years
$1M+
Typical 7-figure Java audit exposure
$15
Per employee/month — Java SE Universal
30–60%
Claim reduction from vendor differentiation
🔎 Section 1 — Executive Summary

Why SAM Tools Have Become Mission-Critical for Oracle Java Compliance

Oracle Java audits have become one of the most financially consequential compliance events an enterprise can face. Since Oracle’s January 2023 shift to employee-based Java SE licensing — where a single Oracle JDK installation anywhere in the organisation triggers a subscription obligation based on total global headcount — the financial exposure from Java non-compliance routinely reaches seven figures. By early 2026, Oracle’s Java-focused audit activity has intensified to the point where industry data suggests that 75% of organisations using Oracle Java have been audited or subjected to a licence review within the past three years.

In this environment, third-party Software Asset Management (SAM) tools are no longer optional governance instruments. They are essential defensive infrastructure. The right SAM tool, correctly configured for Java discovery, serves three critical functions: it provides the comprehensive visibility needed to understand your actual Java exposure before Oracle asks, it generates the defensible data required to control the audit process and prevent Oracle from deploying its own scripts across your environment, and it produces the evidence base from which you negotiate — enabling you to challenge Oracle’s claims with verified facts rather than accepting their assertions at face value.

⚠ SAM Tools Are Not a Silver Bullet

Oracle’s verification programme for SAM tools is product-specific — a tool verified for Oracle Database may not be verified for Java SE. Configuration gaps can leave entire swathes of your environment unscanned. And critically, SAM tools report what is installed; they do not interpret Oracle’s licensing rules or determine what requires a subscription.

Without expert analysis of the SAM data against Oracle’s specific Java licensing terms, even the most comprehensive scan can lead to costly misinterpretations. The data is the foundation. Expert interpretation is what turns it into a defence.

📈 Section 2 — Audit Landscape

Why Oracle Java Audits Have Reached Unprecedented Levels in 2026

Oracle’s Java audit programme is not arbitrary. It is driven by specific commercial dynamics that make Java one of Oracle’s most lucrative compliance enforcement targets.

1

The Employee-Based Model Creates Maximum Leverage

Oracle’s Java SE Universal Subscription, priced at $15.00 per employee per month, uses total global employee count as the licensing metric. Even a handful of Oracle JDK installations can generate a compliance obligation that scales to the entire workforce. For a 10,000-employee organisation, the annual subscription cost is approximately $1.08 million — and the retroactive exposure dating back to January 2023 can reach $3.2 million or more. This extraordinary leverage makes every Java audit financially significant for Oracle, regardless of how limited the actual Java deployment is.

2

Oracle Tracks Downloads

Oracle monitors downloads from its Java distribution sites. Organisations that have downloaded Oracle JDK or JRE updates without an active subscription are flagged as potential non-compliance targets. If your IT team downloaded Java patches or new versions from Oracle’s website at any point since January 2023 without a current Java SE subscription, Oracle’s records show this activity.

3

The Audit Pipeline Is Systematic

Oracle’s licence management services (LMS) and global licence advisory services (GLAS) teams operate structured audit pipelines with quarterly targets. Java audits are prioritised because they are relatively simple to execute, the financial claims are large relative to audit effort, and many organisations are unaware of the employee-based licensing change and have made no preparation.

Audit TriggerHow Oracle Detects ItRisk LevelImmediate Action
Oracle JDK/JRE downloads from oracle.comDownload logs tied to company IP/email domainVery HighScan all environments; determine what was deployed
Expired Java SE subscriptionOracle’s entitlement recordsVery HighAssess whether Oracle JDK is still in use; migrate if so
Oracle support tickets mentioning JavaMy Oracle Support (MOS) ticket metadataHighReview support history; correlate with actual deployments
Large employee count with minimal Oracle licensingCRM profiling; public employee dataMedium–HighPrepare internal inventory proactively
Third-party software bundling Oracle JDKDetected during broader Oracle auditsMediumVerify OEM licence coverage for bundled Java

📌 What IT and Procurement Should Do Now

Assume you are on Oracle’s radar. If your organisation has downloaded Oracle Java since January 2023, has an expired Java licence, or has filed Oracle support tickets referencing Java, operate on the assumption that an audit is likely.

Conduct a pre-audit internal assessment now. Use your SAM tool to generate a complete Java inventory before Oracle asks for one. Discovering your own exposure is infinitely preferable to Oracle discovering it for you.

Engage audit defence advisory early. Do not wait for an audit letter. The organisations that achieve the best audit outcomes are those that prepare their position before Oracle initiates contact.

✅ Section 3 — Oracle-Verified Tools

Oracle-Verified SAM Tools — What Oracle Accepts and What Verification Actually Means

Oracle operates a formal SAM tool verification programme — Oracle Verified for Software Asset Management — that tests and certifies third-party tools for their ability to accurately discover and report Oracle software installations. Understanding what verification means (and what it does not mean) is essential for your audit defence strategy.

1

What Oracle Verification Covers

An Oracle-verified SAM tool has been tested by Oracle and confirmed to accurately discover installations of specific Oracle products. The verification is product-specific — a tool may be verified for Oracle Database and Java SE but not for Oracle Middleware, or vice versa. When a tool is verified for Java SE, Oracle accepts its discovery output as an accurate representation of Oracle Java installations in your environment. This means Oracle will generally accept your SAM tool data instead of insisting on running its own LMS scripts — a significant advantage because it keeps data collection under your control.

2

What Oracle Verification Does NOT Cover

Verification does not mean compliance. The SAM tool tells you what is installed; it does not determine whether a subscription is required, how the employee-based metric should be calculated, whether specific installations fall under OEM licence coverage, whether development/testing exemptions apply, or what the correct financial settlement should be. These are licensing interpretation questions that require expert analysis — not automated tool output. An Oracle-verified tool that reports 200 Oracle Java installations does not mean you need to licence 200 installations. It means you need an expert to determine which of those 200 actually trigger a licensing obligation.

Flexera One IT Asset Management

Flexera

Deep Oracle product recognition with strong Java version and vendor detection. Comprehensive lifecycle management and licence reconciliation.

✓ Verified for Java SE SaaS + Agent

Snow License Manager

Snow Software

Comprehensive inventory with dedicated Oracle optimisation module. Strong reporting for Java version coverage across mixed environments.

✓ Verified for Java SE SaaS + Agent

ServiceNow SAM Pro

ServiceNow

Tight ITSM integration with automated Oracle licence calculations. Well-suited to organisations already running the ServiceNow platform.

✓ Verified for Java SE SaaS + Discovery

USU Software Asset Management

USU (formerly Aspera)

Strong Oracle-specific licence optimisation capabilities. Used widely in European enterprises for complex Oracle compliance management.

✓ Verified for Java SE On-premise + SaaS

Certero for Oracle

Certero

Dedicated Oracle compliance module with Java-specific discovery and reporting. Purpose-built for Oracle audit defence scenarios.

✓ Verified for Java SE SaaS + Agent

Custom java -version Scripts

Internal / Supplemental

Lightweight agentless scripting that catches embedded and hidden JDKs often missed by platform tools. Essential supplement to any verified tool.

Not Oracle-verified Agentless scripting
⚙ Section 4 — Configuration

Configuring Your SAM Tool for Comprehensive Java Discovery

Even the best Oracle-verified SAM tool will miss Java installations if it is not configured correctly. Java is particularly challenging to discover comprehensively because it can exist in many forms: standalone JDK installations, JRE runtime installations, Java bundled inside third-party applications, Java embedded in container images, Java on developer workstations, Java in CI/CD build pipelines, and Java on temporary or ephemeral cloud instances. A configuration that scans only production servers will miss the majority of these.

1

Scope — Scan Everything, Not Just Production

Configure your SAM tool to scan all environments: production servers (physical, virtual, cloud), development and test environments, CI/CD build servers, developer workstations and laptops, container registries (scan Docker/OCI images for Oracle JDK base layers), disaster recovery environments, and any partner-managed or outsourced infrastructure where your applications run.

The single most common configuration gap is excluding non-production environments. Under Oracle’s employee-based model, any Oracle JDK usage — including development and testing — triggers the full employee-based subscription obligation unless you have a specific contractual exception.

2

Detection Method — Beyond File Signatures

Configure multiple detection methods in parallel:

  • File system scanning for java.exe, java binaries, and jdk/jre directory structures
  • Package manager queries (rpm, dpkg, brew) for installed Java packages
  • Registry scanning (Windows) for Java installation entries
  • Execution of java -version on discovered binaries to capture vendor and version strings
  • Container image layer analysis for Java base images in registries
  • Process monitoring to detect running Java processes indicating embedded JDKs not found by file scanning
3

Vendor Differentiation — The Critical Distinction

The most important configuration item for Java audit defence is ensuring that your SAM tool differentiates Oracle Java from non-Oracle Java distributions. When the tool discovers a Java installation, it must report the vendor (Oracle Corporation vs Eclipse Adoptium vs Amazon vs Azul vs Red Hat vs IBM), the exact version string, the installation source/path, and whether it is a JDK or JRE.

This differentiation is your primary defence. Installations of OpenJDK, Amazon Corretto, Azul Zulu, or other non-Oracle distributions do not trigger Oracle licensing obligations. If your SAM tool reports all Java installations as simply “Java” without vendor attribution, it is useless for audit defence.

4

Container and Cloud Coverage — Commonly Missed

Container image scanning is not typically enabled by default in most SAM tools. Explicitly configure scanning of container registries (Docker Hub, ECR, ACR, GCR) and running container images for Oracle JDK base layers. For cloud infrastructure, ensure dynamic discovery covers auto-scaling groups and spot instances that may be instantiated and terminated between scan cycles. Ephemeral instances that spin up Oracle JDK and then disappear are invisible to periodic scheduled scans without continuous monitoring.

Configuration AreaMinimum RequirementBest PracticeImpact If Missed
Scan scopeAll production serversAll environments including dev, test, CI/CD, containers, DROracle discovers installations you didn’t know about
Detection methodFile system scanningFile scan + package query + java -version + process monitoringEmbedded or non-standard installations missed
Vendor differentiationOracle vs non-Oracle flagFull vendor string, version, JDK vs JRE, installation pathCannot distinguish licensable from non-licensable Java
Scan frequencyMonthlyWeekly for production; daily alerts for new Oracle JDKStale data; new installations appear between scans
Container image scanningNot typically included by defaultScan container registries and running container imagesContainerised Oracle JDK completely invisible
Cloud instance coverageStatic inventoryDynamic discovery of auto-scaling groups and spot instancesEphemeral cloud instances missed

📌 What IT Should Do Now — SAM Tool Configuration

Run a configuration audit on your SAM tool today. Verify that Java discovery is enabled, that vendor differentiation is configured, that all environments are in scope, and that container registries are covered.

Supplement with custom scripts. Even with a verified SAM tool, run java -version enumeration scripts across your infrastructure as a cross-check. SAM tools occasionally miss embedded JDKs that custom scripts catch.

Validate vendor attribution accuracy. Manually verify the vendor string reported by your SAM tool on a sample of 20–30 known installations (mix of Oracle JDK and OpenJDK). If any are misclassified, investigate and correct the recognition patterns before relying on the data in an audit.

📋 Section 5 — Data Quality

Ensuring Data Quality — The Foundation of Audit Defence

Your SAM tool data is only as valuable as its accuracy and completeness. During an Oracle audit, every gap, inconsistency, or misclassification in your data becomes an opportunity for Oracle to challenge your position and assert a larger compliance claim. Data quality is not a technical nicety — it is a direct determinant of your audit outcome.

1

Completeness — Coverage Gaps Are Fatal

If Oracle’s audit team identifies Java installations that your SAM tool data does not include, your credibility is immediately undermined. Oracle will argue that if your tool missed some installations, it may have missed others — and they may insist on deploying their own LMS scripts to conduct a “comprehensive” scan. Once Oracle’s scripts are running in your environment, you lose control of the data collection process. Ensure your SAM tool coverage is genuinely comprehensive by cross-referencing the SAM tool inventory against CMDB records, cloud infrastructure inventories, and application deployment documentation.

2

Accuracy — Vendor Misclassification Is Expensive

If your SAM tool incorrectly classifies an OpenJDK installation as Oracle JDK, you may accept a licensing obligation that does not exist. Conversely, if it misclassifies an Oracle JDK installation as OpenJDK, Oracle will find the error and use it to question the accuracy of your entire dataset. Validate vendor attribution by running java -version on a representative sample and comparing the output to your SAM tool’s classification.

3

Currency — Stale Data Is Dangerous

An audit response based on SAM data that is three months old is unreliable. Oracle can legitimately question whether the environment has changed since the scan. Maintain weekly scan cycles for production environments and ensure that your audit response data is no more than two weeks old at the time of submission.

4

Context — Raw Data Without Interpretation Is Incomplete

A SAM tool report that says “150 Oracle Java installations” tells Oracle your exposure. A report that says “150 installations, of which 45 are development-only environments, 28 are covered under OEM licences bundled with third-party software, and 32 have been migrated to OpenJDK since the scan date” tells a fundamentally different story. Add contextual annotations to your SAM data before presenting it in an audit.

Data Quality DimensionRequirementValidation MethodRisk If Inadequate
Completeness (coverage)100% of environments in scopeCross-reference SAM inventory vs CMDB, cloud console, app registerOracle deploys own scripts; you lose data control
Accuracy (vendor attribution)Correct Oracle vs non-Oracle classificationManual java -version verification on 20–30 sample systemsOver-count inflates liability; under-count destroys credibility
Currency (scan freshness)Data no more than 2 weeks old at submissionCheck scan completion timestamps; re-run if necessaryOracle challenges data as outdated; demands re-scan
Context (annotations)Each installation annotated with purpose, owner, licence coverageCollaboration between IT, licensing, and procurementRaw data presented without context over-represents exposure
🛡 Section 6 — Audit Defence

Using SAM Tool Data to Defend an Oracle Java Audit

When Oracle initiates an audit or licence review targeting Java, your SAM tool data becomes the centrepiece of your defence strategy. How you present, interpret, and leverage that data determines whether you achieve a favourable outcome or accept Oracle’s maximum claim.

1

Control the Data Collection Phase

When Oracle requests Java deployment data, respond with your SAM tool output rather than allowing Oracle to deploy its own scripts. If your tool is Oracle-verified for Java SE, Oracle should accept this data. Key tactical points: provide the data in the format Oracle expects (typically a structured spreadsheet or export matching Oracle’s LMS data model), include only what is requested — do not volunteer data about non-Oracle products or non-Java Oracle products — and review every line item internally before submission. Once you submit data to Oracle, you cannot retract it.

2

Distinguish Oracle JDK from Non-Oracle Java

Your SAM data should clearly segregate Oracle Java installations from OpenJDK, Amazon Corretto, Azul Zulu, Red Hat OpenJDK, and IBM Semeru installations. Non-Oracle Java does not trigger Oracle licensing. If Oracle’s initial claim includes non-Oracle installations, present the vendor differentiation from your SAM tool to exclude them. This single step frequently reduces Oracle’s claim by 30–60%.

3

Identify OEM-Covered Installations

Oracle JDK bundled inside third-party software products (e.g., certain middleware, ERP, or security products) may be covered under the third-party vendor’s OEM agreement with Oracle. Your SAM data should flag these installations separately. Contact the third-party vendor to confirm OEM Java coverage and request written confirmation. OEM-covered Java does not require a separate Oracle Java subscription.

4

Challenge the Employee-Count Metric

Oracle applies the subscription based on total global employees. However, the definition of “employee” and the headcount methodology are negotiable. Use your SAM data to argue for a narrower scope: if Oracle JDK exists only in one division, argue that only that division’s headcount is relevant. If Oracle JDK is used only on servers (not desktops), challenge whether the full employee metric is appropriate versus a server-based calculation. These arguments are more effective when backed by specific SAM data showing the limited scope of actual Oracle Java deployment.

5

Run a Parallel Migration Programme

If Oracle JDK installations are found during the audit, begin migrating them to a non-Oracle distribution immediately — even while the audit is in progress. Every installation removed before the audit concludes reduces both the retroactive claim and the forward subscription commitment. Maintain dated scan evidence showing the Oracle JDK count declining over time. This evidence supports arguments for a reduced retroactive period and demonstrates good faith, which carries weight in settlement negotiations.

Defence TacticSAM Data RequiredTypical Impact on ClaimDifficulty
Exclude non-Oracle JavaVendor-attributed inventory showing OpenJDK / Corretto / Zulu30–60% reductionLow — data-driven
Identify OEM-covered JavaInstallation path + associated application mapping10–25% reductionMedium — requires vendor confirmation
Challenge retroactive period scopeHistorical scan data showing migration timeline20–40% reduction in back-periodMedium — requires dated evidence
Narrow employee count scopeSAM data showing Oracle JDK limited to specific divisions/serversSignificant — divisional vs enterprise headcountHigh — Oracle resists strongly
Demonstrate migration in progressSAM data showing declining Oracle JDK count over timeReduces forward commitment; may reduce retroactive claimMedium
Exclude decommissioned systemsSAM data correlated with CMDB decommission datesRemoves phantom installations from Oracle’s countLow — data-driven

⚠ What the Audit Response Team Must Do

🚫 Section 7 — Pitfalls

Pitfalls and Common Mistakes That Turn SAM Data Into a Liability

SAM tools are powerful defence instruments, but they can also create liability if used incorrectly. Understanding the most common pitfalls prevents costly errors.

✗ Mistakes That Hurt Your Position

  • Assuming verification equals compliance. Verified means Oracle trusts the discovery data. It says nothing about whether the data indicates compliance or non-compliance.
  • Voluntarily sharing SAM data with Oracle outside a formal audit. Unsolicited data submissions can trigger targeted audit activity based on what Oracle finds.
  • Presenting aggregate numbers without context. “300 Java installations” invites maximum metric application. Context is the difference between a seven-figure settlement and an acceptable outcome.
  • Failing to scan non-production environments. Developers download Oracle JDK for convenience. Non-production environments are often the largest source of undetected exposure.
  • Relying on a single scan methodology. No single detection method catches all Java installations. Use multiple complementary methods.

✓ Practices That Protect Your Position

  • Conduct your internal assessment before Oracle asks. Pre-audit visibility is your most powerful asset. Self-discovery gives you time to remediate before the audit clock starts.
  • Keep scan data fresh and timestamped. Currency and completeness are the two attributes Oracle will attack first. Weekly scans, archived with timestamps, neutralise both attacks.
  • Annotate every installation before submission. Purpose, owner, OEM coverage, migration status — every annotation reduces Oracle’s ability to assert maximum exposure.
  • Engage independent licensing counsel early. SAM data alone does not determine licensing obligation. Expert interpretation of the data against Oracle’s licensing rules is what drives the outcome.
  • Start migration immediately if Oracle JDK is found. Every installation migrated during the audit reduces both retroactive claims and forward costs.
“The organisations that face the worst Oracle Java audit outcomes are not always those with the most Oracle Java. They are the ones that handed Oracle control of the data collection process — either by allowing Oracle’s scripts to run, or by submitting raw, unanalysed SAM data without expert review. In an Oracle audit, data is the negotiation.”
📄 Section 8 — Audit Defence Pack

Building Your Java Audit Defence Pack — The Essential Documentation

Beyond SAM tool data, an effective Oracle Java audit defence requires a prepared documentation package that contextualises the data and supports your negotiating position. Assemble this before an audit arrives — not after.

📋

Java Inventory Report

Complete inventory of all Java installations across all environments, with vendor attribution, version, installation path, associated application, business owner, and purpose (production, development, testing, DR). Generated primarily by your SAM tool, supplemented by manual verification and contextual annotations.

🔍

Oracle vs Non-Oracle Differentiation Evidence

For every non-Oracle Java installation, maintain evidence (java -version output screenshots or logs) proving it is not Oracle JDK. This evidence prevents Oracle from claiming that unattributed installations are Oracle by default.

📜

OEM Coverage Register

For every Oracle JDK installation bundled with third-party software, maintain written confirmation from the third-party vendor that their OEM licence with Oracle covers the bundled Java. Keep copies of vendor correspondence and OEM licence terms.

📈

Migration Evidence

If you have migrated or are migrating from Oracle JDK to OpenJDK, maintain dated scan results showing the Oracle JDK count declining over time. Supports arguments for a reduced retroactive period and demonstrates good faith in settlement negotiations.

📂

Contract and Entitlement File

All Oracle contracts, ordering documents, and licence entitlements that may include Java. ULAs, Enterprise Agreements, cloud subscriptions, and historical Java SE licence grants. Understanding your existing entitlements is essential to determining what additional licensing is required.

📱

Alternative Distribution Confirmations

For OpenJDK, Corretto, Azul Zulu, and other non-Oracle distributions, maintain documentation from the distribution provider confirming that their builds are not Oracle Java and carry no Oracle licensing obligation. Vendor statements, distribution licences, and technical documentation all serve this purpose.

DocumentContentsSourceWhen Needed
Java Inventory ReportAll Java installations with vendor, version, path, owner, purposeSAM tool + manual annotationsPre-audit preparation; audit data submission
Vendor Differentiation Evidencejava -version output for non-Oracle installationsScripted collection across environmentTo exclude non-Oracle Java from Oracle’s claim
OEM Coverage RegisterThird-party vendor confirmations of OEM Java licencesVendor correspondenceTo exclude OEM-covered installations from claim
Migration EvidenceDated scan results showing declining Oracle JDK countArchived SAM scan reportsTo support reduced retroactive period arguments
Contract and Entitlement FileAll Oracle agreements with Java provisionsProcurement / legal recordsTo establish baseline entitlements before calculating exposure
Alternative Distribution ConfirmationsVendor statements for OpenJDK, Corretto, Zulu, etc.Distribution vendor correspondenceTo support non-Oracle classification where challenged

🔗 Related Reading

Frequently Asked Questions

Will Oracle accept my SAM tool data instead of running their own LMS scripts? +
Generally yes, if your tool is Oracle-verified for Java SE discovery. Oracle’s policy is to accept data from verified SAM tools as an accurate representation of Java installations in your environment. However, this acceptance is not unconditional. If Oracle identifies gaps in your data (installations you did not report that they can independently evidence), they may challenge the completeness of your SAM data and push to supplement it with their own scripts. The key is ensuring your SAM data is genuinely comprehensive and verifiably complete before submission. An Oracle-verified tool with demonstrable coverage gaps gives Oracle grounds to insist on LMS scripts. A verified tool with documented comprehensive coverage keeps the data collection under your control.
What is the difference between Oracle JDK and OpenJDK for licensing purposes? +
Oracle JDK is the Oracle Corporation build of the Java Development Kit. Any use of Oracle JDK after January 2023 triggers Oracle’s Java SE Universal Subscription requirement, based on total global employee headcount. OpenJDK is a free, open-source implementation of the Java platform specification. Builds of OpenJDK from Eclipse Adoptium (Temurin), Amazon (Corretto), Azul (Zulu), Red Hat, Microsoft, and IBM (Semeru) carry no Oracle licensing obligation whatsoever. These are fully functional, production-grade Java distributions that do not require an Oracle subscription. Your SAM tool must reliably distinguish between these distributions — the vendor string in the java -version output is the definitive indicator. “Java(TM) SE” in the version output indicates Oracle JDK. “OpenJDK” or “Corretto” or “Zulu” indicates a non-Oracle distribution.
Does Oracle audit development and test environments as well as production? +
Yes. Oracle’s Java SE Universal Subscription is based on total global employee count, not on the number of production installations or production servers. There is no development or testing exemption under the standard subscription model. If Oracle JDK is installed anywhere in your environment — including developer workstations, CI/CD build servers, testing environments, or any other non-production context — Oracle’s position is that the employee-based subscription obligation applies to your full global headcount. This is one of the most important and often-overlooked aspects of Oracle Java licensing. Organisations that have carefully removed Oracle JDK from production but left it on developer laptops still face the full employee-based obligation under Oracle’s interpretation. Non-production environments must be in scope for your SAM tool configuration and your migration programme.
Can Oracle retroactively claim licence fees going back to January 2023? +
Yes, and this is standard practice in Oracle Java audits. Oracle’s position is that the Java SE Universal Subscription model applied from January 17, 2023, when it was introduced. Organisations that have been using Oracle JDK since that date without a subscription are considered non-compliant from that point forward. The retroactive claim covers the subscription cost from January 2023 to the date of settlement. For a 10,000-employee organisation at $15 per employee per month, a three-year retroactive period represents approximately $5.4 million. This is negotiable — the retroactive period, the headcount scope, and the settlement structure are all subject to negotiation — but Oracle’s starting position will be maximum retroactive exposure. Dated SAM scan evidence showing when Oracle JDK was removed from your environment is the primary tool for challenging the retroactive period scope.
What should I do if Oracle has already contacted me about a Java audit? +
Do not respond to Oracle directly without first engaging independent licensing counsel. Your first response sets the tone and establishes your legal position for the entire audit. Key immediate actions: acknowledge receipt of Oracle’s communication but do not commit to any timeline, data format, or scope without review; retain independent Oracle Java audit defence advisory (not Oracle’s suggested advisory partners, who have commercial relationships with Oracle); run your SAM tool across all environments immediately to understand your actual exposure before Oracle does; begin migrating Oracle JDK installations to non-Oracle distributions as a parallel programme; and compile your Oracle contract and entitlement documentation. The organisations that accept Oracle’s initial audit terms (data format, timeline, scope) without pushback consistently face worse outcomes than those that negotiate the audit process itself from the outset.
Is Java embedded in third-party software covered by a separate Oracle licence? +
It depends on the specific third-party software and the vendor’s OEM agreement with Oracle. Some software vendors (typically larger middleware and enterprise application providers) have OEM agreements with Oracle that cover the Oracle JDK bundled within their products. When OEM coverage applies, the end customer does not need a separate Oracle Java subscription for that specific Java installation bundled with that specific product. To verify OEM coverage, contact the third-party vendor directly and request written confirmation that their OEM agreement with Oracle covers the bundled Java runtime. Do not assume OEM coverage without written confirmation — Oracle will not accept assumptions, and some vendors that historically had OEM coverage have not renewed those agreements under the new licensing model. Your SAM tool should flag installations associated with third-party applications for separate OEM verification rather than automatically excluding them.
How long does it take to migrate from Oracle JDK to OpenJDK? +
The timeline varies significantly by environment complexity, but most enterprise migrations are achievable in 3–12 months for the majority of installations. Standard Java applications running on Oracle JDK 8, 11, or 17 typically run without modification on equivalent OpenJDK distributions such as Eclipse Temurin or Amazon Corretto. The areas that require most attention are: applications using Oracle-proprietary Java extensions not available in OpenJDK, applications with Oracle Java-specific performance tuning that may behave differently on other JVMs, Oracle-signed applets or components, and applications certified by their vendors specifically against Oracle JDK. For most modern enterprise applications, the migration is largely a package swap and testing exercise rather than a code-level change. Starting migration while an audit is in progress is strongly recommended — every installation removed reduces both the retroactive exposure and the forward subscription commitment, and evidence of active migration improves your negotiating position in settlement discussions.

Facing an Oracle Java Audit?

Whether you’ve received an audit letter or want to prepare your defences before Oracle asks, we provide end-to-end Java audit support: SAM tool configuration review, inventory analysis, vendor differentiation, defence pack assembly, and settlement negotiation.

Book a Free Assessment Java Audit Defence Service →
Subscription Advisory

Vendor Shield

Always prepared. Never outmanoeuvred.

Year-round advisory that keeps you ahead of every Oracle audit, renewal, and commercial move. SAM tool reviews, Java exposure assessments, pre-call briefings, and rapid audit response — all in one fixed-fee subscription.

Learn About Vendor Shield Book a Briefing
SAM Tool Reviews

Verify your Java discovery configuration catches every environment before Oracle does.

Java Exposure Assessment

Know your real Oracle JDK footprint and financial exposure before any audit letter arrives.

Pre-Audit Preparation

Build your defence pack and vendor differentiation evidence while you still control the timeline.

Rapid Audit Response

Expert support the moment Oracle makes contact. Position and data control from day one.

Free Monthly Newsletter

Oracle Java & Licensing Intelligence Delivered to Your Inbox

Java audit trends, OpenJDK migration guidance, Oracle licensing rule changes, and SAM tool updates — written for enterprise IT and procurement leaders, not vendors.

Subscribe Now Free • No spam • Unsubscribe anytime