检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
The server parameters in OPTIONS are as follows: encrypt Specifies whether to encrypt data. This parameter can be set only when type is set to OBS. The default value is off.
The server parameters in OPTIONS are as follows: encrypt Specifies whether to encrypt data. This parameter can be set only when type is set to OBS. The default value is off.
Options for modifying a server are as follows: encrypt Specifies whether to encrypt data. This parameter can be set only when type is set to OBS. The default value is off.
Introduction to Sensitive Operation Protection SSL You can use SSL to encrypt the connection between GaussDB and the client. It ensures the privacy, authentication, and integrity of Internet communications.
Can I Encrypt the Disk After Purchasing a GaussDB Instance? Will Backups Be Encrypted After Disk Encryption Is Enabled for My GaussDB Instance? Will Different GaussDB Instances Share CPU and Memory Resources? How Many Databases Can Run on a GaussDB Instance?
It must comply with the naming convention. client_master_key_name Specifies the CMK used to encrypt the CEK. The value is the CMK name, which is created using the CREATE CLIENT MASTER KEY syntax. The encrypted CMKs are different from those specified before RR encryption.
It must comply with the naming convention. client_master_key_name Specifies the CMK used to encrypt the CEK. The value is the CMK name, which is created using the CREATE CLIENT MASTER KEY syntax. The encrypted CMKs are different from those specified before RR encryption.
It must comply with the naming convention. client_master_key_name Specifies the CMK used to encrypt the CEK. The value is the CMK name, which is created using the CREATE CLIENT MASTER KEY syntax. The encrypted CMKs are different from those specified before RR encryption.
It must comply with the naming convention. client_master_key_name Specifies the CMK used to encrypt the CEK. The value is the CMK name, which is created using the CREATE CLIENT MASTER KEY syntax. The encrypted CMKs are different from those specified before RR encryption.
An encrypted database encrypts data of encrypted columns in the SQL syntax in the driver and decrypts the query result of the encrypted columns returned from the database server. Column key: Data is encrypted by using column keys.
The CMK of the database instance is used to encrypt the DEK. When the DEK needs to be decrypted, a request packet needs to be sent to KMS. The DEK ciphertext and the ID of the corresponding CMK are sent to KMS. This parameter is a SIGHUP parameter.
The CMK of the cluster is used to encrypt the DEK. When the DEK needs to be decrypted, a request packet needs to be sent to KMS. The DEK ciphertext and the ID of the corresponding CMK are sent to KMS. This parameter is a SIGHUP parameter.
Table 1 SQL statements for defining a CMK Function SQL Statement Creating a CMK CREATE CLIENT MASTER KEY Deleting a CMK DROP CLIENT MASTER KEY Defining a CEK CEKs are used to encrypt data for the encrypted database feature.
The detailed parameter description is as follows: encrypt Specifies whether data is encrypted. This parameter is available only when type is OBS. The default value is on.
Currently, SSL settings, encrypted databases, and certificate authentication are not supported. If no IP address is specified, this parameter is left empty by default. port: specifies the port number for connection.
The detailed parameter description is as follows: encrypt Specifies whether data is encrypted. This parameter is available only when type is OBS. The default value is on.
The detailed parameter description is as follows: encrypt Specifies whether data is encrypted. This parameter is available only when type is OBS. The default value is on.
Defining a CMK CMKs are used to encrypt CEKs for the encrypted database feature. CMK definition includes creating and deleting a CMK. For details about related SQL statements, see Table 1.
CMKs are used to encrypt column encryption keys (CEKs) for the encrypted database feature. CMK definition includes creating and deleting a CMK. For details about related SQL statements, see Table 1.
Table 1 SQL statements for defining a CMK Function SQL Statement Creating a CMK CREATE CLIENT MASTER KEY Deleting a CMK DROP CLIENT MASTER KEY Defining a CEK CEKs are used to encrypt data for the encrypted database feature.