How do I narrow my search results?
After you submit your search query:
- On the Refine Search results page, select one or more categories of products or services from the left sidebar.
- Then for a category with search results, click Select to choose your product and release filters, and then click OK.
For search queries that contain multiple words, surround the query with quotes, and then resubmit your query. Example: "database cloud service"
How do I find the documentation for my product or service?
From the home page, click the technology categories for your products or services. If you do not know which category to pick, try the following features:
- Click the Find a product tab and search for your product or service.
- Click Browse All Products & Services at the bottom of the home page to view an alphabetical listing of products and services.
- Apple Safari: Version 6
- Google Chrome: Version 29 and later
- Mozilla Firefox: Version 24 and later
- Microsoft Internet Explorer: Version 9 and later
Data Encryption → data encryption and checksumming so that data cannot be read or altered. It protects data from … unauthorized viewing by using the RSA Data Security RC4 or the Data Encryption Standard (DES) encryption
ENCRYPTION → Default: The default value depends upon the combination of encryption-related parameters that are … used. To enable encryption, either the ENCRYPTION or ENCRYPTION_PASSWORD parameter, or both, must be … specified. If only the ENCRYPTION_PASSWORD parameter is specified, then the ENCRYPTION parameter … defaults
ENCRYPTION → file set. Syntax and Description ENCRYPTION=[ENABLED | DISABLED] If ENABLED is specified, then all … export operations. Example In the following example, the ENCRYPTION parameter is set to ENABLED … ORGANIZATION EXTERNAL (TYPE ORACLE_DATAPUMP DEFAULT DIRECTORY def_dir1 ACCESS PARAMETERS (ENCRYPTION ENABLED) LOCATION ('dept.dmp'));
Enabling Transparent Data Encryption → Enabling Trans parent Data Encryption Transparent data encryption is a feature that enables … encryption of individual database columns before storing them in the datafile, or enables encryption of … inside datafiles directly with operating system tools, transparent data encryption prevents such users
Configuring Backup Encryption → For improved security, you can configure backup encryption for RMAN backup sets. Encrypted backups … Edition of the database. About Backup Encryption The V$RMAN_ENCRYPTION_ALGORITHMS view contains a list … of encryption algorithms supported by RMAN. If no encryption algorithm is specified, then the default … encryption
Encryption for Backup Sets → RMAN supports backup encryption for backup sets. You can use wallet-based transparent encryption … , password-based encryption, or both. You can use the CONFIGURE ENCRYPTION command to configure … persistent transparent encryption. Use the SET ENCRYPTION, command at the RMAN session
Encryption Enhancements → This section describes the following enhancements in encryption: Intelligent LOB Compression … , Deduplication, and Encryption with SecureFiles Compressed and Encrypted Dump File Sets Transparent Data … Encryption with Hardware Security Module Integration Transparent Tablespace Encryption
Tablespace Encryption → Tablespace encryption is a new feature introduced in this release. Tablespace encryption enables … encryption eliminates the need for granular analysis of applications to determine which columns to … encrypt. You can use tablespace encryption to encrypt entire tables that might contain sensitive data … . Transparent
About RMAN Backup Encryption Settings → Backup encryption is performed based on the encryption settings specified with the following … commands: CONFIGURE ENCRYPTION You can use this command to persistently configure transparent encryption … . You cannot persistently configure dual mode or password mode encryption. SET ENCRYPTION
Determining the Encryption Status of Backup Pieces → The ENCRYPTED column of V$BACKUP_PIECE and RC_BACKUP_PIECE indicates whether a backup piece is encrypted ( YES ) or unencrypted ( NO ). For example, you can run the following query in SQL*Plus to determine which backup pieces are encrypted: COL BS_REC FORMAT 99999 COL BP_REC FORMAT 99999 COL MB FORMAT 9999999 COL ENCRYPTED FORMAT A7 COL TAG FORMAT A25 SELECT S.RECID AS \"BS_REC\", P.RECID AS \"BP_REC\",
Transparent Tablespace Encryption → Transparent tablespace encryption enables you to encrypt entire application tablespaces, encrypting … tablespace encryption provides an alternative to TDE column encryption: It eliminates the need for … encrypt, then you can continue to use the TDE column encryption solution. For an introduction to … transparent
encryption → Disguising a message, rendering it unreadable to all but the intended recipient.
Overview of Transparent Data Encryption → … Transparent data encryption enables encryption of sensitive data in database columns as it is … encryption keys in a security module external to the database. Using an external security module … separates ordinary program functions from those that pertain to security, such as encryption. Consequently
backup encryption → The encryption of backup sets by using one of the algorithms listed in V$RMAN_ENCRYPTION_ALGORITHMS … are needed in a RESTORE operation. RMAN offers three modes of encryption: transparent, password-protected, and dual-mode.
Effects of Compression and Encryption on Performance → The use of Data Pump parameters related to compression and encryption can possibly have a negative
8 Developing Applications Using the Data Encryption API → Go to main content 15/19 8 Developing Applications Using the Data Encryption API This chapter … contains: Security Problems That Encryption Does Not Solve Data Encryption Challenges Storing Data … Encryption by Using the DBMS_CRYPTO Package Examples of Using the Data Encryption API Finding Information
Using SecureFile Encryption → SecureFile encryption introduces a new encryption facility for LOB data and extends Transparent … Data Encryption by enabling efficient random read and write access to the of the encrypted SecureFile.
Transparent Data Encryption with Hardware Security Module Integration → Transparent data encryption (TDE) stores the master key in an encrypted software wallet and uses … the TDE master encryption key within a hardware security module (HSM) at all times, leveraging its … key management capabilities. Only the table keys (for TDE column encryption) and tablespace keys (for … TDE tablespace encryption)
Intelligent LOB Compression, Deduplication, and Encryption with SecureFiles → (that is, coalescing duplicate data), and encryption. LOB data can now be encrypted with Oracle
Queues and Transparent Data Encryption → encryption. The row LCRs remain encrypted while they are stored in the persistent queue. Explicitly … encrypted using transparent data encryption. When row LCRs with encrypted columns are stored in buffered … columns transparently, the encryption master key must be stored in the wallet on the local database … SYSTEM SET ENCRYPTION