How do I narrow my search results?
After you submit your search query:
- On the Refine Search results page, select one or more categories of products or services from the left sidebar.
- Then for a category with search results, click Select to choose your product and release filters, and then click OK.
For search queries that contain multiple words, surround the query with quotes, and then resubmit your query. Example: "database cloud service"
How do I find the documentation for my product or service?
From the home page, click the technology categories for your products or services. If you do not know which category to pick, try the following features:
- Click the Find a product tab and search for your product or service.
- Click Browse All Products & Services at the bottom of the home page to view an alphabetical listing of products and services.
- Apple Safari: Version 6
- Google Chrome: Version 29 and later
- Mozilla Firefox: Version 24 and later
- Microsoft Internet Explorer: Version 9 and later
Encryption → Oracle Database encryption is the process of transforming data into an unreadable format using a … secret key and an encryption algorithm. Encryption is often used to meet regulatory compliance
Viewing Encryption Status → To view encryption status, follow these steps: From the Oracle ASM home page, select the ASM … Management Home Page \". Click Show Security and Encryption to display the Security and Encryption … section. The section displays the mount points and the security and encryption settings for each.
Initializing Oracle ACFS Encryption → To initialize Oracle ACFS encryption, follow these steps: From the Oracle ASM home page, select the … Storage Management Home Page \". Click a mount point in the list. Click the Security/Encryption tab … to display the Security and Encryption section. In the Encryption Configuration section, you can … specify
Oracle ACFS Encryption → Oracle ACFS encryption enables you to encrypt data stored on disk (data-at-rest). The encryption … same Oracle ACFS file system. Some encryption functionality requires system administrator privileges … . This functionality incudes the commands for initiating, setting, and reconfiguring encryption. System … administrators
ENCRYPTION → set. Syntax and Description ENCRYPTION [ENABLED | DISABLED] If ENABLED is specified, then all data is … operations. Example In the following example, the ENCRYPTION parameter is set to ENABLED. Therefore, all … EXTERNAL (TYPE ORACLE_DATAPUMP DEFAULT DIRECTORY def_dir1 ACCESS PARAMETERS (ENCRYPTION ENABLED) LOCATION ('dept.dmp'));
2.9.2 Transparent Data Encryption → Transparent Data Encryption is a feature that enables encryption of individual database columns … before storing them in the data file, or enables encryption of entire tablespaces. If users attempt to … operating system tools, Transparent Data Encryption prevents such users from viewing sensitive information
encryption → The process of transforming data into an unreadable format using a secret key and an encryption algorithm.
Using Replication with Auditing, Encryption, and Security → the same auditing, security, or encryption policies as the primary file system. For this replicated … successful replication, the standby file system must be a generic file system without auditing, encryption … security or encryption and then had security or encryption removed. Additional conditions that must
Oracle ACFS Command-Line Tools for Encryption → Table 16-77 contains a summary of the commands for Oracle ACFS encryption. For an overview of … Oracle ACFS encryption, refer to \" Oracle ACFS Encryption \". You can run acfsutil help on all platforms … for Oracle ACFS encryption Command Description acfsutil encr info Displays encryption-related
Managing Encryption Features with Oracle Enterprise Manager → This section describes how to manage encryption with Oracle Enterprise Manager. Initializing Oracle … ACFS Encryption Enabling_ Disabling_ and Setting Parameters for Encryption On an Oracle ACFS … Viewing Encryption Status For more information about Oracle ACFS encryption, refer to \" Oracle ACFS Encryption
Configuring Backup Encryption → For improved security, you can configure backup encryption for RMAN backup sets. Encrypted backups … topics: About Backup Encryption Configuring RMAN Backup Encryption Modes Configuring the Backup Encryption Algorithm
Managing Security and Encryption for Oracle ACFS with ASMCA → Oracle ASM Configuration Assistant enables you to configure security and encryption for an Oracle … Security and Encryption Dialog Description of \"Figure 14-5 Oracle ASM Configuration Assistant … Configure Security and Encryption Dialog\" You must initialize the security system as the first step in … configuring security for
22.214.171.124.4 Encryption → You can enable automatic encryption for column data. See the discussion of Transparent Data … Encryption in Oracle Database 2 Day + Security Guide for more information.
About RMAN Backup Encryption Settings → Backup encryption is performed based on the encryption settings specified with the following … commands: CONFIGURE ENCRYPTION You can use this command to persistently configure transparent encryption … . You cannot persistently configure dual mode or password mode encryption. SET ENCRYPTION
Enabling, Disabling, and Setting Parameters for Encryption On an Oracle ACFS → To enable, disable, or set parameters for Oracle ACFS encryption, follow these steps: From the … page is displayed for this mount point. Click the Security/Encryption tab. Click Encryption … Configuration link to display the Encryption configuration section.
Determining the Encryption Status of Backup Pieces → The ENCRYPTED column of the V$BACKUP_PIECE and V$RMAN_BACKUP_PIECE views indicates whether a backup piece is encrypted ( YES ) or unencrypted ( NO ). For example, you can run the following query in SQL*Plus to determine which backup pieces are encrypted: COL BS_REC FORMAT 99999 COL BP_REC FORMAT 99999 COL MB FORMAT 9999999 COL ENCRYPTED FORMAT A7 COL TAG FORMAT A25 SELECT S.RECID AS \"BS_REC\", P.RECID
About Encryption for RMAN Backup Sets → RMAN supports backup encryption for backup sets. You can use keystore-based transparent encryption … , password-based encryption, or both. You can use the CONFIGURE ENCRYPTION command to configure … persistent transparent encryption. Use the SET ENCRYPTION command at the RMAN session
network encryption → Encrypting data as it travels across the network between a client and server.
Data Encryption Challenges → In cases where encryption can provide additional security, there are some associated technical … challenges. Topics: Encrypted Indexed Data Generated Encryption Keys Transmitted Encryption Keys Storing … Encryption Keys Importance of Changing Encryption Keys Encryption of Binary Large
Storing Encryption Keys → You can store encryption keys in the database or on an operating system. Topics: About Storing … Encryption Keys Storage of Encryption Keys in the Database Storage of Encryption Keys in the Operating … System Users Managing Their Own Encryption Keys Manual Encryption with Transparent