You are using an outdated browser. Please upgrade to the latest version for the best experience.
How do I narrow my search results?

After you submit your search query:

  1. On the Refine Search results page, select one or more categories of products or services from the left sidebar.
  2. Then for a category with search results, click Select to choose your product and release filters, and then click OK.

For search queries that contain multiple words, surround the query with quotes, and then resubmit your query. Example: "database cloud service"

How do I find the documentation for my product or service?

From the home page, click the technology categories for your products or services. If you do not know which category to pick, try the following features:

  • Click the Find a product tab and search for your product or service.
  • Click Browse All Products & Services at the bottom of the home page to view an alphabetical listing of products and services.
  • Apple Safari: Version 6
  • Google Chrome: Version 29 and later
  • Mozilla Firefox: Version 24 and later
  • Microsoft Internet Explorer: Version 9 and later
Results for encryption


1 to 20 of 1223 results. Previous page Prev  Next next page
Results per page:   20  | 40 | 60


Database Concepts, 12c Release 1 (12.1)

Topics for Database Administrators and Developers

EncryptionOracle Database encryption is the process of transforming data into an unreadable format using a … secret key and an encryption algorithm. Encryption is often used to meet regulatory compliance

Automatic Storage Management Administrator's Guide, 12c Release 1 (12.1)

Viewing Encryption Status

Viewing Encryption StatusTo view encryption status, follow these steps: From the Oracle ASM home page, select the ASM … Management Home Page \". Click Show Security and Encryption to display the Security and Encryption … section. The section displays the mount points and the security and encryption settings for each.

Automatic Storage Management Administrator's Guide, 12c Release 1 (12.1)

Initializing Oracle ACFS Encryption

Initializing Oracle ACFS EncryptionTo initialize Oracle ACFS encryption, follow these steps: From the Oracle ASM home page, select the … Storage Management Home Page \". Click a mount point in the list. Click the Security/Encryption tab … to display the Security and Encryption section. In the Encryption Configuration section, you can … specify

Automatic Storage Management Administrator's Guide, 12c Release 1 (12.1)

Oracle ACFS Encryption

Oracle ACFS EncryptionOracle ACFS encryption enables you to encrypt data stored on disk (data-at-rest). The encryption … same Oracle ACFS file system. Some encryption functionality requires system administrator privileges … . This functionality incudes the commands for initiating, setting, and reconfiguring encryption. System … administrators

Database Utilities, 12c Release 1 (12.1)

ENCRYPTION

ENCRYPTIONset. Syntax and Description ENCRYPTION [ENABLED | DISABLED] If ENABLED is specified, then all data is … operations. Example In the following example, the ENCRYPTION parameter is set to ENABLED. Therefore, all … EXTERNAL (TYPE ORACLE_DATAPUMP DEFAULT DIRECTORY def_dir1 ACCESS PARAMETERS (ENCRYPTION ENABLED) LOCATION ('dept.dmp'));

Database Administrator's Guide, 12c Release 1 (12.1)

Creating and Configuring an Oracle Database

2.9.2 Transparent Data EncryptionTransparent Data Encryption is a feature that enables encryption of individual database columns … before storing them in the data file, or enables encryption of entire tablespaces. If users attempt to … operating system tools, Transparent Data Encryption prevents such users from viewing sensitive information

Database Concepts, 12c Release 1 (12.1)

Glossary

encryptionThe process of transforming data into an unreadable format using a secret key and an encryption algorithm.

Automatic Storage Management Administrator's Guide, 12c Release 1 (12.1)

Using Replication with Auditing, Encryption, and Security

Using Replication with Auditing, Encryption, and Securitythe same auditing, security, or encryption policies as the primary file system. For this replicated … successful replication, the standby file system must be a generic file system without auditing, encryption … security or encryption and then had security or encryption removed. Additional conditions that must

Automatic Storage Management Administrator's Guide, 12c Release 1 (12.1)

Oracle ACFS Command-Line Tools for Encryption

Oracle ACFS Command-Line Tools for EncryptionTable 16-77 contains a summary of the commands for Oracle ACFS encryption. For an overview of … Oracle ACFS encryption, refer to \" Oracle ACFS Encryption \". You can run acfsutil help on all platforms … for Oracle ACFS encryption Command Description acfsutil encr info Displays encryption-related

Automatic Storage Management Administrator's Guide, 12c Release 1 (12.1)

Managing Encryption Features with Oracle Enterprise Manager

Managing Encryption Features with Oracle Enterprise ManagerThis section describes how to manage encryption with Oracle Enterprise Manager. Initializing Oracle … ACFS Encryption Enabling_ Disabling_ and Setting Parameters for Encryption On an Oracle ACFS … Viewing Encryption Status For more information about Oracle ACFS encryption, refer to \" Oracle ACFS Encryption

Database Backup and Recovery User's Guide, 12c Release 1 (12.1)

Configuring the RMAN Environment: Advanced Topics

Configuring Backup EncryptionFor improved security, you can configure backup encryption for RMAN backup sets. Encrypted backups … topics: About Backup Encryption Configuring RMAN Backup Encryption Modes Configuring the Backup Encryption Algorithm

Automatic Storage Management Administrator's Guide, 12c Release 1 (12.1)

Managing Security and Encryption for Oracle ACFS with ASMCA

Managing Security and Encryption for Oracle ACFS with ASMCAOracle ASM Configuration Assistant enables you to configure security and encryption for an Oracle … Security and Encryption Dialog Description of \"Figure 14-5 Oracle ASM Configuration Assistant … Configure Security and Encryption Dialog\" You must initialize the security system as the first step in … configuring security for

Database 2 Day DBA, 12c Release 1 (12.1)

About Table Column Attributes

8.4.1.2.4 EncryptionYou can enable automatic encryption for column data. See the discussion of Transparent Data … Encryption in Oracle Database 2 Day + Security Guide for more information.

Database Backup and Recovery User's Guide, 12c Release 1 (12.1)

Backing Up the Database: Advanced Topics

About RMAN Backup Encryption SettingsBackup encryption is performed based on the encryption settings specified with the following … commands: CONFIGURE ENCRYPTION You can use this command to persistently configure transparent encryption … . You cannot persistently configure dual mode or password mode encryption. SET ENCRYPTION

Automatic Storage Management Administrator's Guide, 12c Release 1 (12.1)

Enabling, Disabling, and Setting Parameters for Encryption On an Oracle ACFS

Enabling, Disabling, and Setting Parameters for Encryption On an Oracle ACFSTo enable, disable, or set parameters for Oracle ACFS encryption, follow these steps: From the … page is displayed for this mount point. Click the Security/Encryption tab. Click Encryption … Configuration link to display the Encryption configuration section.

Database Backup and Recovery User's Guide, 12c Release 1 (12.1)

Reporting on RMAN Operations

Determining the Encryption Status of Backup PiecesThe ENCRYPTED column of the V$BACKUP_PIECE and V$RMAN_BACKUP_PIECE views indicates whether a backup piece is encrypted ( YES ) or unencrypted ( NO ). For example, you can run the following query in SQL*Plus to determine which backup pieces are encrypted: COL BS_REC FORMAT 99999 COL BP_REC FORMAT 99999 COL MB FORMAT 9999999 COL ENCRYPTED FORMAT A7 COL TAG FORMAT A25 SELECT S.RECID AS \"BS_REC\", P.RECID

Database Backup and Recovery User's Guide, 12c Release 1 (12.1)

RMAN Backup Concepts

About Encryption for RMAN Backup SetsRMAN supports backup encryption for backup sets. You can use keystore-based transparent encryption … , password-based encryption, or both. You can use the CONFIGURE ENCRYPTION command to configure … persistent transparent encryption. Use the SET ENCRYPTION command at the RMAN session

Database Concepts, 12c Release 1 (12.1)

Glossary

network encryptionEncrypting data as it travels across the network between a client and server.

Database Security Guide, 12c Release 1 (12.1)

Manually Encrypting Data

Data Encryption ChallengesIn cases where encryption can provide additional security, there are some associated technical … challenges. Topics: Encrypted Indexed Data Generated Encryption Keys Transmitted Encryption Keys Storing … Encryption Keys Importance of Changing Encryption Keys Encryption of Binary Large

Database Security Guide, 12c Release 1 (12.1)

Manually Encrypting Data

Storing Encryption KeysYou can store encryption keys in the database or on an operating system. Topics: About Storing … Encryption Keys Storage of Encryption Keys in the Database Storage of Encryption Keys in the Operating … System Users Managing Their Own Encryption Keys Manual Encryption with Transparent