How do I narrow my search results?
After you submit your search query:
- On the Refine Search results page, select one or more categories of products or services from the left sidebar.
- Then for a category with search results, click Select to choose your product and release filters, and then click OK.
For search queries that contain multiple words, surround the query with quotes, and then resubmit your query. Example: "database cloud service"
How do I find the documentation for my product or service?
From the home page, click the technology categories for your products or services. If you do not know which category to pick, try the following features:
- Click the Find a product tab and search for your product or service.
- Click Browse All Products & Services at the bottom of the home page to view an alphabetical listing of products and services.
- Apple Safari: Version 6
- Google Chrome: Version 29 and later
- Mozilla Firefox: Version 24 and later
- Microsoft Internet Explorer: Version 9 and later
Data Encryption → data encryption and checksumming so that data cannot be read or altered. It protects data from … unauthorized viewing by using the RSA Data Security RC4 or the Data Encryption Standard (DES) encryption
ENCRYPTION → Default: The default value depends upon the combination of encryption-related parameters that are … used. To enable encryption, either the ENCRYPTION or ENCRYPTION_PASSWORD parameter, or both, must be … specified. If only the ENCRYPTION_PASSWORD parameter is specified, then the ENCRYPTION parameter … defaults
ENCRYPTION → file set. Syntax and Description ENCRYPTION=[ENABLED | DISABLED] If ENABLED is specified, then all … export operations. Example In the following example, the ENCRYPTION parameter is set to ENABLED … ORGANIZATION EXTERNAL (TYPE ORACLE_DATAPUMP DEFAULT DIRECTORY def_dir1 ACCESS PARAMETERS (ENCRYPTION ENABLED) LOCATION ('dept.dmp'));
Enabling Transparent Data Encryption → Enabling Trans parent Data Encryption Transparent data encryption is a feature that enables … encryption of individual database columns before storing them in the datafile, or enables encryption of … inside datafiles directly with operating system tools, transparent data encryption prevents such users
Configuring Backup Encryption → For improved security, you can configure backup encryption for RMAN backup sets. Encrypted backups … Edition of the database. About Backup Encryption The V$RMAN_ENCRYPTION_ALGORITHMS view contains a list … of encryption algorithms supported by RMAN. If no encryption algorithm is specified, then the default … encryption
Encryption for Backup Sets → RMAN supports backup encryption for backup sets. You can use wallet-based transparent encryption … , password-based encryption, or both. You can use the CONFIGURE ENCRYPTION command to configure … persistent transparent encryption. Use the SET ENCRYPTION, command at the RMAN session
Encryption Enhancements → This section describes the following enhancements in encryption: Intelligent LOB Compression … , Deduplication, and Encryption with SecureFiles Compressed and Encrypted Dump File Sets Transparent Data … Encryption with Hardware Security Module Integration Transparent Tablespace Encryption
Tablespace Encryption → Tablespace encryption is a new feature introduced in this release. Tablespace encryption enables … encryption eliminates the need for granular analysis of applications to determine which columns to … encrypt. You can use tablespace encryption to encrypt entire tables that might contain sensitive data … . Transparent
About RMAN Backup Encryption Settings → Backup encryption is performed based on the encryption settings specified with the following … commands: CONFIGURE ENCRYPTION You can use this command to persistently configure transparent encryption … . You cannot persistently configure dual mode or password mode encryption. SET ENCRYPTION
Determining the Encryption Status of Backup Pieces → The ENCRYPTED column of V$BACKUP_PIECE and RC_BACKUP_PIECE indicates whether a backup piece is encrypted ( YES ) or unencrypted ( NO ). For example, you can run the following query in SQL*Plus to determine which backup pieces are encrypted: COL BS_REC FORMAT 99999 COL BP_REC FORMAT 99999 COL MB FORMAT 9999999 COL ENCRYPTED FORMAT A7 COL TAG FORMAT A25 SELECT S.RECID AS \"BS_REC\", P.RECID AS \"BP_REC\",
Transparent Tablespace Encryption → Transparent tablespace encryption enables you to encrypt entire application tablespaces, encrypting … tablespace encryption provides an alternative to TDE column encryption: It eliminates the need for … encrypt, then you can continue to use the TDE column encryption solution. For an introduction to … transparent
encryption → Disguising a message, rendering it unreadable to all but the intended recipient.
Overview of Transparent Data Encryption → … Transparent data encryption enables encryption of sensitive data in database columns as it is … encryption keys in a security module external to the database. Using an external security module … separates ordinary program functions from those that pertain to security, such as encryption. Consequently
backup encryption → The encryption of backup sets by using one of the algorithms listed in V$RMAN_ENCRYPTION_ALGORITHMS … are needed in a RESTORE operation. RMAN offers three modes of encryption: transparent, password-protected, and dual-mode.
Effects of Compression and Encryption on Performance → The use of Data Pump parameters related to compression and encryption can possibly have a negative
8 Developing Applications Using the Data Encryption API → Go to main content 15/19 8 Developing Applications Using the Data Encryption API This chapter … contains: Security Problems That Encryption Does Not Solve Data Encryption Challenges Storing Data … Encryption by Using the DBMS_CRYPTO Package Examples of Using the Data Encryption API Finding Information
Using SecureFile Encryption → SecureFile encryption introduces a new encryption facility for LOB data and extends Transparent … Data Encryption by enabling efficient random read and write access to the of the encrypted SecureFile.
Transparent Data Encryption with Hardware Security Module Integration → Transparent data encryption (TDE) stores the master key in an encrypted software wallet and uses … the TDE master encryption key within a hardware security module (HSM) at all times, leveraging its … key management capabilities. Only the table keys (for TDE column encryption) and tablespace keys (for … TDE tablespace encryption)
Intelligent LOB Compression, Deduplication, and Encryption with SecureFiles → (that is, coalescing duplicate data), and encryption. LOB data can now be encrypted with Oracle
Queues and Transparent Data Encryption → encryption. The row LCRs remain encrypted while they are stored in the persistent queue. Explicitly … encrypted using transparent data encryption. When row LCRs with encrypted columns are stored in buffered … columns transparently, the encryption master key must be stored in the wallet on the local database … SYSTEM SET ENCRYPTION
Propagations and Transparent Data Encryption → that were encrypted using transparent data encryption. When a propagation propagates row LCRs with … about configuring network data encryption \"Message Propagation Between Queues\"
SecureFile Compression, Encryption, and Deduplication → This feature is thoroughly described in the Oracle Database SecureFiles and Large Objects Developer's Guide. Information specific to OCCI is in section \"Using SecureFiles\" of Chapter 7, \"Programming with LOBs\". Section \"SecureFile LOB Types and Constants\" describes the new LOB attributes, while Chapter 13, \"OCCI Application Programming Interface\" documents the new and changed APIs for the
Synchronous Capture and Transparent Data Encryption → data encryption. Encrypted columns in row logical change records (row LCRs) captured by a synchronous
Manual Dequeue and Transparent Data Encryption → transparent data encryption. When row LCRs with encrypted columns are dequeued, the encrypted
9.3.8 Reset the TDE Master Encryption Key → The database encryption wallet on a physical standby database must be replaced with a fresh copy of … the database encryption wallet from the primary database whenever the TDE master encryption key is … reset on the primary database. Failure to refresh the database encryption wallet on the physical … modified
Messaging Clients and Transparent Data Encryption → transparent data encryption. When row LCRs with encrypted columns are dequeued by a messaging client
C.3 Support for Tablespace Encryption → tablespace encryption enabled. In such a case, restrictions 1, 2, and 3 listed in Section C.2, \"Support … for Transparent Data Encryption (TDE)\" will apply. Note: In some cases, when SQL Apply mines and
Oracle Streams and Transparent Data Encryption → The following topics describe how Oracle Streams works with Transparent Data Encryption: Capture … Processes and Transparent Data Encryption Synchronous Capture and Transparent Data Encryption Explicit … Capture and Transparent Data Encryption Queues and Transparent Data Encryption Propagations and
Capture Processes and Transparent Data Encryption → data encryption. A downstream capture process can capture changes to columns that have been encrypted … operations on the wallet at the downstream database, such as changing the encryption key for a replicated … disk in a database with transparent data encryption enabled, then Oracle Streams transparently
Apply Processes and Transparent Data Encryption → ) that contain columns encrypted using transparent data encryption. When row LCRs with encrypted
Oracle Streams Support for Transparent Data Encryption → encrypted using transparent data encryption. Oracle Streams supports columns that were encrypted at the … column level or through tablespace encryption. Tablespace encryption enables you to encrypt an … due to column encryption or tablespace encryption, Oracle Streams components handle the column data
Combining SecureFile Compression, Encryption, and Deduplication → You are allowed to combine compression, encryption and deduplication in any combination. Oracle … , will be performed before compression and encryption. This prevents the potentially unnecessary and … expensive compression and encryption operations on SecureFiles that are already stored in a column … . Compression will be performed
Explicit Capture and Transparent Data Encryption → You can use explicit capture to construct and enqueue row logical change records (row LCRs) for columns that are encrypted in database tables. However, you cannot specify that columns are encrypted when you construct the row LCRs. Therefore, when explicitly captured row LCRs are staged in a queue, all of the columns in the row LCRs are decrypted. See Also: \"Explicit Capture by Applications\"
C.2 Support for Transparent Data Encryption (TDE) → Data Encryption (TDE) enabled. Consider the following when using a logical standby database to … Data Encryption using server held keys are supported in the context of a logical standby database when … . Transparent Data Encryption in the context of Hardware Security Modules is not supported in the … the Transparent Data Encryption
Encrypting RMAN Backups → As explained in \"Configuring Backup Encryption\", you can protect RMAN backup sets with backup … encryption. Encrypted backups cannot be read if they are obtained by unauthorized users. The RMAN … backup encryption feature requires the Enterprise Edition of the database.
Consider Encrypting Columns That Contain Sensitive Data → include social security numbers, credit card numbers, and medical records. Column encryption is … transparent to your applications, with some restrictions. Although encryption is not meant to solve all … encryption uses the transparent data encryption feature of Oracle Database, which requires that you … create
Making Password-Mode Encrypted Backups → You can set an encryption password in an RMAN session by executing the SET ENCRYPTION BY PASSWORD … command. If transparent encryption is configured, then specify the ONLY keyword to indicate that the … backups should be protected with a password and not with the configured transparent encryption. Note … used).
Making Transparent-Mode Encrypted Backups → If you have configured transparent encryption with the CONFIGURE command as explained in … \"Configuring RMAN Backup Encryption Modes\", then no additional commands are required to make encrypted backups. Make RMAN backups as normal.
Encrypted Tablespaces → You can encrypt any permanent tablespace to protect sensitive data. Tablespace encryption is … database and access database files directly through the operating system file system. Tablespace encryption … tablespace, all tablespace blocks are encrypted. All segment types are supported for encryption … on. Note: There is no need
4.1.2 Advanced Encryption Standard → In this release, the new Federal Information Processing Standard (FIPS) encryption algorithm … , Advanced Encryption Standard (AES), is supported. AES can be used by all U.S. government organizations … and businesses to protect sensitive data over a network. This encryption algorithm defines three