You are using an outdated browser. Please upgrade to the latest version for the best experience.
How do I narrow my search results?

After you submit your search query:

  1. On the Refine Search results page, select one or more categories of products or services from the left sidebar.
  2. Then for a category with search results, click Select to choose your product and release filters, and then click OK.

For search queries that contain multiple words, surround the query with quotes, and then resubmit your query. Example: "database cloud service"

How do I find the documentation for my product or service?

From the home page, click the technology categories for your products or services. If you do not know which category to pick, try the following features:

  • Click the Find a product tab and search for your product or service.
  • Click Browse All Products & Services at the bottom of the home page to view an alphabetical listing of products and services.
  • Apple Safari: Version 6
  • Google Chrome: Version 29 and later
  • Mozilla Firefox: Version 24 and later
  • Microsoft Internet Explorer: Version 9 and later
Results for encryption


21 to 40 of 677 results. previous page Prev  Next next page
Results per page:   20  | 40 | 60


Streams Concepts and Administration, 11g Release 1 (11.1)

How Oracle Streams Works With Other Database Components

Propagations and Transparent Data Encryptionthat were encrypted using transparent data encryption. When a propagation propagates row LCRs with … about configuring network data encryption \"Message Propagation Between Queues\"

Oracle C++ Call Interface Programmer's Guide, 11g Release 1 (11.1)

What's New in Oracle C++ Call lnterface?

SecureFile Compression, Encryption, and DeduplicationThis feature is thoroughly described in the Oracle Database SecureFiles and Large Objects Developer's Guide. Information specific to OCCI is in section \"Using SecureFiles\" of Chapter 7, \"Programming with LOBs\". Section \"SecureFile LOB Types and Constants\" describes the new LOB attributes, while Chapter 13, \"OCCI Application Programming Interface\" documents the new and changed APIs for the

Streams Concepts and Administration, 11g Release 1 (11.1)

How Oracle Streams Works With Other Database Components

Synchronous Capture and Transparent Data Encryptiondata encryption. Encrypted columns in row logical change records (row LCRs) captured by a synchronous

Streams Concepts and Administration, 11g Release 1 (11.1)

How Oracle Streams Works With Other Database Components

Manual Dequeue and Transparent Data Encryptiontransparent data encryption. When row LCRs with encrypted columns are dequeued, the encrypted

Data Guard Concepts and Administration, 11g Release 1 (11.1)

Managing Physical and Snapshot Standby Databases

9.3.8 Reset the TDE Master Encryption KeyThe database encryption wallet on a physical standby database must be replaced with a fresh copy of … the database encryption wallet from the primary database whenever the TDE master encryption key is … reset on the primary database. Failure to refresh the database encryption wallet on the physical … modified

Streams Concepts and Administration, 11g Release 1 (11.1)

How Oracle Streams Works With Other Database Components

Messaging Clients and Transparent Data Encryptiontransparent data encryption. When row LCRs with encrypted columns are dequeued by a messaging client

Data Guard Concepts and Administration, 11g Release 1 (11.1)

Data Type and DDL Support on a Logical Standby Database

C.3 Support for Tablespace Encryptiontablespace encryption enabled. In such a case, restrictions 1, 2, and 3 listed in Section C.2, \"Support … for Transparent Data Encryption (TDE)\" will apply. Note: In some cases, when SQL Apply mines and

Streams Concepts and Administration, 11g Release 1 (11.1)

How Oracle Streams Works With Other Database Components

Oracle Streams and Transparent Data EncryptionThe following topics describe how Oracle Streams works with Transparent Data Encryption: Capture … Processes and Transparent Data Encryption Synchronous Capture and Transparent Data Encryption Explicit … Capture and Transparent Data Encryption Queues and Transparent Data Encryption Propagations and

Streams Concepts and Administration, 11g Release 1 (11.1)

How Oracle Streams Works With Other Database Components

Capture Processes and Transparent Data Encryptiondata encryption. A downstream capture process can capture changes to columns that have been encrypted … operations on the wallet at the downstream database, such as changing the encryption key for a replicated … disk in a database with transparent data encryption enabled, then Oracle Streams transparently

Streams Concepts and Administration, 11g Release 1 (11.1)

How Oracle Streams Works With Other Database Components

Apply Processes and Transparent Data Encryption) that contain columns encrypted using transparent data encryption. When row LCRs with encrypted

Streams Concepts and Administration, 11g Release 1 (11.1)

What's New in Oracle Streams?

Oracle Streams Support for Transparent Data Encryptionencrypted using transparent data encryption. Oracle Streams supports columns that were encrypted at the … column level or through tablespace encryption. Tablespace encryption enables you to encrypt an … due to column encryption or tablespace encryption, Oracle Streams components handle the column data

Oracle C++ Call Interface Programmer's Guide, 11g Release 1 (11.1)

Programming with LOBs

Combining SecureFile Compression, Encryption, and DeduplicationYou are allowed to combine compression, encryption and deduplication in any combination. Oracle … , will be performed before compression and encryption. This prevents the potentially unnecessary and … expensive compression and encryption operations on SecureFiles that are already stored in a column … . Compression will be performed

Streams Concepts and Administration, 11g Release 1 (11.1)

How Oracle Streams Works With Other Database Components

Explicit Capture and Transparent Data EncryptionYou can use explicit capture to construct and enqueue row logical change records (row LCRs) for columns that are encrypted in database tables. However, you cannot specify that columns are encrypted when you construct the row LCRs. Therefore, when explicitly captured row LCRs are staged in a queue, all of the columns in the row LCRs are decrypted. See Also: \"Explicit Capture by Applications\"

Data Guard Concepts and Administration, 11g Release 1 (11.1)

Data Type and DDL Support on a Logical Standby Database

C.2 Support for Transparent Data Encryption (TDE)Data Encryption (TDE) enabled. Consider the following when using a logical standby database to … Data Encryption using server held keys are supported in the context of a logical standby database when … . Transparent Data Encryption in the context of Hardware Security Modules is not supported in the … the Transparent Data Encryption

Database Backup and Recovery User's Guide, 11g Release 1 (11.1)

Backing Up the Database: Advanced Topics

Encrypting RMAN BackupsAs explained in \"Configuring Backup Encryption\", you can protect RMAN backup sets with backup … encryption. Encrypted backups cannot be read if they are obtained by unauthorized users. The RMAN … backup encryption feature requires the Enterprise Edition of the database.

Database Administrator's Guide, 11g Release 1 (11.1)

Guidelines for Managing Tables

Consider Encrypting Columns That Contain Sensitive Datainclude social security numbers, credit card numbers, and medical records. Column encryption is … transparent to your applications, with some restrictions. Although encryption is not meant to solve all … encryption uses the transparent data encryption feature of Oracle Database, which requires that you … create

Database Backup and Recovery User's Guide, 11g Release 1 (11.1)

Backing Up the Database: Advanced Topics

Making Password-Mode Encrypted BackupsYou can set an encryption password in an RMAN session by executing the SET ENCRYPTION BY PASSWORD … command. If transparent encryption is configured, then specify the ONLY keyword to indicate that the … backups should be protected with a password and not with the configured transparent encryption. Note … used).

Database Backup and Recovery User's Guide, 11g Release 1 (11.1)

Backing Up the Database: Advanced Topics

Making Transparent-Mode Encrypted BackupsIf you have configured transparent encryption with the CONFIGURE command as explained in … \"Configuring RMAN Backup Encryption Modes\", then no additional commands are required to make encrypted backups. Make RMAN backups as normal.

Database Administrator's Guide, 11g Release 1 (11.1)

Creating Tablespaces

Encrypted TablespacesYou can encrypt any permanent tablespace to protect sensitive data. Tablespace encryption is … database and access database files directly through the operating system file system. Tablespace encryption … tablespace, all tablespace blocks are encrypted. All segment types are supported for encryption … on. Note: There is no need

Database Advanced Security Administrator's Guide, 11g Release 1 (11.1)

Configuring Network Data Encryption and Integrity for Oracle Servers and Clients

4.1.2 Advanced Encryption StandardIn this release, the new Federal Information Processing Standard (FIPS) encryption algorithm … , Advanced Encryption Standard (AES), is supported. AES can be used by all U.S. government organizations … and businesses to protect sensitive data over a network. This encryption algorithm defines three