How do I narrow my search results?
After you submit your search query:
- On the Refine Search results page, select one or more categories of products or services from the left sidebar.
- Then for a category with search results, click Select to choose your product and release filters, and then click OK.
For search queries that contain multiple words, surround the query with quotes, and then resubmit your query. Example: "database cloud service"
How do I find the documentation for my product or service?
From the home page, click the technology categories for your products or services. If you do not know which category to pick, try the following features:
- Click the Find a product tab and search for your product or service.
- Click Browse All Products & Services at the bottom of the home page to view an alphabetical listing of products and services.
- Apple Safari: Version 6
- Google Chrome: Version 29 and later
- Mozilla Firefox: Version 24 and later
- Microsoft Internet Explorer: Version 9 and later
Propagations and Transparent Data Encryption → that were encrypted using transparent data encryption. When a propagation propagates row LCRs with … about configuring network data encryption \"Message Propagation Between Queues\"
SecureFile Compression, Encryption, and Deduplication → This feature is thoroughly described in the Oracle Database SecureFiles and Large Objects Developer's Guide. Information specific to OCCI is in section \"Using SecureFiles\" of Chapter 7, \"Programming with LOBs\". Section \"SecureFile LOB Types and Constants\" describes the new LOB attributes, while Chapter 13, \"OCCI Application Programming Interface\" documents the new and changed APIs for the
Synchronous Capture and Transparent Data Encryption → data encryption. Encrypted columns in row logical change records (row LCRs) captured by a synchronous
Manual Dequeue and Transparent Data Encryption → transparent data encryption. When row LCRs with encrypted columns are dequeued, the encrypted
9.3.8 Reset the TDE Master Encryption Key → The database encryption wallet on a physical standby database must be replaced with a fresh copy of … the database encryption wallet from the primary database whenever the TDE master encryption key is … reset on the primary database. Failure to refresh the database encryption wallet on the physical … modified
Messaging Clients and Transparent Data Encryption → transparent data encryption. When row LCRs with encrypted columns are dequeued by a messaging client
C.3 Support for Tablespace Encryption → tablespace encryption enabled. In such a case, restrictions 1, 2, and 3 listed in Section C.2, \"Support … for Transparent Data Encryption (TDE)\" will apply. Note: In some cases, when SQL Apply mines and
Oracle Streams and Transparent Data Encryption → The following topics describe how Oracle Streams works with Transparent Data Encryption: Capture … Processes and Transparent Data Encryption Synchronous Capture and Transparent Data Encryption Explicit … Capture and Transparent Data Encryption Queues and Transparent Data Encryption Propagations and
Capture Processes and Transparent Data Encryption → data encryption. A downstream capture process can capture changes to columns that have been encrypted … operations on the wallet at the downstream database, such as changing the encryption key for a replicated … disk in a database with transparent data encryption enabled, then Oracle Streams transparently
Apply Processes and Transparent Data Encryption → ) that contain columns encrypted using transparent data encryption. When row LCRs with encrypted
Oracle Streams Support for Transparent Data Encryption → encrypted using transparent data encryption. Oracle Streams supports columns that were encrypted at the … column level or through tablespace encryption. Tablespace encryption enables you to encrypt an … due to column encryption or tablespace encryption, Oracle Streams components handle the column data
Combining SecureFile Compression, Encryption, and Deduplication → You are allowed to combine compression, encryption and deduplication in any combination. Oracle … , will be performed before compression and encryption. This prevents the potentially unnecessary and … expensive compression and encryption operations on SecureFiles that are already stored in a column … . Compression will be performed
Explicit Capture and Transparent Data Encryption → You can use explicit capture to construct and enqueue row logical change records (row LCRs) for columns that are encrypted in database tables. However, you cannot specify that columns are encrypted when you construct the row LCRs. Therefore, when explicitly captured row LCRs are staged in a queue, all of the columns in the row LCRs are decrypted. See Also: \"Explicit Capture by Applications\"
C.2 Support for Transparent Data Encryption (TDE) → Data Encryption (TDE) enabled. Consider the following when using a logical standby database to … Data Encryption using server held keys are supported in the context of a logical standby database when … . Transparent Data Encryption in the context of Hardware Security Modules is not supported in the … the Transparent Data Encryption
Encrypting RMAN Backups → As explained in \"Configuring Backup Encryption\", you can protect RMAN backup sets with backup … encryption. Encrypted backups cannot be read if they are obtained by unauthorized users. The RMAN … backup encryption feature requires the Enterprise Edition of the database.
Consider Encrypting Columns That Contain Sensitive Data → include social security numbers, credit card numbers, and medical records. Column encryption is … transparent to your applications, with some restrictions. Although encryption is not meant to solve all … encryption uses the transparent data encryption feature of Oracle Database, which requires that you … create
Making Password-Mode Encrypted Backups → You can set an encryption password in an RMAN session by executing the SET ENCRYPTION BY PASSWORD … command. If transparent encryption is configured, then specify the ONLY keyword to indicate that the … backups should be protected with a password and not with the configured transparent encryption. Note … used).
Making Transparent-Mode Encrypted Backups → If you have configured transparent encryption with the CONFIGURE command as explained in … \"Configuring RMAN Backup Encryption Modes\", then no additional commands are required to make encrypted backups. Make RMAN backups as normal.
Encrypted Tablespaces → You can encrypt any permanent tablespace to protect sensitive data. Tablespace encryption is … database and access database files directly through the operating system file system. Tablespace encryption … tablespace, all tablespace blocks are encrypted. All segment types are supported for encryption … on. Note: There is no need
4.1.2 Advanced Encryption Standard → In this release, the new Federal Information Processing Standard (FIPS) encryption algorithm … , Advanced Encryption Standard (AES), is supported. AES can be used by all U.S. government organizations … and businesses to protect sensitive data over a network. This encryption algorithm defines three