Data Encryption Workflow

The following steps show the general procedure for configuring and using data encryption. For information about encryption properties, see Encryption Properties.

  1. Configure LOCAL keystore, Oracle Key Manager (OKM) keystore, or Key Management Interoperability Protocol (KMIP) keystore encryption.
    • Configuring LOCAL Keystore Encryption - BUI, CLI
    • Configuring OKM Keystore Encryption - BUI, CLI
    • Configuring KMIP Keystore Encryption - BUI, CLI
  2. Create encryption keys and certificates.

    Use the same procedures as in the preceding step.

  3. Optional: Create a pool using an encryption key.

    For information, see Creating an Encrypted Pool - BUI, CLI.

  4. Optional: Create a project using an encryption key.

    For information, see Creating an Encrypted Project - BUI, CLI.

  5. Create a share in a project that uses an encryption key or create a share using an encryption key.

    For information about creating a share, see Shares and Projects or Creating an Encrypted Project - BUI, CLI.