Home PC Games Linux Windows Database Network Programming Server Mobile  
           
  Home \ Database \ Oracle TDE transparent data encryption     - Detailed reference Oracle 11g Partition (Database)

- HTML5 postMessage cross-domain data exchange (Programming)

- Use Nginx as a load balancer (Server)

- Linux user login ban (Linux)

- Debian (Wheezy) were installed wxPython GUI development (Linux)

- Android custom controls create the simplest skid menu in the history (Programming)

- How to implement large-scale distributed Yahoo depth study on the Hadoop cluster (Server)

- Elaborate 10-point difference between the new and malloc (Programming)

- RedHat 6.5 installation and deployment Openfire (Server)

- Four IDS intrusion detection tool under Linux environment (Linux)

- ActiveMQ-based shared file system HA solutions (Server)

- How to create a binary distribution with Bash (Linux)

- About Auto Layout and frame (Programming)

- Use install_updates upgrade GAMIT / GLOBK (Linux)

- Use UDEV SCSI Rules configured ASM on Oracle Linux 5 and 6 (Database)

- Ubuntu deployed under regular tasks with crontab (Linux)

- iOS in the event delivery and the responder chain (Programming)

- Getting Started with Linux: CentOS7 Install Mono with the yum command (Server)

- Linux, security encryption to transfer files between machines (Linux)

- How to become a better Node.js developers in 2016 (Programming)

 
         
  Oracle TDE transparent data encryption
     
  Add Date : 2018-11-21      
         
         
         
  It began to appear transparent data encryption (Transparent Data Encryption, TDE) from ORALE 10GR2.

TDE is used to encrypt the data, usually SQL application logic execution need not be changed, still running. In other words, applications can use the same syntax to insert data into an application table and the Oracle database before writing information to disk automatically encrypts the data. Subsequent select operations will transparently decrypt the data, so the application will continue to run normally. This is important, because the current application is often desirable unencrypted application data. Show encrypted data at least make the application user puzzled, or even break existing applications.
      
Set the encryption key:
 
Oracle Transparent Data Encryption provides encryption key management infrastructure required to implement. Encryption works by the plaintext data and secret (called key) passed to the encryption program. Encryption programs use supplied key to encrypt the plaintext data, and then returns the encrypted data. In the past, creating and maintaining the key task is completed by the application. Oracle Transparent Data Encryption through the entire database to automatically generate a master key to solve this problem. In starting the Oracle database, the system administrator must use a different password or a password to open a password DBA Oracle Wallet object. The administrator then initializes the database master key. The master key is generated automatically.
 
Prepare the database for encryption

Add a ENCRYPTED_WALLET_LOCATION entry in $ ORACLE_HOME / network / admin in the sqlnet.ora.
ENCRYPTION_WALLET_LOCATION = (SOURCE = (METHOD = FILE) (METHOD_DATA = (DIRECTORY = / u01 / oracle / product / 11.2.0.1.0 / wallet /)))
Execute the following statement into the database
 alter system set key identified by "welcome"
If prompted with the following error indicates that there is no wallet is created automatically, it may be because the need to manually create the directory wallet
ORA-28368: can not auto-create wallet
 
Wallet directory manually create and grant the oracle user access.
alter system set key identified by "welcome";
SQL> conn hr / hr
SQL> create table test (id number, credit_card_number varchar2 (16) ENCRYPT NO SALT);
SQL> insert into test values ​​(1, '12312432');
1 row created.
SQL> insert into test values ​​(2, '33245235');
SQL> commit;
Commit complete.
SQL> select * from test;

This is the time to see the encrypted data again after the restart when the inquiry will not be able to see the encrypted data. This time need to open the wallet can view the encrypted data
alter system set wallet open identified by "welcome1";

 sys user table can not be encrypted
     
         
         
         
  More:      
 
- MultiWriter: while the ISO image concurrent writes 20 USB Startup Disk (Linux)
- Memcached and Redis (Linux)
- C language function pointer and a callback function (Programming)
- RedHat Linux 6.4 installation RTL8188CUS wireless network card driver (Linux)
- JavaScript original values and complex values (Programming)
- How to update the ISPConfig 3 SSL Certificates (Server)
- Linux performance optimization features Tuned and ktune (Linux)
- Virtual Judge structures under Ubuntu 14.04 (Server)
- Nginx caching using the official guide (Server)
- C ++ Replication Control: Assignment operators and destructors (Programming)
- Oracle Linux 5.9 configuration Xmanager (Linux)
- Linux ln command - create a file / directory link (Linux)
- How to use the command line ftp upload and download files (Linux)
- CentOS 6.4 of cron scheduled task configuration (Linux)
- New experience Budgie (Budgerigar) desktop environment (Linux)
- MongoDB uses aggregate, group, match mysql achieve in having (count (1)> 1) features (Database)
- how to quickly find a file on Linux system (Linux)
- Linux Network Programming - raw socket programming (Programming)
- Oracle 11g contraction table space error ORA-03297: file contains used data beyondrequested RESIZE value (Database)
- Eclipse Android development environment installation (Linux)
     
           
     
  CopyRight 2002-2022 newfreesoft.com, All Rights Reserved.