检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Currently, the following types of data can be encrypted: numerals supported in the database; character type; RAW in binary type; and DATE, TIMESTAMP, and SMALLDATETIME in date/time type.
Table 1 PG_AUTH_HISTORY columns Column Type Description roloid OID Role identifier passwordtime Timestamp with time zone Time of password creation and change rolpassword Text Role password that is encrypted using MD5 or SHA256, or that is not encrypted Parent Topic: System Catalogs
1 PG_TDE_INFO columns Column Type Description is_encrypt Text Whether the cluster is an encryption cluster f: Non-encryption cluster t: Encryption cluster g_tde_algo Text Encryption algorithm AES-CTR-128 remain Text Reserved columns Examples Check whether the current cluster is encrypted
An encrypted PGP message consists of the following parts: Session key (encrypted symmetric key or public key) of the message Data encrypted using the session key For symmetric key (password) encryption: The key is encrypted using the String2Key (S2K) algorithm, which is like a slowed
Even the system administrator cannot do this unless this column is true. userepl boolean - User can initiate streaming replication and put the system in and out of backup mode. passwd Text - Password (possibly encrypted); null if none.
Using KMS to Encrypt GaussDB(DWS) Clusters Overview Rotating Encryption Keys Converting an Ordinary Cluster to an Encrypted Cluster Parent topic: GaussDB(DWS) Cluster Data Security and Encryption
In stream ciphers, encryption and decryption parties use same pseudo-random encrypted data stream as keys, and plaintext data is sequentially encrypted by these keys. In practice, data is encrypted one bit at a time using an XOR operation.
PG_TDE_INFO columns Name Type Description is_encrypt text Whether the cluster is an encryption cluster f: Non-encryption cluster t: Encryption cluster g_tde_algo text Encryption algorithm SM4-CTR-128 AES-CTR-128 remain text Reserved columns Examples Check whether the current cluster is encrypted
Table 1 PG_AUTH_HISTORY columns Name Type Description roloid oid ID of the role passwordtime timestamp with time zone Time of password creation and change rolpassword text Role password that is encrypted using MD5 or SHA256, or that is not encrypted Parent Topic: System Catalogs
When you create a foreign table, its AK value is encrypted and saved to the metadata table of the database.
Even the system administrator cannot do this unless this column is true. userepl boolean - User can initiate streaming replication and put the system in and out of backup mode. passwd text - Password (possibly encrypted); null if none.
The password is stored in ciphertext encrypted by MD5 and SHA256. 2 indicates that passwords are encrypted using SHA-256. The password is encrypted using SHA256. 1 Retry and lock password_lock_time Specifies the duration for a locked account to be automatically unlocked.
The keystr used for decryption must be the same as that used for encryption. gs_encrypt_aes128(encryptstr,keystr) Encrypts encryptstr strings using keystr as the key and returns encrypted strings.
If the password is encrypted using SHA256, it will be stored as it is, regardless of whether it is specified as ENCRYPTED or UNENCRYPTED. This is because the system cannot decrypt the specified encrypted password.
On GaussDB(DWS), you can rotate the encrypted CEK of an encrypted cluster. The procedure of rotating the keys is as follows: The GaussDB(DWS) cluster starts key rotation.
Converting an Ordinary Cluster to an Encrypted Cluster GaussDB(DWS) allows you to convert an unencrypted cluster to an encrypted cluster when the cluster status is Available on the console.
The password is stored in ciphertext encrypted by MD5 and SHA256. 2 indicates that passwords are encrypted using SHA-256. The password is encrypted using SHA256. 1 Retry and lock password_lock_time Specifies the duration for a locked account to be automatically unlocked.
If the password is encrypted using SHA256, it will be stored as it is, regardless of whether it is specified as ENCRYPTED or UNENCRYPTED. This is because the system cannot decrypt the specified encrypted password.
When you create a foreign table, its AK value is encrypted and saved to the metadata table of the database.
If the password is encrypted using SHA256, it will be stored as it is, regardless of whether it is specified as ENCRYPTED or UNENCRYPTED. This is because the system cannot decrypt the specified encrypted password.