|
||
|
By configuring attribute encryption, or database encryption, it is possible to encrypt highly sensitive information as it is stored within the database. The values of these attributes are encrypted and can only be read during a secure session. Use this tab to select attributes to encrypt.
Encrypted Attributes. Text box of encrypted attributes.
- Attribute name. The name of the attribute that is encrypted.
- Encryption Algorithm. The encryption cipher used to encrypt that attribute.
Add attribute. Brings up a list of all system attributes that can be encrypted.
Delete attribute. Deletes an encrypted attribute. This does not delete the attribute or its value; it disables encryption.
Copyright (C) Sun Microsystems, Inc. Used by permission.
Copyright (C) 2005 Red Hat, Inc. All rights reserved.
This material may be distributed only subject to the terms and conditions set forth in the Open Publication License, V1.0 or later (the latest version is presently available at http://www.opencontent.org/openpub/).
Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder.
Distribution of the work or derivative of the work in any standard (paper) book form for commercial purposes is prohibited unless prior permission is obtained from the copyright holder.
Last Updated March 31, 2005