You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: contrib/pg_tde/documentation/docs/faq.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -61,7 +61,7 @@ Thus, to protect your sensitive data, consider using TDE to encrypt it at the ta
61
61
* Regular monitoring and auditing
62
62
* Additional data protection for sensitive fields (e.g., application-layer encryption)
63
63
64
-
## How does `pg_tde` make my data safe?
64
+
## How does pg_tde make my data safe?
65
65
66
66
`pg_tde` uses two keys to encrypt data:
67
67
@@ -106,7 +106,7 @@ Consider encrypting only tables that store sensitive data. You can decide what t
106
106
107
107
We advise encrypting the whole database only if all your data is sensitive, like PII, or if there is no other way to comply with data safety requirements.
108
108
109
-
## What cipher mechanisms are used by `pg_tde`?
109
+
## What cipher mechanisms are used by pg_tde?
110
110
111
111
`pg_tde` currently uses a AES-CBC-128 algorithm. First the internal keys in the datafile are encrypted using the principal key with AES-CBC-128, then the file data itself is again encrypted using AES-CBC-128 with the internal key.
112
112
@@ -141,7 +141,7 @@ After that, no database restart is required. When you create or alter the table
141
141
142
142
If you lose encryption keys, especially, the principal key, the data is lost. That's why it's critical to back up your encryption keys securely and use the Key Management service for key management.
143
143
144
-
## Can I use `pg_tde` in a multi-tenant setup?
144
+
## Can I use pg_tde in a multi-tenant setup?
145
145
146
146
Multi-tenancy is the type of architecture where multiple users, or tenants, share the same resource. It can be a database, a schema or an entire cluster.
147
147
@@ -159,6 +159,6 @@ Since the encryption happens on the database level, it makes no difference for y
159
159
160
160
To restore from an encrypted backup, you must have the same principal encryption key, which was used to encrypt files in your backup.
161
161
162
-
## I'm using OpenSSL in FIPS mode and need to use `pg_tde`. Does `pg_tde` comply with FIPS requirements? Can I use my own FIPS-mode OpenSSL library with `pg_tde`?
162
+
## I'm using OpenSSL in FIPS mode and need to use pg_tde. Does pg_tde comply with FIPS requirements? Can I use my own FIPS-mode OpenSSL library with pg_tde?
163
163
164
164
Yes. `pg_tde` works with the FIPS-compliant version of OpenSSL, whether it is provided by your operating system or if you use your own OpenSSL libraries. If you use your own libraries, make sure they are FIPS certified.
Copy file name to clipboardExpand all lines: contrib/pg_tde/documentation/docs/functions.md
+3-7Lines changed: 3 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ However, database owners can run the “view keys” and “set principal key”
15
15
16
16
A key provider is a system or service responsible for managing encryption keys. `pg_tde` supports the following key providers:
17
17
18
-
* local file (not for production use)
18
+
* local file (not recommended for production use)
19
19
* Hashicorp Vault / OpenBao
20
20
* KMIP compatible providers
21
21
@@ -26,7 +26,7 @@ Key provider management includes the following operations:
26
26
* deleting a key provider,
27
27
* listing key providers.
28
28
29
-
### Add a provider
29
+
### Add a key provider
30
30
31
31
You can add a new key provider using the provided functions, which are implemented for each provider type.
32
32
@@ -35,7 +35,7 @@ There are two functions to add a key provider: one function adds it for the curr
35
35
*`pg_tde_add_database_key_provider_<type>('provider-name', <provider specific parameters>)`
36
36
*`pg_tde_add_global_key_provider_<type>('provider-name', <provider specific parameters>)`
37
37
38
-
When you add a new provider, the provider name must be unqiue in the scope. But a local database provider and a global provider can have the same name.
38
+
When you add a new provider, the provider name must be unique in the scope. But a local database provider and a global provider can have the same name.
39
39
40
40
### Change an existing provider
41
41
@@ -106,8 +106,6 @@ where:
106
106
*`secret_token_path` is a path to the file that contains an access token with read and write access to the above mount point
107
107
***[optional]**`ca_path` is the path of the CA file used for SSL verification
108
108
109
-
110
-
111
109
#### Adding or modifying KMIP providers
112
110
113
111
The KMIP provider uses a remote KMIP server.
@@ -167,7 +165,6 @@ where:
167
165
!!! note
168
166
The specified access parameters require permission to read and write keys at the server.
169
167
170
-
171
168
### Adding or modifying local keyfile providers
172
169
173
170
This provider manages database keys using a local keyfile.
@@ -210,7 +207,6 @@ where:
210
207
*`provider-name` is the name of the provider. You can specify any name, it's for you to identify the provider.
211
208
*`/path/to/the/key/provider/data.file` is the path to the key provider file.
212
209
213
-
214
210
### Delete a provider
215
211
216
212
These functions delete an existing provider in the current database or in the global scope:
Copy file name to clipboardExpand all lines: contrib/pg_tde/documentation/docs/index.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
# `pg_tde` Documentation
1
+
# pg_tde Documentation
2
2
3
3
`pg_tde` is the open source, community driven and futureproof PostgreSQL extension that provides Transparent Data Encryption (TDE) to protect data at rest. `pg_tde` ensures that the data stored on disk is encrypted, and that no one can read it without the proper encryption keys, even if they gain access to the physical storage media.
0 commit comments