Connection Methods
The database connection method is usually selected based on factors such as security, performance, scalability, and implementation complexity. For details, see Table 1.
Connection Method |
Advantage |
Disadvantage |
Selection Principle |
---|---|---|---|
Non-encrypted |
|
|
It applies only to internal networks or environments that have low security requirements. |
SSL |
|
|
It applies to environments that require high data transmission security, such as finance and healthcare industries. |
UDS |
|
|
It applies to local communication scenarios, for example, data exchange between local services and applications. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.