Updated on 2025-04-29 GMT+08:00

Configuring an Encryption Task

  • If you are familiar with the database table structure, add it on the Encryption Task Management page. After encryption is configured, unauthorized users can view only the ciphertext when querying the database information.
  • If you are not familiar with sensitive data distribution, you can use the Sensitive Data Discovery function to scan your database, create an encryption task in the result, and encrypt database tables. For details, see Creating an Encrypted Task in the Result.

Prerequisites

Before configuring the encryption task, you are advised to perform a simulation encryption test to check whether any problem occurs during the process. Rectify the fault. For details, see Simulated Encryption Test.

Procedure

  1. Log in to a database encryption and access control instance as the sysadmin user.
  2. In the navigation tree on the left, choose Data Encryption > Encryption Task Management.
  3. Click Add Encryption Task in the upper right corner.
  4. In the displayed dialog box, set encryption information. For details about the related parameters, see Table 1.

    Table 1 Adding an encrypted task

    Parameter

    Description

    Data Source Name

    Name of an asset.

    Schema

    Name of the schema of the asset.

    Table

    Table name of an asset.

    Encryption Algorithm

    Select an encryption algorithm from the drop-down list box.

    You can view the supported algorithm types on the Checking the Encryption Algorithm page.

    Verification Algorithm

    Select a verification algorithm from the drop-down list.

    The verification algorithm is used to verify the integrity of important data. You can view the supported algorithm types on the Checking the Encryption Algorithm page.

    Batch Size

    Set the amount of data processed of each batch in the encryption task.

    Number of Threads

    Number of threads occupied by the encryption task.

    Start Task

    If this parameter is selected, the task is automatically started after being created.

    Figure 1 Adding an encrypted task

  5. Click the Encryption List tab, select columns to be encrypted, and set whether to enable fuzzy search.

    Figure 2 Selecting encrypted column
    After encryption, fuzzy search cannot be performed by default. In the following cases, you can select Enable Fuzzy Query to perform fuzzy search, which supports % and _ characters.
    • The ciphertext is encoded in hexadecimal format and does not support BASE64 encoding. For details, see Setting Encryption Parameters.
    • The field is of the string type, for example, varchar and text. Other types are not supported.

  6. Click Initialize Table to initialize the data table.
  7. Click Complete.
  8. If Start Task is not selected during the configuration, click to start encryption.

    If the encryption is interrupted, you can click to continue the encryption.

Operation Result

  • After the encryption task is created, you can view and manage it in the list. The encryption task is automatically removed after inventory data is encrypted. In this case, the task is in the Removed state, but the system continues to encrypt data.
    Figure 3 Encryption task
  • After the encryption is complete, only encrypted data can be queried by unauthorized users.
    Figure 4 Encrypted data

Related Operations

In the task list, you can manage encrypted tasks.

  • Click Details to view Encryption Task State, Task Name, Encrypted Table, Encrypted Column, and Encryption Algorithm.
  • Click Edit to modify information such as Encrypted Column.