Checking the Encryption Algorithm
After a key is initialized, the system generates the corresponding encryption algorithm. You can view the encryption algorithms supported by the system on the View Algorithm page.
Prerequisites
Ensure that the key has been initialized. For details, see section Initializing a Key.
Procedure
- Log in to a database encryption and access control instance as the sysadmin user.
- In the navigation tree on the left, choose .
- On the displayed page, view the algorithm details.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot