Mengonfigurasi enkripsi untuk koneksi database sumber
Tetap teratur dengan koleksi
Simpan dan kategorikan konten berdasarkan preferensi Anda.
Bagian berikut memberikan langkah-langkah yang perlu Anda lakukan untuk mengonfigurasi enkripsi SSL/TLS
untuk koneksi jaringan sumber.
Mengenkripsi koneksi ke database Oracle yang dihosting sendiri
Bagian berikut berisi detail untuk membantu Anda mengonfigurasi enkripsi SSL/TLS untuk koneksi ke sumber Oracle yang dihosting sendiri.
Menggunakan varian TLS
Untuk menggunakan enkripsi TLS untuk koneksi ke sumber yang dihosting sendiri, lakukan tindakan berikut:
Dapatkan sertifikat SSL/TLS yang ditandatangani oleh Certificate Authority (CA) tepercaya. Lihat kebijakan organisasi Anda untuk memastikan Anda menggunakan saluran yang tepat untuk mendapatkan sertifikat. Pastikan Anda menyimpan sertifikat root CA berenkode PEM x509 yang menandatangani sertifikat server Anda. Anda harus memberikannya untuk profil koneksi sumber di Database Migration Service.
Anda dapat menggunakan sertifikat yang ditandatangani sendiri untuk tujuan ini
(misalnya dibuat dengan
alat command line openssl), tetapi sebaiknya
jangan menggunakannya untuk penggunaan produksi. Sistem keamanan Anda mungkin menandai sertifikat yang ditandatangani sendiri sebagai kerentanan.
Download sertifikat CA root berenkode x509 PEM yang menandatangani sertifikat server Anda. Sertifikat ini disertakan dalam paket sertifikat
yang disediakan oleh AWS. Untuk informasi selengkapnya, lihat
Mendownload paket sertifikat dalam dokumentasi Amazon RDS.
[[["Mudah dipahami","easyToUnderstand","thumb-up"],["Memecahkan masalah saya","solvedMyProblem","thumb-up"],["Lainnya","otherUp","thumb-up"]],[["Sulit dipahami","hardToUnderstand","thumb-down"],["Informasi atau kode contoh salah","incorrectInformationOrSampleCode","thumb-down"],["Informasi/contoh yang saya butuhkan tidak ada","missingTheInformationSamplesINeed","thumb-down"],["Masalah terjemahan","translationIssue","thumb-down"],["Lainnya","otherDown","thumb-down"]],["Terakhir diperbarui pada 2025-08-18 UTC."],[],[],null,["# Configure encryption for source database connections\n\nThe following sections provide steps you need to perform to configure SSL/TLS\nencryption for your source network connections.\n| **Tip:** Remember that with regards to [network connectivity](/database-migration/docs/oracle-to-postgresql/networking-overview), Database Migration Service is considered the **client** and your source database is the **server**.\n\nEncrypt connections to self-hosted Oracle databases\n---------------------------------------------------\n\nThe following sections contain details to help you configure SSL/TLS\nencryption for connections to self-hosted Oracle sources.\n\n### Use TLS variant\n\nTo use TLS encryption for connections to a self-hosted source, do the following:\n\n1. Obtain an SSL/TLS certificate signed by a trusted Certificate Authority\n (CA). Consult your organization policies to make sure you use the right\n channels to get the certificate. Make sure you save the x509 PEM-encoded\n root CA certificate that signs your server certificate. You need to provide\n it for the source connection profile in Database Migration Service.\n\n It is possible to use self-signed certificates for this purpose\n (for example generated with the\n [`openssl` command line tool](https://docs.openssl.org/master/man1/openssl/)), but we don't recommend\n them for production use. Your security systems might flag self-signed\n certificates as a vulnerability.\n2. Configure TLS authentication on your source Oracle database. For more information, see [Configuring a Transport Layer Security Connection\n without a Client Wallet](https://docs.oracle.com/en/database/oracle/oracle-database/19/dbseg/configuring-secure-sockets-layer-authentication.html#DBSEG-GUID-28A27D34-D642-45AB-BA0F-F20D4494FB38) in the Oracle documentation.\n3. At a later stage, when you [create the source connection profile](/database-migration/docs/oracle-to-postgresql/create-source-connection-profile), do the following:\n 1. Select **TLS** for the encryption type.\n 2. In the **Source CA certificate** section, click **Browse** and upload the x509 PEM-encoded root CA certificate that signs your server certificate.\n\nEncrypt connections to Amazon RDS for Oracle\n--------------------------------------------\n\nThe following sections contain details to help you configure SSL/TLS\nencryption for connections to Amazon RDS for Oracle sources.\n\n### Use TLS variant\n\nTo use TLS encryption for connections to Amazon RDS for Oracle,\ndo the following:\n\n1. Enable the Oracle SSL encryption option on your Amazon RDS Oracle source database. For more information, see [Using SSL with an RDS for Oracle DB instance](https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Oracle.Concepts.SSL.html) in the Amazon RDS documentation.\n2. Download the x509 PEM-encoded root CA certificate that signs your server certificate. This certificate is included in the certificate bundles provided by AWS. For more information, see [Download certificate bundles](https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/UsingWithRDS.SSL.html#UsingWithRDS.SSL.CertificatesDownload) in the Amazon RDS documentation.\n3. At a later stage, when you [create the source connection profile](/database-migration/docs/oracle-to-postgresql/create-source-connection-profile), do the following:\n 1. Select **TLS** for the encryption type.\n 2. In the **Source CA certificate** section, click **Browse** and upload the x509 PEM-encoded root CA certificate you downloaded in the certificate bundle."]]