다음 섹션에서는 소스 네트워크 연결에 SSL/TLS 암호화를 구성하는 데 필요한 단계를 제공합니다.
자체 호스팅 Oracle 데이터베이스에 대한 연결 암호화
다음 섹션에는 자체 호스팅 Oracle 소스에 대한 연결에 SSL/TLS 암호화를 구성하는 데 도움이 되는 세부정보가 포함되어 있습니다.
TLS 변형 사용
자체 호스팅 소스에 대한 연결에 TLS 암호화를 사용하려면 다음 단계를 따르세요.
신뢰할 수 있는 인증 기관(CA)에서 서명한 SSL/TLS 인증서를 가져옵니다. 조직 정책을 참고하여 올바른 채널을 사용하여 인증서를 받습니다. 서버 인증서에 서명하는 x509 PEM 인코딩 루트 CA 인증서를 저장해야 합니다. Database Migration Service의 소스 연결 프로필에 제공해야 합니다.
이 용도로 자체 서명 인증서(예: openssl 명령줄 도구로 생성)를 사용할 수 있지만 프로덕션에는 사용하지 않는 것이 좋습니다. 보안 시스템에서 자체 서명 인증서를 취약점으로 신고할 수 있습니다.
[[["이해하기 쉬움","easyToUnderstand","thumb-up"],["문제가 해결됨","solvedMyProblem","thumb-up"],["기타","otherUp","thumb-up"]],[["이해하기 어려움","hardToUnderstand","thumb-down"],["잘못된 정보 또는 샘플 코드","incorrectInformationOrSampleCode","thumb-down"],["필요한 정보/샘플이 없음","missingTheInformationSamplesINeed","thumb-down"],["번역 문제","translationIssue","thumb-down"],["기타","otherDown","thumb-down"]],["최종 업데이트: 2025-08-18(UTC)"],[],[],null,["# Configure encryption for source database connections\n\nThe following sections provide steps you need to perform to configure SSL/TLS\nencryption for your source network connections.\n| **Tip:** Remember that with regards to [network connectivity](/database-migration/docs/oracle-to-postgresql/networking-overview), Database Migration Service is considered the **client** and your source database is the **server**.\n\nEncrypt connections to self-hosted Oracle databases\n---------------------------------------------------\n\nThe following sections contain details to help you configure SSL/TLS\nencryption for connections to self-hosted Oracle sources.\n\n### Use TLS variant\n\nTo use TLS encryption for connections to a self-hosted source, do the following:\n\n1. Obtain an SSL/TLS certificate signed by a trusted Certificate Authority\n (CA). Consult your organization policies to make sure you use the right\n channels to get the certificate. Make sure you save the x509 PEM-encoded\n root CA certificate that signs your server certificate. You need to provide\n it for the source connection profile in Database Migration Service.\n\n It is possible to use self-signed certificates for this purpose\n (for example generated with the\n [`openssl` command line tool](https://docs.openssl.org/master/man1/openssl/)), but we don't recommend\n them for production use. Your security systems might flag self-signed\n certificates as a vulnerability.\n2. Configure TLS authentication on your source Oracle database. For more information, see [Configuring a Transport Layer Security Connection\n without a Client Wallet](https://docs.oracle.com/en/database/oracle/oracle-database/19/dbseg/configuring-secure-sockets-layer-authentication.html#DBSEG-GUID-28A27D34-D642-45AB-BA0F-F20D4494FB38) in the Oracle documentation.\n3. At a later stage, when you [create the source connection profile](/database-migration/docs/oracle-to-postgresql/create-source-connection-profile), do the following:\n 1. Select **TLS** for the encryption type.\n 2. In the **Source CA certificate** section, click **Browse** and upload the x509 PEM-encoded root CA certificate that signs your server certificate.\n\nEncrypt connections to Amazon RDS for Oracle\n--------------------------------------------\n\nThe following sections contain details to help you configure SSL/TLS\nencryption for connections to Amazon RDS for Oracle sources.\n\n### Use TLS variant\n\nTo use TLS encryption for connections to Amazon RDS for Oracle,\ndo the following:\n\n1. Enable the Oracle SSL encryption option on your Amazon RDS Oracle source database. For more information, see [Using SSL with an RDS for Oracle DB instance](https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Oracle.Concepts.SSL.html) in the Amazon RDS documentation.\n2. Download the x509 PEM-encoded root CA certificate that signs your server certificate. This certificate is included in the certificate bundles provided by AWS. For more information, see [Download certificate bundles](https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/UsingWithRDS.SSL.html#UsingWithRDS.SSL.CertificatesDownload) in the Amazon RDS documentation.\n3. At a later stage, when you [create the source connection profile](/database-migration/docs/oracle-to-postgresql/create-source-connection-profile), do the following:\n 1. Select **TLS** for the encryption type.\n 2. In the **Source CA certificate** section, click **Browse** and upload the x509 PEM-encoded root CA certificate you downloaded in the certificate bundle."]]