Table of Contents

Search

  1. Preface
  2. Part 1: Introduction to Amazon Redshift connectors
  3. Part 2: Data Integration with Amazon Redshift V2 Connector
  4. Part 3: Data Integration with Amazon Redshift Connector

Amazon Redshift Connectors

Amazon Redshift Connectors

Configure client-side encryption with the serverless runtime environment

Configure client-side encryption with the serverless runtime environment

You can use the serverless runtime environment to configure client-side encryption when you connect to Amazon Redshift.
Before you configure client-side encryption using the serverless runtime environment, configure the .yml serverless configuration file.
Configure the .yml serverless configuration file
Perform the following steps to configure the .yml serverless configuration file in the serverless runtime environment so that Amazon Redshift V2 Connector can use client-side encryption:
  1. Copy the following code snippet to a text editor:
    version: 1 agent: agentAutoApply: general: jdk: security: policyJars: - local_policy.jar - US_export_policy.jar
  2. Ensure that the syntax and indentations are valid, and then save the file as
    serverlessUserAgentConfig.yml
    in the following AWS or Azure location:
    <Supplementary file location>/serverless_agent_config
    When the .yml file runs, the policy jars are copied from the AWS or Azure location to the serverless agent directory.
  3. After you update the .yml configuration file, redeploy the serverless runtime environment.
Specify the master symmetric key in the connection properties and the client-side encryption type in the advanced source and target properties.

0 COMMENTS

We’d like to hear from you!