Skip to content

Commit 8013b5f

Browse files
authored
Merge pull request #49786 from nabhishek/patch-33
updated oracle security requirements
2 parents d9a4f2e + bb29777 commit 8013b5f

File tree

1 file changed

+5
-0
lines changed

1 file changed

+5
-0
lines changed

articles/data-factory/data-movement-security-considerations.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,11 @@ If the cloud data store supports HTTPS or TLS, all data transfers between data m
5656
> [!NOTE]
5757
> All connections to Azure SQL Database and Azure SQL Data Warehouse require encryption (SSL/TLS) while data is in transit to and from the database. When you're authoring a pipeline by using JSON, add the encryption property and set it to **true** in the connection string. For Azure Storage, you can use **HTTPS** in the connection string.
5858
59+
> [!NOTE]
60+
> To enable encryption in transit while moving data from Oracle follow one of the below options:
61+
> 1. In Oracle server, go to Oracle Advanced Security (OAS) and configure the encryption settings, which supports Triple-DES Encryption (3DES) and Advanced Encryption Standard (AES), refer [here](https://docs.oracle.com/cd/E11882_01/network.112/e40393/asointro.htm#i1008759) for details. ADF automatically negotiates the encryption method to use the one you configure in OAS when establishing connection to Oracle.
62+
> 2. In ADF, you can add EncryptionMethod=1 in the connection string (in the Linked Service). This will use SSL/TLS as the encryption method. To use this, you need to disable non-SSL encryption settings in OAS on the Oracle server side to avoid encryption conflict.
63+
5964
> [!NOTE]
6065
> TLS version used is 1.2.
6166

0 commit comments

Comments
 (0)