You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+9-39Lines changed: 9 additions & 39 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,14 +40,14 @@ Once the custom types and functions are installed, you can start using EQL in yo
40
40
41
41
1. Create a table with a column of type `cs_encrypted_v1` which will store your encrypted data.
42
42
1. Use EQL functions to add indexes for the columns you want to encrypt.
43
-
- Indexes are used by Cipherstash Proxy to understand what cryptography schemes are required for your use case.
43
+
- Indexes are used by Cipherstash Proxy to understand what cryptography schemes are required for your use case.
44
44
1. Initialize Cipherstash Proxy for cryptographic operations.
45
-
- The Proxy will dynamically encrypt data on the way in and decrypt data on the way out based on the indexes you have defined.
45
+
- The Proxy will dynamically encrypt data on the way in and decrypt data on the way out based on the indexes you have defined.
46
46
1. Insert data into the defined columns using a specific payload format.
47
-
- The payload format is defined in the [data format](#data-format) section.
47
+
- The payload format is defined in the [data format](#data-format) section.
48
48
1. Query the data using the EQL functions defined in the [querying data with EQL](#querying-data-with-eql) section.
49
-
- No modifications are required to simply `SELECT` data from your encrypted columns.
50
-
- In order to perform `WHERE` and `ORDER BY` queries, you must wrap the queries in the EQL functions defined in the [querying data with EQL](#querying-data-with-eql) section.
49
+
- No modifications are required to simply `SELECT` data from your encrypted columns.
50
+
- In order to perform `WHERE` and `ORDER BY` queries, you must wrap the queries in the EQL functions defined in the [querying data with EQL](#querying-data-with-eql) section.
51
51
1. Integrate with your application via the [helper packages](#helper-packages) to interact with the encrypted data.
52
52
53
53
You can find a full getting started guide in the [GETTINGSTARTED.md](GETTINGSTARTED.md) file.
@@ -141,49 +141,19 @@ These statements must be run through the CipherStash Proxy in order to **decrypt
0 commit comments