Database security
After covering some distributed database real-world examples that will come in handy, let's now move on to some database security examples.
Case 3 – ShardingSphere-Proxy + ShardingSphere-JDBC + PostgreSQL + data encryption
In this section, the first case will get you started with data encryption, while the following case will cover checking privileges.
The deployment architecture
This case demonstrates how to use ShardingSphere-Proxy to dynamically manage rule configuration, connecting PostgreSQL to ShardingSphere-JDBC and implementing a data encryption application.
To understand what the deployment would look like, you can refer to Figure 12.11:
The example configuration
For this case, you can use either ShardingSphere-Proxy or JDBC, and therefore, in the following sections, you will find an example configuration for both clients.