Connection Methods
The database connection method is usually selected based on factors such as security, performance, scalability, and implementation complexity. For details, see Table 1.
Connection Method |
Advantage |
Disadvantage |
Selection Principle |
---|---|---|---|
Non-encrypted |
|
|
It applies only to internal networks or environments that have low security requirements. |
SSL |
|
|
It applies to environments that require high data transmission security, such as finance and healthcare industries. |
UDS |
|
|
It applies to local communication scenarios, for example, data exchange between local services and applications. |
SM-based TLS |
|
|
It applies to specific industries in China, such as government and finance, where legal requirements are posed on encryption standards in China. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot