Unlock a world of possibilities! Login now and discover the exclusive benefits awaiting you.
Hi team,
In a data replication using Logstream, could you indicate if the information is sent encrypted to the Qlik server from OnPremise and if it is also encrypted when it is replicated from the server to the destinations, in this case S3 and Aurora, and if it is only encrypts the channel through which it is sent.
Regards.
Hi,
The Replicate users guide includes a detailed information about different security aspects when working with Replicate product - following is a link to the documentation:
https://help.qlik.com/en-US/replicate/November2023/Content/Replicate/Main/Security/replicate_securit...
As indicated in the subsection (under the chapter of the link above ) 'Securing connections to endpoints' (https://help.qlik.com/en-US/replicate/November2023/Content/Replicate/Main/Security/Secure_Connection...) :
"Qlik does not implement the network protocol (see important exceptions below) and for this reason, Qlik Replicate generally relies on the vendor of the source or target endpoint to offer encryption. When setting up endpoint connections, the user is able to specify any connection properties required for the use of encryption; these properties are, invariably, vendor-specific properties. In some cases, use of encryption requires system-level settings (such as adding a certificate to the machine trust store) which are outside of the scope of Qlik Replicate. Users are referred to the operation manual of the source or target endpoint for details on how to set up encrypted client communication with the server."
For further information please refer to the above sections in the documentation.
Regards,
Orit
Hello @krunide9
To add more to previous Tse Comments. Most of replication tools extract the changes from source and push them into target endpoints. they do it by their internal engine. "Qlik does not implement the network protocol (see important exceptions below) and for this reason, Qlik Replicate generally relies on the vendor of the source or target endpoint to offer encryption
Regards,
Sushil Kumar