Top
Enterprise Postgres 17 Operation Guide

4.1 Configuring Communication Data Encryption

To encrypt communication data transferred between a client and a server, configure communication data encryption as described below.
Communication data encryption not only protects the communication content, but it also guards against man-in-the-middle (MITM) attacks (for example, data and password theft through server impersonation).

Table 4.1 Configuration procedure

Configuration procedure

1) Issue a certificate

2) Deploy a server certificate file and a server private key file

3) Distribute a CA certificate file to the client

4) Configure the operating environment for the database server

5) Configure the operating environment for the client


The following figure illustrates the environment for communication data encryption.

Figure 4.1 Environment for communication data encryption