The configuration directory used by keyring_okv as the location for its support files should have a restrictive mode and be accessible only to the account used to run the MySQL server. For example, on Unix and Unix-like systems, to use the /var/lib/mysql/mysql-keyringokv directory, the following commands, executed as root,
-
Create the directory and set its mode and ownership.
|
›_ Console |
|---|
|
-
To be usable during the server startup process, keyring_okv must be loaded using the -early-plugin-load option. Also, set the keyring_okv_conf_dir system variable to tell keyring_okv where to find its configuration directory. Edit the /etc/my.cnf file and add the plugin into the mysqld section.
|
›_ Console |
|---|
|
-
Make sure you have Downloaded the CA.pem, cert.pem, and key.pem to our MySQL client under the SSL directory and give permission with mysql.
|
›_ Console |
|---|
|
-
In the configuration directory, create a file named okvclient.ora. It should have following format:
|
›_ Console |
|
-
Set the permissions on these files.
|
›_ Console |
|---|
|
-
After completing the preceding procedure, restart the MySQL server. It loads the keyring_okv plugin and keyring_okv uses the files in its configuration directory to communicate with ESKM.
-
Verify that the keyring_okv plugin is working.
|
mysql› |
|---|
|