6.4.4 The MySQL Keyring

6.4.4.1 Keyring Components Versus Keyring Plugins
6.4.4.2 Keyring Component Installation
6.4.4.3 Keyring Plugin Installation
6.4.4.4 Using the component_keyring_file File-Based Keyring Component
6.4.4.5 Using the component_keyring_encrypted_file Encrypted File-Based Keyring Component
6.4.4.6 Using the keyring_file File-Based Keyring Plugin
6.4.4.7 Using the keyring_encrypted_file Encrypted File-Based Keyring Plugin
6.4.4.8 Using the keyring_okv KMIP Plugin
6.4.4.9 Using the keyring_aws Amazon Web Services Keyring Plugin
6.4.4.10 Using the HashiCorp Vault Keyring Plugin
6.4.4.11 Using the Oracle Cloud Infrastructure Vault Keyring Plugin
6.4.4.12 Supported Keyring Key Types and Lengths
6.4.4.13 Migrating Keys Between Keyring Keystores
6.4.4.14 General-Purpose Keyring Key-Management Functions
6.4.4.15 Plugin-Specific Keyring Key-Management Functions
6.4.4.16 Keyring Metadata
6.4.4.17 Keyring Command Options
6.4.4.18 Keyring System Variables

MySQL Server supports a keyring that enables internal server components and plugins to securely store sensitive information for later retrieval. The implementation comprises these elements:

Warning警告

For encryption key management, the component_keyring_file and component_keyring_encrypted_file components, and the keyring_file and keyring_encrypted_file plugins are not intended as a regulatory compliance solution. Security standards such as PCI, FIPS, and others require use of key management systems to secure, manage, and protect encryption keys in key vaults or hardware security modules (HSMs).

Within MySQL, keyring service consumers include:

For general keyring installation instructions, see Section 6.4.4.2, “Keyring Component Installation”, and Section 6.4.4.3, “Keyring Plugin Installation”. For installation and configuration information specific to a given keyring component or plugin, see the section describing it.

For information about using the keyring functions, see Section 6.4.4.14, “General-Purpose Keyring Key-Management Functions”.

Keyring components, plugins, and functions access a keyring service that provides the interface to the keyring. For information about accessing this service and writing keyring plugins, see Section 5.6.9.2, “The Keyring Service”, and Writing Keyring Plugins.

6.4.4.1 Keyring Components Versus Keyring Plugins
6.4.4.2 Keyring Component Installation
6.4.4.3 Keyring Plugin Installation
6.4.4.4 Using the component_keyring_file File-Based Keyring Component
6.4.4.5 Using the component_keyring_encrypted_file Encrypted File-Based Keyring Component
6.4.4.6 Using the keyring_file File-Based Keyring Plugin
6.4.4.7 Using the keyring_encrypted_file Encrypted File-Based Keyring Plugin
6.4.4.8 Using the keyring_okv KMIP Plugin
6.4.4.9 Using the keyring_aws Amazon Web Services Keyring Plugin
6.4.4.10 Using the HashiCorp Vault Keyring Plugin
6.4.4.11 Using the Oracle Cloud Infrastructure Vault Keyring Plugin
6.4.4.12 Supported Keyring Key Types and Lengths
6.4.4.13 Migrating Keys Between Keyring Keystores
6.4.4.14 General-Purpose Keyring Key-Management Functions
6.4.4.15 Plugin-Specific Keyring Key-Management Functions
6.4.4.16 Keyring Metadata
6.4.4.17 Keyring Command Options
6.4.4.18 Keyring System Variables