
A Definitive Guide to Apache ShardingSphere
By :

After covering some distributed database real-world examples that will come in handy, let's now move on to some database security examples.
In this section, the first case will get you started with data encryption, while the following case will cover checking privileges.
This case demonstrates how to use ShardingSphere-Proxy to dynamically manage rule configuration, connecting PostgreSQL to ShardingSphere-JDBC and implementing a data encryption application.
To understand what the deployment would look like, you can refer to Figure 12.11:
Figure 12.11 – Case 3 deployment architecture
For this case, you can use either ShardingSphere-Proxy or JDBC, and therefore, in the following sections, you will find an example configuration for both clients.