Table 40. Encryption impact of moving tables and indexes
If you are moving...
|
To...
|
Then...
|
A table or index from an unencrypted Type I area
|
An unencrypted Type I area
|
![*](bullet.png) Execution of this operation is open
![*](bullet.png) No change in encryption policy
![*](bullet.png) Object remains unencrypted
|
An encrypted Type I area
|
![*](bullet.png) Execution of this operation is restricted to an authenticated DBA
![*](bullet.png) No change in encryption policy (the policy for the destination area is applied to the object)
![*](bullet.png) Object is encrypted in the destination area
|
A Type II area
|
![*](bullet.png) Execution of this operation is open
![*](bullet.png) No change in encryption policy
![*](bullet.png) Object remains unencrypted
|
A table or index from an encrypted Type I area
|
An unencrypted Type I area
|
![*](bullet.png) Execution of this operation is restricted to an authenticated DBA
![*](bullet.png) No change in encryption policy (the source policy is for the entire area)
![*](bullet.png) Object is unencrypted in the destination area
![*](bullet.png) User is prompted to confirm the move and the resulting decryption of the object
|
An encrypted Type I area
|
![*](bullet.png) Execution of this operation is restricted to an authenticated DBA
![*](bullet.png) No change in encryption policy (the source and target policies are for the entire area)
![*](bullet.png) Object is encrypted in the destination area with encryption policy of the destination area
|
A Type II area
|
![*](bullet.png) Execution of this operation is restricted to an authenticated DBA
![*](bullet.png) A new encryption policy is created for the object (with the same cipher as the source area policy)
![*](bullet.png) Object is encrypted in the destination area
|
An unencrypted table or index from a Type II area
|
An unencrypted Type I area
|
![*](bullet.png) Execution of this operation is open
![*](bullet.png) No change in encryption policy
![*](bullet.png) Object remains unencrypted
|
An encrypted Type I area
|
![*](bullet.png) Execution of this operation is restricted to an authenticated DBA
![*](bullet.png) No change in encryption policy (the area policy of the destination area is used)
![*](bullet.png) Object is encrypted in the destination area with encryption policy of the destination area
|
A Type II area
|
![*](bullet.png) Execution of this operation is open
![*](bullet.png) No change in encryption policy
![*](bullet.png) Object remains unencrypted
|
An encrypted table or index from a Type II area
|
An unencrypted Type I area
|
![*](bullet.png) Execution of this operation is restricted to an authenticated DBA
![*](bullet.png) The encryption policy on the object is removed
![*](bullet.png) Object is unencrypted in the destination area
![*](bullet.png) User is prompted to confirm the move and the decryption of the object
|
An encrypted Type I area
|
![*](bullet.png) Execution of this operation is restricted to an authenticated DBA
![*](bullet.png) The encryption policy on the object is removed (and the encryption policy of the destination area is applied)
![*](bullet.png) Object is encrypted with the policy of the destination area
|
A Type II area
|
![*](bullet.png) Execution of this operation is restricted to an authenticated DBA
![*](bullet.png) No change in encryption policy (the object policy remains in use)
![*](bullet.png) Object remains encrypted
|