User Tools

Site Tools


technical_information

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Next revisionBoth sides next revision
technical_information [2018/10/30 09:04] – [Intermediary storage] lucytechnical_information [2018/10/30 11:36] lucy
Line 3: Line 3:
 The information herein applies mostly to VM-based LUCY distributions (VMware Workstation, VMware ESXi, VirtualBox and Amazon) as LUCY installations on custom dedicated servers may have different configurations. The LUCY server contains different components. Those components are already installed when using our images (Vmware/AMI etc.) or are installed when using the Linux installer. The information herein applies mostly to VM-based LUCY distributions (VMware Workstation, VMware ESXi, VirtualBox and Amazon) as LUCY installations on custom dedicated servers may have different configurations. The LUCY server contains different components. Those components are already installed when using our images (Vmware/AMI etc.) or are installed when using the Linux installer.
  
-{{ setup_all_in_one.png?600 }}+{{ setup_all_in_one.png?400 }}
  
 ==== LUCY Vmware technical components ==== ==== LUCY Vmware technical components ====
Line 64: Line 64:
  
 ==== Database ==== ==== Database ====
-LUCY stores all related data in **PostgreSQL 9.1** RDBMS. All sensitive information stored in there is encrypted as PostgreSQL is available only for internal connections. There are no configurable options for the DB encryption.  The encryption is mandatory for all data and is performed automatically with the following settings:+LUCY stores all related data in **PostgreSQL 9.6** RDBMS. All sensitive information stored in there is encrypted as PostgreSQL is available only for internal connections. There are no configurable options for the DB encryption.  The encryption is mandatory for all data and is performed automatically with the following settings:
  
   * It’s a column-level encryption performed on both the application and DB layers before storing any data in the database. We don’t use TDE (transparent database encryption), as PostgreSQL doesn’t support it, so we encrypt only a subset of columns in DB – everything that holds client/attack/recipient-related data.    * It’s a column-level encryption performed on both the application and DB layers before storing any data in the database. We don’t use TDE (transparent database encryption), as PostgreSQL doesn’t support it, so we encrypt only a subset of columns in DB – everything that holds client/attack/recipient-related data. 
technical_information.txt · Last modified: 2022/11/25 11:17 by lucy