Amazon Redshift Connectors > Part II: Data Integration with Amazon Redshift V2 Connector > Connections for Amazon Redshift V2 > Configure client-side encryption with the serverless runtime environment
  

Configure client-side encryption with the serverless runtime environment

You can use the serverless runtime environment to configure client-side encryption when you connect to Amazon Redshift.
Before you configure client-side encryption using the serverless runtime environment, configure the .yml serverless configuration file.
Configure the .yml serverless configuration file
Perform the following steps to configure the .yml serverless configuration file in the serverless runtime environment so that Amazon Redshift V2 Connector can use client-side encryption:
  1. 1Copy the following code snippet to a text editor:
  2. version: 1
    agent:
    agentAutoApply:
    general:
    jdk:
    security:
    policyJars:
    - local_policy.jar
    - US_export_policy.jar
  3. 2Ensure that the syntax and indentations are valid, and then save the file as serverlessUserAgentConfig.yml in the following AWS or Azure location:
  4. <Supplementary file location>/serverless_agent_config
    When the .yml file runs, the policy jars are copied from the AWS or Azure location to the serverless agent directory.
  5. 3After you update the .yml configuration file, redeploy the serverless runtime environment.
Specify the master symmetric key in the connection properties and the client-side encryption type in the advanced source and target properties.