What Is This?
Pleasant Password Server already encrypts your passwords at the application level. Adding an encrypted PostgreSQL database creates a second layer of protection β your data is encrypted directly inside the database files using Percona TDE (Transparent Data Encryption).
This means that even if someone gains access to the raw database files on disk, they cannot read your passwords without the encryption key.
Good news: Encryption is completely automatic. After setup, Pleasant Password Server works exactly the same β no workflow changes needed.
Choose Your Setup Guide
Select the guide that matches your server operating system.
Windows Server 2019+
Uses WSL2 or Hyper-V. Best for production servers and business environments.
Windows 10 or 11 (Pro / Enterprise)
Uses Docker Desktop. Best for small teams, evaluation, or development.
Linux Server (Native)
Ubuntu 22.04+, RHEL 8+, or Debian 12+. No Docker needed. Best performance and simplest setup.
Database Encryption Recommendation
| Setup | Database | Encryption | Best For |
|---|---|---|---|
| Basic | SQLite (default) | AES-256 built-in | Small teams, Compliance (PCI-DSS, HIPAA, GDPR) |
| Standard | MSSQL + TDE | AES-256 (TDE) | Better performance, Compliance (PCI-DSS, HIPAA, GDPR) |
| Performance |
PostgreSQL + TDE | AES-256 (TDE) | Best performance, Compliance (PCI-DSS, HIPAA, GDPR) |
Note: Percona's PostgreSQL pg_tde is OpenSource and reached General Availability (GA) in mid-2025. It has undergone an independent security review with no major vulnerabilities found and is production-ready.
Already Using Pleasant Password Server?
If you already have Pleasant Password Server running, you can migrate your existing data simply by first backing up your database, switching your connection type/string, and restoring that backup file into your new database instance.
The database guide includes these migration steps. Before you start:
- Create a backup first: Go to Settings β Database Backups β Backup Now.
- Setup: Select a setup guide from the options above.
- Switch your Database type: Configure your database connection.
- After Setup: Once your encrypted database is running, protect it with regular backups and learn about key rotation.