Encrypted attributes in a replication environment
During replication, the attributes must be replicated over secure connections. The replication process also determines whether any incompatible features are used between the supplier and the consumer.
For instance, if the supplier has encrypted attributes while the consumer does not support encryption, then the replication process does not start. Also, if the network includes servers that run with earlier releases, replicated schema changes fails.
It is recommended that servers share a crypto key, and that the administrator must ensure that attributes are encrypted on all servers. If the crypto keys differ between supplier and consumer, changes are decoded and replicated as clear text.