Using Field Encryption
- UpdatedJan 30, 2025
- 1 minute read
- Yokohama
- Now Platform Security
Use Field Encryption to manage access to encrypted data on your instances.
Related Content
- Create cryptographic module for Field Encryption
Create a Field Encryption cryptographic module to define the mechanisms used for cryptographic operations.
- Using multiple encryption modules
Multiple encryption modules enable data to be encrypted with more than one encryption module. If each module has its own access policy based on a role, for example, users with different roles can encrypt data on the same table but they can still be prevented from viewing each others encrypted data.
- Create a cryptographic specification for Field Encryption
After you create a cryptographic module, access the corresponding cryptographic specification to define the algorithm.
- Configure advanced algorithms for Field Encryption Enterprise
Create a cryptographic specification to define the algorithm for a cryptographic module. Customize the encryption specifications with advanced options that are available for Field Encryption Enterprise.
- Configure properties for customer-supplied keys
If the Field Encryption Enterprise plugin is enabled, you can use system properties to define key padding, ephemeral key pair size, and a key validity period of your customer-supplied keys.
- Encrypting fields and attachments
After you create your cryptographic modules, create encrypted field configurations and specify whether to encrypt a field on a table or encrypt attachments.
- Field Encryption Enterprise examples
These examples walk you through the encryption of fields and attachments using customer-supplied keys.