Field Encryption Support via Key Ring

In this release the system supports defining key rings for symmetric encryption keys and hash keys for application field encryption. Previously the system only supported application field encryption using keys defined in the keystore.

The following points highlight functionality provided by this feature.

  • A key ring business object is provided for defining AES symmetric keys to use for field encryption.  
  • A key ring business object is provided for defining HMAC hash keys to use for hashing values for search purposes.
  • The Field Encryption feature configuration option now supports mnemonics for referencing a key ring and a hash key ring instead of an alias key and a hash alias key.
  • A new batch control is provided to encrypt all the data configured to be encrypted for a given maintenance object. This batch control is used for initially encrypt data as well as to manage key rotation.

Using key rings to define encryption and hash keys allows for more streamlined cryptography key definition for application encryption. In addition, the system supports key rotation.

Steps to Enable

Provide the required access before using the feature. Details are in the Access #Requirements section.

Tips And Considerations

Implementations that currently use encryption keys defined in a keystore can move to using key rings for defining the encryption keys.

Key Resources

Access Requirements

System administrators should grant users access to the application service F1-FIELDENCRYPTBOAS, with appropriate access modes to maintain key rings for the new key ring use cases. Administrators should grant users access to the application service F1-FLENC, with the Execute access mode for uses that need to submit the batch job to mass encrypt, re-encrypt data.