If you want to encrypt the BLOB and properties, either in a new or an existing application; the attached implementation guide will help you step by step. The document also includes a deployment plan to make sure the encryption is applied correctly in other environments.
@MITTS
Contents:
- General
- Pre-Project Considerations
- Setup
- Step 1: Configure KeyStore
- Step 2: Activate KeyStore
- Encryption of BLOB
- Removal of class instances
- Encrypt BLOB
- Encryption of exposed properties
- Access Control Policy
- Column Length
- Encryption in Exposed Properties – Issues and Design Patterns
- Section Rules – Visibility conditions in expressions
- Validation Rules
- Data Transforms/Activities
- Full Text Search
- Reporting
- BIX
- Deployment
