Discussion

4
Replies
233
Views
Close popover
Mohamed Mowafy (MohamedMowafy)
PEGA
Senior System Architect
Pegasystems Inc.
GB
MohamedMowafy Member since 2019 2 posts
PEGA
Posted: January 23, 2021
Last activity: 6 days 3 hours ago

Implementing BLOB and Property Encryption

If you want to encrypt the BLOB and properties, either in a new or an existing application; the attached implementation guide will help you step by step. The document also includes a deployment plan to make sure the encryption is applied correctly in other environments. 

@MITTS 

Contents:

  1. General    
    1.     Pre-Project Considerations    
  2. Setup    
    1.     Step 1: Configure KeyStore    
    2.     Step 2: Activate KeyStore    
  3. Encryption of BLOB    
    1.     Removal of class instances    
    2.     Encrypt BLOB    
  4. Encryption of exposed properties    
    1.     Access Control Policy    
    2.     Column Length    
  5. Encryption in Exposed Properties – Issues and Design Patterns    
    1.     Section Rules – Visibility conditions in expressions    
    2.     Validation Rules    
    3.     Data Transforms/Activities    
    4.     Full Text Search    
    5.     Reporting    
  6. BIX    
  7. Deployment    

 

***Edited by Moderator Marissa to update Content Type from Idea to Discussion; added Developer Knowledge Share tag***
Pega Customer Service 8.3 Pega Platform 8.3.1 Security Cross-Industry Lead System Architect Senior System Architect Developer Knowledge Share