Edge Encryption application and proxy Edge Encryption has these components: the Edge Encryption applications installed via a plugin and the Edge Encryption proxy that can be downloaded from one of the menu options from the Edge Encryption application. Use the Edge Encryption application to specify which fields and attachments are encrypted, manage encryption rules, and schedule mass encryption jobs. The Edge Encryption proxy uses encryption rules to identify in an HTTP request what, if anything, needs to be encrypted and encrypts it before forwarding the request to the instance. For decryption, the Edge Encryption proxy looks at the HTTP responses for any encrypted data and decrypts it before sending the response back to the client. In order for this to happen, all HTTP requests and responses must go through the Edge Encryption proxy. This includes any requests originating from a browser, as well as any SOAP and REST requests.