Thank you for your feedback.
Form temporarily unavailable. Please try again or contact to submit your comments.

Edge Encryption application and proxy

Log in to subscribe to topics and get notified when content changes.

Edge Encryption application and proxy

Edge Encryption has these components: the Edge Encryption applications installed via a plugin and the Edge Encryption proxy that can be downloaded from one of the menu options from the Edge Encryption application.

Use the Edge Encryption application to specify which fields and attachments are encrypted, manage encryption rules, and schedule mass encryption jobs.

The Edge Encryption proxy uses encryption rules to identify in an HTTP request what, if anything, needs to be encrypted and encrypts it before forwarding the request to the instance. For decryption, the Edge Encryption proxy looks at the HTTP responses for any encrypted data and decrypts it before sending the response back to the client. In order for this to happen, all HTTP requests and responses must go through the Edge Encryption proxy. This includes any requests originating from a browser, as well as any SOAP and REST requests.