Encrypt fields by creating encryption configurations.
To configure Edge Encryption, you must be
connected to the instance through the proxy. Test all changes on a non-production instance before
making the changes to the production instance.
Define encryption keys
After setting up one or more proxies and configuring a default encryption key, the instance
verifies that the keys are available to all proxies. You cannot make an encryption key the
default key unless all proxies have the key. Once a default key is defined, you can create
encryption configurations.
Assign fields and attachments to be encrypted
Assigning fields and attachments to be encrypted means assigning an encryption type to the
field or attachment. Before marking a field as encrypted, evaluate these issues.
Marking a field to be encrypted expands the field size to store the encrypted data. The
process of expanding the field size can take a long time, depending on the number of records in
the table.