Create module access policies to decide which users and scripts can access data encrypted by a cryptographic module.

Before you begin

Role required: sn_kmf.cryptographic_manager or sn_kmf.admin

About this task

Field Encryption supports role-based module access policies and additional configuration options become available with (CLE_Ent) functionality.
  • Configure the specific cryptographic operation in module access policies for cryptographic modules that support symmetric operations. For instance, a user can be enabled to encrypt data but not decrypt data.
  • Set a default module access policy value or according to a cryptographic module.
  • Associate script versions where changes to the script are tracked and invalidate the script policy providing better security for script-type module access policies.
CLE_Ent functionality is available with a paid subscription. Refer to for supported features and options available with each offering. For more information, see Field Encryption Enterprise.
Note: The default behavior of the module access policies (MAPs) is Reject to help prevent any unauthorized access, unless explicitly declared in MAP records.

Procedure

  1. Navigate to All > Key Management > Module Access Policies > All.
    If you don't create a cryptographic module configured for Symmetric Data Encryption/Decryption, an auto-generated module access policy is created and listed in the table.
  2. Select New.
    • Select Specify purpose to choose a Crypto spec and set the Granular operation.When selecting the Specify purpose check box, Cryptographic spec fields are available.
    • With cryptographic specifications for symmetric data encryption/decryption and symmetric wrapping/unwrapping, the Granular operation field is available if you select the Specify purpose check box.

      Granular operation list.

  3. Complete the form.
    Module Access Policies fields
  4. Select Submit.
    Warning:
    For legacy encryption support users:
    If you're using the non-enterprise version of Field Encryption, you're limited to five modules. If you have exceeded this limit, you receive the following warning:
    This insertion exceeds the number of published modules allowed for Field Encryption entitled with the subscription product. The Enterprise subscription for Field Encryption is required for additional modules. Please reach out to your Account team.
  5. Select the policy name associated with the cryptographic module that you want to examine.
    Using Script type module access policy:

    A module access policy is auto-generated based on the default access setting when the script is run. The module name is preceded with AutoGen-. For example, the Module-TestPolicy module is listed as AutoGen-Module-TestPolicy in the Policy name column.

    The Cryptographic Caller Policy form lists the caller policy that you selected. The Target Scope field specifies the scope of the script attempting to use the module. See for additional information.

    Note: A maximum of five module access policies are permitted with Field Encryption. See for configuration options.