Encrypted Checkbox
The 'Encrypted' checkbox is a control feature for the EDI Transports that ensures sensible transport settings data encryption by activating a sequence of security measures during the insertion process. This sequence of events is outlined in six steps, each interconnected and forming a robust framework of security.
User Interaction: The process begins with the user entering sensitive data into the application. Once the data is inputted, the user will select the 'Encrypted' checkbox. By doing this, the user signals to the application that the entered information requires additional security, essentially triggering the subsequent steps of data protection.
Secure Transport (HTTPS): Once the 'Encrypted' checkbox has been selected, the entered data is transmitted over the internet. During this phase, HTTPS protocol comes into play, encrypting the communication channel. This makes it impossible for any external entity to intercept or alter the data, providing the first level of data security.
Asymmetric Encryption: Following secure transmission, the data lands on the server where it undergoes encryption using asymmetric keys. This encryption form allows only the intended recipient to decrypt the information using a uniquely assigned private key. Asymmetric encryption serves as the second layer of protection, further securing the data after it has arrived at its destination server.
Symmetric Key Wrapping: As an added measure of security, the data encrypted asymmetrically is then enveloped with another layer of encryption using a symmetric key. Analogous to a sealed box being wrapped with a padlock, this layering technique ensures that even if someone has access to the box, they cannot open it without the unique combination. This step takes data security a notch higher by adding an extra lock to the data.
Secure Storage: Now, the doubly encrypted data is ready for storage. It is placed into a secure, encrypted cloud environment. This situation can be visualized as placing a vault within another vault - an added level of protection that makes unauthorized access to the data incredibly difficult.
Access and Decryption: When the time comes to access the stored data, the protective layers applied earlier are reversed. The data is retrieved from the secure cloud storage, unwrapped from the symmetric key, and finally decrypted with the correct private key associated with the asymmetric encryption.
In conclusion, the 'Encrypted' checkbox initiates a sophisticated and interconnected sequence of events to safeguard sensitive data. The process ensures that data remains secure both in transit and at rest, offering comprehensive protection against unauthorized access throughout its lifecycle.
Encryption Deactivated
Encryption Activated
Deactivating the encryption:
If you want to deactivate the encryption just uncheck the 'Encrypted' checkbox, the sensible settings data will be unencrypted and only the HTTPS layer will be maintained during the storing and transport of the sensible settings of the transport.
Transports that support it:
E-mail transport.
S3 transport.