Encryption at Rest

Encryption at Rest

SupportCenter Plus allows you to secure user data by encrypting columns in the database.
  1. For PGSQL database, pgcrypto, a cryptographic module of Postgres is used for encryption. 

  2. For MSSQL, master key, symmetric key, and certificate are used for encryption. 

Securing the data 

You can enable encryption when creating additional fields. Currently, encryption is supported only for the request additional fields of the types single line, pick list, and multi-line. 

To encrypt the data, select Encrypt the Field checkbox as shown below.



The encryption option is available only when creating an additional field. You cannot enable or disable encryption for existing additional fields. 
For more information, visit FAQs on EAR

    • Related Articles

    • FAQs on Encryption at Rest

      What are symmetric keys? A symmetric key or a secret key is an input to the encryption algorithm that helps produce a different output for different values provided at any given time. It is used for both encryption and decryption of data. What is a ...
    • Request- Additional Fields

      Based on your requirements, the default request record can be customized using different types of additional fields. This is useful to capture request-related additional information.   To configure additional fields:  1. Go to Admin>>Helpdesk ...
    • Configuring ADFS 3.0 as the Identity Provider

      Before you start the configuration process, make sure that the SupportCenter Plus application is running in the HTTPS mode. Then, configure SupportCenter Plus as a Relying Party Trust (RPT). This can be done either manually or using the metadata ...
    • SAML Authentication

      SAML Authentication   Security Assertion Markup Language(SAML) brings an easier alternative to conventional sign-in methods already available for online services. Users will no longer have to provide passwords specific to each service they access. ...
    • Read-Only User

      Read-Only User has exclusive permissions to read information in the database, modify select data, and execute secure query reports to improve the security level of the application. You can check the security level of the application under Global ...