Creating protection policy
To create a protection policy:
Open Application Data Protection.
In the left pane, click Protection Policies.
On the Protection Policies screen, click Create Protection Policy.
On the Create Protection Policy screen, enter/select the following fields.
Field Description Name Unique name for protection policy. Key Name of the key. Tweak Tweak data to be used in cryptographic operations.
This field is mandatory if tweak algorithm is specified.
If tweak algorithm is NONE, specify 16 characters HEX encoded string.Tweak algorithm Tweak algorithm to be used in cryptographic operations.
Possible options
—SHA1
—SHA256
—NONEIV Initialization vector to be used in cryptographic operations.
This field is mandatory if the algorithm is AES/GCM.
The value must be a HEX encoded string.Algorithm Algorithm to be used in cryptographic operations. Character Set Name of the character set. Refer to Creating Character Sets for details. Allow null or single character inputs Select the checkbox to allow null and single character inputs pass through untransformed.
If this checkbox is not selected, row transformation fails for the single character values.
This field is only applicable in case of FPE and FF1 algorithms.Click Create. A message stating, Protection policy created successfully is displayed and the newly created policy is listed on the Protection Policies page.
Note
When a protection policy is created, Version 1 is assigned to that policy. The version is incremented with each updation.