Key Material Types
Available in both Lightning Experience and Salesforce Classic (not available in all orgs). |
Available as an add-on subscription in: Enterprise, Performance, and Unlimited Editions. Requires purchasing Salesforce Shield. Available in Developer Edition at no charge. |
Types of Tenant Secrets
Tenant secrets are categorized according to the kind of data that they encrypt.
- Fields and Files (Probabilistic)
- Encrypts data using the probabilistic encryption scheme, including data in fields, attachments, and files other than search index files
- Field (Deterministic)
- Encrypts field data by using the deterministic encryption scheme
- Search Index
- Encrypts fields and other data governed by your encryption policy stored in search indexes. Available in orgs that don’t yet use the updated search index framework.
- Analytics
- Encrypts CRM Analytics data
- Event Bus
- Encrypts event messages that are stored temporarily in the event bus. For change data capture events, this secret encrypts data changes and the corresponding event that contains them. For platform events, this secret encrypts the event message including event field data.
You can have up to 50 active and archived tenant secrets of each type. For example, you can have 1 active and 49 archived Fields and Files (Probabilistic) tenant secrets and the same number of Analytics tenant secrets. This limit includes Salesforce-generated and key material that you supply.
If you run into this limit, destroy an existing key before reactivating, rearchiving, or creating a callout to another one. Before destroying a key, synchronize the data that it encrypts with an active key.
Root Keys and Data Encryption Keys
Some Salesforce data can be encrypted with a root key and data encryption key (DEK) pair.
- AWS Root Key
- A root key stored in AWS KMS and referenced by Salesforce, it controls the DEK used to encrypt Salesforce data. Available when External Key Management is enabled, and a connection to AWS KMS is configured.
- Salesforce Root Key
- Controls the DEK used to encrypt data.
- Search Index DEK
- Controlled by a root key, it encrypts all search indexes. Available in orgs that use the updated search index framework.