Application-Level Encryption

Keyfactor Command uses data encryption for sensitive data—such as private keys for certificates—stored in the Keyfactor Command database (see SQL Server). This option encrypts only the data in the database deemed to be of a sensitive nature, not the entire database. By default, the data is encrypted using SQL encryption, but you have the option to add a second level of security with application-level encryption. If you choose to enable this option, you will need an encryption methodology for this purpose. For Windows installations under IIS, this would typically be a certificate installed in the Personal Certificate store of the Local Computer on each Keyfactor Command server. For container installations under Kubernetes, there are a variety of options (see Container Installations Under Kubernetes).

Application-level encryption uses AES-256 encryption to provide for FIPS compliance.

Windows Installations Under IIS

Application-level encryption for Windows installations under IIS can be approached in a couple of different ways:

Note:  In an environment where there are multiple Keyfactor Command servers pointing to the same database, each server running a Keyfactor Command instance will need to have the same encryption methodology (e.g. the certificate AND the corresponding private key).
Container Installations Under Kubernetes

Application-level encryption for container installations under Kubernetes can be approached in a couple of different ways:

The following are some example configurations.