Application-Level Encryption

Keyfactor ACME uses data encryption for sensitive data—such as EAB HMAC keys—stored in the Keyfactor ACME database. This option encrypts only the data in the database deemed to be of a sensitive nature, not the entire database. By default, the data is encrypted using SQL encryption, but you have the option to add a second level of security with application-level encryption. If you choose to enable this option, you will need an encryption methodology for this purpose. For Windows installations under IIS, this would typically be a certificate installed in the Personal Certificate store of the Local Computer on each Keyfactor ACME server. For container installations under Kubernetes, there are a variety of options (see Container Installations (Kubernetes)).

Application-level encryption uses AES-256 encryption to provide for FIPS compliance.

Windows Installations (IIS)

Application-level encryption for Windows installations under IIS can be approached in a couple of different ways:

Note:  In an environment where there are multiple Keyfactor ACME servers pointing to the same database, each server running a Keyfactor ACME instance will need to have the same encryption methodology (e.g. the certificate AND the corresponding private key).
Container Installations (Kubernetes)

Application-level encryption for container installations under Kubernetes can be approached in a couple of different ways:

The following are some example configurations.