Maintain transparent data encryption
- Last Updated: March 30, 2020
- 2 minute read
- OpenEdge
- Version 12.2
- Documentation
Once you have established your encryption policies and all your data is encrypted, you will need to perform some policy maintenance. Periodically, your encryption policies should be updated with a new key. A new key keeps the encryption cipher the same, but provides new input to the cipher algorithm. The following figure depicts the periodic updating of encryption policies in the life cycle of encrypted data.

Encryption policies are rekeyed in several ways. See one of the following sections for more information:
- To rekey a policy with Data Admin, see Rekey encryption policies with the Data Administration tool.
- To rekey a policy from the command line, see Rekey an encryption policy with PROUTIL EPOLICY.
- To rekey a policy with OpenEdge SQL, see OpenEdge SQL support for transparent data encryption.
The following guidelines apply to object encryption policies:
- There can be no more than two active (current and previous) encryption policies associated with a database object.
- If one policy exists for a database object (the current policy), you can create a new version of the policy. The new version becomes the current policy and the other becomes the previous.
- If two policies (current and previous) exist for an object, you can not create another version of the policy until all data encrypted with the "previous" policy, is migrated to the "current" policy.
You can also view the history of an encryption policy. See View encryption policy history in the Data Administration tool for instructions.