OpenEdge usage
- Last Updated: February 11, 2026
- 1 minute read
- OpenEdge
- Version 13.0
- Documentation
Symmetric-key cryptography is used in OpenEdge in three ways:
- To provide Transparent Data Encryption of database blocks. For more information on Transprent Data Encryption, see OpenEdge Keystore, or Configure Transparent Data Encryption policies.
- To provide data privacy on Transport Layer Security (TLS) connections. TLS
is an implementation of a Public-Key Infrastructure (PKI). For more information on:
- PKI — See Public Key Infrastructure (PKI)
- TLS — See Public Key Infrastructure (PKI)
- OpenEdge support for TLS — See Transport Layer Security (TLS)
- To enable ABL applications to provide their own data privacy and integrity
functionality, OpenEdge provides symmetric-key cryptography features directly in ABL. In
ABL, these features are supported by the:
GENERATE-PBE-KEYfunction (see Password-based encryption (PBE)GENERATE-PBE-SALTfunction (see Password-based encryption (PBE))GENERATE-RANDOM-KEYfunctionENCRYPTandDECRYPTfunctions- XCODE utility for encrypting source code. See Manage ABL Applications for more information
SECURITY-POLICYsystem handle to provide a consistent cryptography policy for specifying keys and encryption algorithms for the above functions; note that theXCODE-SESSION-KEYattribute of this handle allows you to provide session-specific keys for encrypted source code
For more information on the cryptographic features of ABL, see the sections on cryptography in OpenEdge Programming Interfaces.
CAUTION: Progress Software Corporation recommends that you use the cryptographic features of ABL only if you have a well-grounded understanding of cryptography and its usage. Use of cryptography without the necessary preparation can result in permanent data loss. In general, cryptography can have significant negative impact on application performance and decrease effective data compression for data stored in a database.