Restrict other Salesforce users from seeing custom text fields you want to keep private. Only users with the permission “View Encrypted Data” can see data in encrypted custom text fields.
Available in: both Salesforce Classic and Lightning Experience
Available in: Developer, Enterprise, Performance, Unlimited, and Database.com Editions
This information is about Classic Encryption and not Shield Platform Encryption.
Before you begin working with encrypted custom fields, review these implementation notes, restrictions, and best practices.
Encrypted fields are encrypted with 128-bit master keys and use the Advanced Encryption Standard (AES) algorithm. You can archive, delete, and import your master encryption key. To enable master encryption key management, contact Salesforce.
You can use encrypted fields in email templates but the value is always masked regardless of whether you have the “View Encrypted Data” permission.
If you have created encrypted custom fields, make sure that your organization has “Require secure connections (HTTPS)” enabled.
If you have the “View Encrypted Data” permission and you grant login access to another user, the user can see encrypted fields in plain text.
Only users with the “View Encrypted Data” permission can clone the value of an encrypted field when cloning that record.
Only the <apex:outputField> component supports presenting encrypted fields in Visualforce pages.
Encrypted text fields:
Cannot be unique, have an external ID, or have default values.
For leads are not available for mapping to other objects.
Are limited to 175 characters because of the encryption algorithm.
Are not available for use in filters such as list views, reports, roll-up summary fields, and rule filters.
Cannot be used to define report criteria, but they can be included in report results.
Are not searchable, but they can be included in search results.
Are not available for: Salesforce Classic Mobile, Connect Offline, Salesforce for Outlook, lead conversion, workflow rule criteria or formulas, formula fields, outbound messages, default values, and Web-to-Lead and Web-to-Case forms.
Encrypted fields are editable regardless of whether the user has the “View Encrypted Data” permission. Use validation rules, field-level security settings, or page layout settings to prevent users from editing encrypted fields.
You can still validate the values of encrypted fields using validation rules or Apex. Both work regardless of whether the user has the “View Encrypted Data” permission.
Encrypted field data is not always masked in the debug log. Encrypted field data is masked if the Apex request originates from an Apex Web service, a trigger, a workflow, an inline Visualforce page (a page embedded in a page layout), or a Visualforce email template. In other cases, encrypted field data isn’t masked in the debug log, like for example when running Apex from the Developer Console.
Existing custom fields cannot be converted into encrypted fields nor can encrypted fields be converted into another data type. To encrypt the values of an existing (unencrypted) field, export the data, create an encrypted custom field to store that data, and import that data into the new encrypted field.
Mask Type is not an input mask that ensures the data matches the Mask Type. Use validation rules to ensure that the data entered matches the mask type selected.
Use encrypted custom fields only when government regulations require it because they involve more processing and have search-related limitations.
This page is about Classic Encryption, not Shield Platform Encryption.