A Primer on field encryption

This tip describes procedures for field encryption

As many developers know, Notes contains multiple layers of encryption technologies. An entire Notes database can

be encrypted, so that someone cannot open the database just by coming into possession of it. Network traffic between the Notes client and a Domino server can be encrypted, to prevent someone from listening in on the line. And individual fields can be encrypted, so that only certain users can see the data in those fields.

Field-level encryption is one of the most powerful, but under-utilized, security mechanisms in Notes. This article contains a brief overview of this important feature, with pointers to longer articles for readers who want more information. I also include a sample database, so you can try encryption yourself.

Field-level encryption operates on designated fields in a Notes document, which you choose when designing a Notes form. When you encrypt a document, all the fields that you designated are encrypted. Any other fields are not. It is common to leave some field non-encrypted so they can appear in plaintext in views.

Field-level encryption can use two types of keys – a secret key that is stored in a Notes ID file, or the public key associated with a Notes ID itself. For someone to read a document that is encrypted with a secret key, the reader must have that secret key. So you must give the key to the reader and they must import the key to their Notes ID file. For someone to read a document that is encrypted with a public key, the reader has to have the private key associated with that public key. In other words, the reader has to be the person that you intended to read the document.

Encryption of a Notes document is triggered by the presence of the special fields SecretEncryptionKeys and PublicEncryptionKeys in a document. If one of these fields is present (and nonblank) the document is encrypted using the key(s) specified there.

There are advantages and disadvantages to secret keys versus public keys for encrypting documents. Secret keys are the right choice when many people will have rights to read the document. You can create a single secret key, and then give the key to all the people who will be allowed to read the document. (But make sure you give them the key in a secure way.) Public keys have the advantage that you don't have to give anything to anyone. Each intended reader already has the private key they need in their Notes ID. Public key encryption is useful when there are a relatively small number of readers, so it is easy to list them all in the PublicEncryptionKeys field of the document.

Click here to view the Chuck Connell's Secret Field Tests download; Field Encription Personal Key download; and Field Encryption Key1 download:

For Further Information

Using Field Encryption In Applications This article introduces the basic theory of field-level encryption and shows you how to implement it in your Domino applications. From Iris Today in 9/01 for R5.

Notes Encryption: Locks for a Digital World-- An overview of data encryption in general, and Notes encryption specifically. From Iris Today in 6/98 for R4.6. Still lots of valuable information though.

Sample database Used to develop this article. The database takes some of its ideas from Richard Schwartz's article above, but is simpler and shows fewer options. The keys Chuck's Personal Key and Key1 are used in the sample database and can be downloaded from .

Chuck Connell

Home page

Outsourced administration services for Domino and Notes

http://www.DominoSecurity.org The best source for security information about Domino and Notes

This was first published in August 2002

Dig deeper on Lotus Notes Domino Administration Tools



Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:



  • iSeries tutorials

    Search400.com's tutorials provide in-depth information on the iSeries. Our iSeries tutorials address areas you need to know about...

  • V6R1 upgrade planning checklist

    When upgrading to V6R1, make sure your software will be supported, your programs will function and the correct PTFs have been ...

  • Connecting multiple iSeries systems through DDM

    Working with databases over multiple iSeries systems can be simple when remotely connecting logical partitions with distributed ...