Managing the default software encryption key

Trust Protection Foundation has the ability to encrypt its database with a software encryption key.

IMPORTANT  When used, the CyberArk Trust Protection Foundation - Self-Hosted software key is critical to Trust Protection Foundation’s functionality. Without it, Trust Protection Foundation cannot access the Trust Protection Foundation database. Consequently, it is strongly recommended that you back up the software key to a secure location. In the event of a system failure, you can restore the key so Trust Protection Foundation can access your system data. For information on backing up and restoring the software key, see Backing up the software encryption key.

By default, this same encryption key is used to encrypt certificate private keys, Credential objects, and SSH keys.

You manage the CyberArk Trust Protection Foundation - Self-Hosted software key in the CyberArk Configuration Console, or through the command line client.