Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

...

...

...

...

...

...

...

...

...

...

...

...

...

Key

...

management

Key Management management lifecycle (Secret Keyssecret keys, PGP keys)

  • The key management life cycle includes creation, storage, usage, and renewal of keys.
  • Key Creation creation - Adeptia recommends using that you use industry/third party tools as defined by client security policies and procedures.
  • Key Storage storage – Adeptia provides key storage capabilities for use within the product.
  • Key Renewal renewal – Managed outside of the product as per client’s security policies and procedures.

SSL Certificate Management certificate management (CSR, CA)

  • CSR’s CSR for the server is generated manually using keytool utility that comes with the installation.
  • CSR’s will need CSR needs to be CA signed and imported into to the product installation as a part of SSL Configurationconfiguration.
  • CA Certificate renewal is managed externally as per client’s security policies and procedures.

Using Secret Keyssecret keys

  • A secret key helps you to create encryption or decryption activity that are required to encrypt outgoing data and decrypt incoming data respectively.

Creating Public/Private KeysCreating Truststore

Managing Secret Key

Provider API

...

security (REST, SOAP)

...

REST and

...

SOAP

...

Providers can be

...

configured to use API Key (Basic Authorization) security. 

  •  Currently, OAuth2 is not supported for REST

    API

    and SOAP providers.

  •  Key

    Creation

    creation - Adeptia recommends

    using

    that you use industry/

    3rd

    third party tools as defined by client security policies and procedures.

Encryption at Rest (EAR)

  •        CurrentlyCurrently, encryption at rest for data files created and used in processed flows Process Flows is provided at a system level.
  •        Encryption Encryption at rest can introduce some performance overheads due to decryptions.

Encryption of the Data at Rest

...