cancel
Showing results for 
Search instead for 
Did you mean: 

Key in Encryption Scheme

SamLima
Level 7

What is the point of key in Encryption Scheme? where & how to use it, who has a privilege to use and how do we prevent others from use it?

32096.png


------------------------------
Sam Lima
------------------------------
2 REPLIES 2

SamLima
Level 7

Could you help me please?

@devneetmohanty07



------------------------------
Sam Lima
------------------------------

Hi Sam,

Encryption keys are used to securely store your credentials in the back end database. Whenever any credential is stored in database or if it is fetched as well from the database, the credential values are encrypted using this encryption key that we generate in either of the Blue Prism supported algorithms such AES 256 Cryptography, 192 Triple Des or AES 256 Rinjdael Managed algorithm.

Basically using these encryption schemes only the sensitive data is converted from plain-text to cipher text and vice versa which enables security and compliance for our data. Not only credentials can only be encrypted but we can also store our queue item data in an encrypted format as well.

Now, coming to the storage part is where there are two type of storage locations possible:

1) Application Server: We can store the Encryption key in the Blue Prism configuration file in the Application Server or in a separately managed file where custom controls can be given to any user and accesses can be restricted.

2) Database Server: This is generally not recommended and is basically used in case application server is not available in our Blue Prism infrastructure which has been setup. This is not secure as any one with a database access can use this key.

Coming to the part of who actually uses it, it is used by the application server if the Application Server deployment is chosen to basically convert plain text to cipher text and enable a secure transmission of plain text between client and server over its channel and also enable a secure transmission of cipher text between server and database over its channel.

When database deployment is chosen, the client device will query the key from the database and will locally perform the conversion of data from cipher text to plain text and vice versa.

------------------------------
----------------------------------
Hope it helps you out and if my solution resolves your query, then please mark it as the 'Best Answer' so that the others members in the community having similar problem statement can track the answer easily in future

Regards,
Devneet Mohanty
Intelligent Process Automation Consultant | Sr. Consultant - Automation Developer,
Wonderbotz India Pvt. Ltd.
Blue Prism Community MVP | Blue Prism 7x Certified Professional
Website: https://devneet.github.io/
Email: devneetmohanty07@gmail.com

----------------------------------
------------------------------
---------------------------------------------------------------------------------------------------------------------------------------
Hope this helps you out and if so, please mark the current thread as the 'Answer', so others can refer to the same for reference in future.
Regards,
Devneet Mohanty,
SS&C Blueprism Community MVP 2024,
Automation Architect,
Wonderbotz India Pvt. Ltd.