Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Consider the parties involved and related use cases:
    • A job executed on Agent A should be parameterized by a variable holding a secret.
    • A job executed on Agent B retrieves a secret that should be forwarded to the job on Agent A and possibly to other Agents too.
  • Use of asymmetric keys allows 
    • to create and to store a Private Key on Agent A.
    • to use Agent A's Certifidate Certificate or Public Key on Agent B or on any other system involved.
    • to manage encryption and decryption like this:
      • create a symmetric one-time key and an encrypted copy of the key from Agent A's Certificate/Public Key.
      • encrypt the value of a variable with the one-time key.
      • drop the one-time key and forward the encrypted copy of the one-time key and the variable holding the encrypted value to Agent A.
      • only Agent A will be able to decrypt the encrypted one-time key using its Private Key which provides the symmetric key required to decrypt the variable's value.
  • Find details from JS7 - Encryption and Decryption.

...