Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The preferred solution with JS7 is to use of asymmetric keys:

  • Encryption and decryption is performed directly by the related jobs.
  • No JS7 product is involved in encryption/decryption as otherwise the JS7 product would know the keys involved that potentially could be compromised by logging, database persistence etc.
  • Performing encryption/decryption by jobs limits the attack surface to the OS process executing the job. The job implementation is controlled by the user who can verify secure operation.

...

  • The solution is available
    • from Unix for Linux and MacOS® using bash shell,
    • from Windows, Linux and MacOS® using PowerShell version 7.x.
  • The solution is intended as a baseline example for customization by JS7 users and by SOS within the scope of professional services.

Resources