Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

JS7 encryption/decryption can be integrated in a number of ways. Find below a few frequently used scenarios.

Use with Password Managers

  • Password Manager products are used for lifecycle management of secrets, i.e. to create, to update, to rotate and to delete secrets.
  • Password Manager products typically offer one or more of the following interfaces:
    • Command Line Interface: The Password Manager CLI can be executed to retrieve a secret. The JS7 encryption scripts can be used to encrypt the secret for later use with JS7 products.
    • Event interface: The Password Manager triggers events when a secret is changed. Typically Password Managers offer hooks to forward changed secrets to applications such as JS7. This includes an automation scenario when passwords are rotated at regular basis. Hooks can include to execute a shell script, to implement a REST API call etc.
  • For CLI/Event integration the following JS7 interfaces can be used:
  • The recommended architecture includes that the Password Manager forwards changed secrets to JS7.
    • It is not an option that JS7 will access the Password Manager in order to check if a secret changed.
    • One reason being that this approach will just shift security risks as JS7 would have to authenticate with the Password Manager at run-time. Availability and accessibility of the Password Manager would be crucial which is a bad idea considering high availability of the job scheduling solution.
    • Another reason being that the Password Manager knows the point in time when a secret is changed.

Use with Jobs

Key Distribution

Keys can be distributed in a number of ways. Find a few frequently used scenarios.

Use with a Password Manager Product

  • Password Manager products offering hooks to forward secrets to JS7 should encrypt secrets with the receiving Agent's Certificate or Public Key. If more than one Agent needs access to the same sensitive information,
    • the same secret can be encrypted a number of times using individual Certificates/Public Keys per Agent (recommended), 
    • the secret can be encrypted once and the same Private Key can be shared by a number of Agents.
  • Certificates and Public Keys include no sensitive information. There is no harm in making an Agent's Certificate available from a PEM file known to the Password Manager product.

Use with Jobs

Users should create individual Private Keys and Certificates for encryption/decryption of secrets.

...

:

Further Resources

...