Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Table of Contents

Introduction

Jobs might require variables for parameterization that hold secrets. We find a number of requirements for management of such variables:

  • The secret should not be exposed to JS7 logging or to any instance of JS7 products that track variables.
    • For example, if a variable created by some job should be forwarded to a next job executed with a different Agent then the Controller and JOC Cockpit keep track of the variable.
      • The variable is available in the Agent's and the Controller's memory.
      • The variable is available in the Controller's journal, in JOC Cockpit's JS7 - History and in the JS7 - Database.
    • At no point in time the secret should be available to involved JS7 products, to the database or to the OS.
  • We find a number of inadequate approaches that do not make it for a secure solution:
    • Symmetric keys are a No-Go as they are available in two places and leave it up to the implementation where to store the key.
    • Obfuscation is a No-Go as it does not resist to any serious attackattacks.

The preferred solution with JS7 is to use of asymmetric keys:

  • JS7 - Encryption and decryption is Decryption can be performed directly by the by scripts that are used outside of JS7 products or by related jobs.
  • No JS7 product is directly involved in encryption/decryption as otherwise the JS7 product would know the keys involved that potentially could be compromised by logging, database persistence etc.
  • Performing encryption/decryption by jobs limits the attack surface to the OS process executing the job. The job implementation is controlled by the user who can verify secure operation.

For creation of Encryption Keys see JS7 - How to create X.509 Encryption Keys.

Asymmetric Keys

Encryption and decryption use asymmetric keys, for details see JS7 - Encryption and Decryption:

Encryption

Use with Variables

The value of a variable can be encrypted using shell scripts and cmdlets:

When executed from jobs then the encrypted secret can be stored to a variable that is made available to later jobs in the workflow.


Graphviz
templateGraphvizSubgraphs
digraph structs {
    compound=true;
    rankdir=LR;

    Secret [label="   Secret   ",style="filled",fillcolor="limegreen",fontname="Arial",fontsize="12pt"]
    Encrypted_Secret [label="   Variable holding Encrypted Secret   ",style="filled",fillcolor="dodgerblue",fontname="Arial",fontsize="12pt"]
    Certificate [shape="ellipse",label="Certificate / Public Key",style="filled",fillcolor="orange",fontname="Arial",fontsize="12pt"]

    Encrypt [shape="rectangle",label="Encrypt\njs7_encrypt.sh | .cmd\nInvoke-JS7Encrypt",fontname="Arial",fontsize="10pt",style="filled",fillcolor="white"] 

    subgraph encrypt {
        fontname="Arial";
        fontsize="12pt";

        Secret -> Encrypt; 
        Certificate -> Encrypt;
        Encrypt -> Encrypted_Secret [label="encrypt",fontname="Arial",fontsize="10pt"]; 
    }
}

Use with Job Resources

The value of a variable is encrypted and is stored to JS7 - Job Resources using shell scripts or cmdlets:

The Job Resource can be accessed by any jobs in the same or in other workflows.


Graphviz
templateGraphvizSubgraphs
digraph structs {
    compound=true;
    rankdir=LR;

    Secret [label="   Secret   ",style="filled",fillcolor="limegreen",fontname="Arial",fontsize="12pt"]
    Encrypted_Secret [label="   Job Resource Variable holding Encrypted Secret   ",style="filled",fillcolor="dodgerblue",fontname="Arial",fontsize="12pt"]
    Certificate [shape="ellipse",label="Certificate / Public Key",style="filled",fillcolor="orange",fontname="Arial",fontsize="12pt"]

    Encrypt [shape="rectangle",label="Encrypt\njs7_set_job_resource.sh\nSet-JS7-JobResource",fontname="Arial",fontsize="10pt",style="filled",fillcolor="white"] 

    subgraph encrypt {
        fontname="Arial";
        fontsize="12pt";

        Secret -> Encrypt; 
        Certificate -> Encrypt;
        Encrypt -> Encrypted_Secret [label="encrypt",fontname="Arial",fontsize="10pt"]; 
    }
}

Decryption

Encrypted secrets are made available from variables. This similarly works for variables that are created by predecessor jobs on the fly and by Job Resources. For shell jobs workflow variables are made available from OS environment variables.

Graphviz
templateGraphvizSubgraphs
digraph structs {
    compound=true;
    rankdir=LR;

    Encrypted_Secret [label="   Variable holding Encrypted Secret   ",style="filled",fillcolor="dodgerblue",fontname="Arial",fontsize="12pt"]
    Secret [label="   Secret   ",style="filled",fillcolor="limegreen",fontname="Arial",fontsize="12pt"]
    PrivateKey [shape="ellipse",label="Private Key",style="filled",fillcolor="orange",fontname="Arial",fontsize="12pt"]

    Decrypt [shape="rectangle",label="Decrypt\njs7_decrypt.sh | .cmd\nInvoke-JS7Decrypt",fontname="Arial",fontsize="10pt",style="filled",fillcolor="white"] 
 
    subgraph decrypt {
        fontname="Arial";
        fontsize="12pt";

        Encrypted_Secret -> Decrypt;
        PrivateKey -> Decrypt;
        Decrypt -> Secret [label="decrypt",fontname="Arial",fontsize="10pt"];
    }
}


The basic proceeding works like this:

  • Consider the parties involved and related use cases:
    • A job executed on Agent A should be parameterized by a variable holding a secret.
    • A job executed on Agent B retrieves a secret that should be forwarded to a the job on Agent A and possibly to other Agents too.
  • Use of asymmetric keys allows 
    • to create and to store a private key Private Key on Agent A.
    • to use Agent A's public key Certificate or Public Key on Agent B or on any other system involved.
    • to manage encryption and decryption like this:
      • create a symmetric one-time key and an encrypted copy of the key derived from Agent A's public keyCertificate/Public Key.
      • encrypt the value of a variable value with the one-time key.
      • drop the one-time key and forward the encrypted copy of the one-time key and the variable holding the encrypted value to Agent A.
      • only Agent A will be able to decrypt the encrypted one-time key using its private key Private Key which reveals provides the symmetric key required to decrypt the variable's value.

Solution Outline

The solution is provided from examples for download and can be used to automate encryption and decryption of variables.

  • The solution is available
    • from Unix for Linux and MacOS® using bash shell,
    • from Windows, Linux and MacOS® using PowerShell version 7.x.
  • The solution is intended as a baseline example for customization by JS7 users and by SOS within the scope of professional servicesFind details from JS7 - Encryption and Decryption.

Resources

...

Display children header