Questions tagged [key-management]
93 questions
0
votes
1 answer
How to handle key rotations in azure key vault
I have to implement key rotations in my application. I have some idea how to do that but I am not sure if everything is OK with that solution.
Ok, lets start. I have couple places in my application where I use the KeyVaultClient(Azure KeyVault…

sglogowski
- 321
- 3
- 12
0
votes
1 answer
AspNet Core issue when deployed in ubuntu server
I have several aspnet core applications served in Ubuntu server (16.04.1 LTS (GNU/Linux 4.4.0-97-generic x86_64)), Those applications always have worked very well, they are webapi configured very similar each other, but yesterday I have a problem…

CSharper
- 175
- 1
- 2
- 12
0
votes
1 answer
Websphere BASE version - Manage endpoint security configurations
I need to set-up the Endpoint security configuration ( Reference - This IBM Doc )
When I do Admin Console -> Security -> SSL certificate and key management -> Manage endpoint security configurations
According to the IBM doc, I should be seeing…

adbdkb
- 1,897
- 6
- 37
- 66
0
votes
1 answer
How to secure database credentials in spring mvc service layer
I have to create a banking application using Spring MVC and MySQL enterprise database. Encryption and Decryption of data are done using keys provided by MySQL Enterprise database. Some of the options that I have found to secure this database…

Chinta Sai Vamshi
- 319
- 3
- 11
0
votes
0 answers
Kyy management for Website
I have a website that communicate with the webservice(the website doesn't have Database all communication via Webservice).
so you can access this webservice, you need a AES key to encrypt some fields and the webservice verify this encryption.
the…

iaskari
- 24
- 1
- 4
0
votes
0 answers
WSO2 API Manager 1.9.1 Key Manager access token translation
I have an OpenIdConnect Identity Provider hooked up to the API Manager. I am able to authenticate and retrieve an access token using authorization_code and implicit grant types. The access token created by the OpenIdConnect IP is different than the…

Jumpman
- 43
- 2
0
votes
1 answer
Key Management Interoperable Protocol
When we say "KMIP is an interoperable protocol",
what does this really mean ? Please explain in this context only.
I know the meaning of interoperable.

User1234
- 1,543
- 4
- 22
- 32
0
votes
1 answer
How to protect secret from other programs in Windows
Is there a way to securely save sensitive data, such as AES encryption key, in Windows? I'd like to make the data available only to my program. I know that DPAPI (CryptProtectData / CryptUnprotectData) protects my data from the access from other…

Susumu Arai
- 309
- 1
- 2
- 7
0
votes
2 answers
Apigee key management in Java
For our portal development, we have decided to use Apigee to expose the web service to the portal. For which currently I am storing the API Key and Api URL in the properties file of the project. Can anyone help with some pointers on how else can I…

Ash
- 21
- 2
0
votes
1 answer
Storing encryption keys for desktop application(Email Client)[Duplication]
There are so many articles on stack-overflow and security.stackexchange on storing encryption keys, but I am still confused, so that's why I decided to ask again here.
Basically, I am creating an Email client for education purpose, in that Users can…

Rushabh RajeshKumar Padalia
- 1,503
- 2
- 14
- 26
0
votes
1 answer
Verifying Signed Hash using Digital Signature
I am implementing a interface that takes 3 things as input
X509 certificate
A signedHash that was signed with that certificate’s private key
The initial hash
It must perform the following actions:
Confirm that this hash is signed using the…

Manish Sahni
- 488
- 2
- 7
- 21
0
votes
1 answer
Secure method for holding user logins between backend and another service
My Java app server is about to integrate with a RESTful web service and will be polling it for content (JSON) to display to my users.
My users login with their usernames/passwords, which I must then hash + salt and then forward on to the web service…

smeeb
- 27,777
- 57
- 250
- 447
0
votes
1 answer
Multicast encryption for a file download
I have a program which has paid addons, which get updated frequently. Users will have to buy a subscription to be able to use certain addons (i.e pay a monthly free).
The main reason I chose a subscription based model for the addons is simple, the…
user3746280
0
votes
1 answer
where to store cryptographic keys
I am inviting a temporary worker to write a part of my app for iPhone. Much of the data is encrypted using mcrypt. The data is generated on Android or iPhone and decrypted in php, and vice-versa.
Is there any way the temporary worker can do his task…

user462990
- 5,472
- 3
- 33
- 35
0
votes
0 answers
Jenkins do not authenticate by SSH key on Git
I've been trying to start a job on Jenkins to clone a repository by SSH Key but even after I setup the credentials I've keep getting a passphrase error.
Sorry by portuguese prints.
I missed some setup configuration?
Thanks.
WORKAROUND
I removed…

Idemax
- 2,712
- 6
- 33
- 66