Questions tagged [key-management]

93 questions
0
votes
1 answer

How to handle key rotations in azure key vault

I have to implement key rotations in my application. I have some idea how to do that but I am not sure if everything is OK with that solution. Ok, lets start. I have couple places in my application where I use the KeyVaultClient(Azure KeyVault…
sglogowski
  • 321
  • 3
  • 12
0
votes
1 answer

AspNet Core issue when deployed in ubuntu server

I have several aspnet core applications served in Ubuntu server (16.04.1 LTS (GNU/Linux 4.4.0-97-generic x86_64)), Those applications always have worked very well, they are webapi configured very similar each other, but yesterday I have a problem…
CSharper
  • 175
  • 1
  • 2
  • 12
0
votes
1 answer

Websphere BASE version - Manage endpoint security configurations

I need to set-up the Endpoint security configuration ( Reference - This IBM Doc ) When I do Admin Console -> Security -> SSL certificate and key management -> Manage endpoint security configurations According to the IBM doc, I should be seeing…
adbdkb
  • 1,897
  • 6
  • 37
  • 66
0
votes
1 answer

How to secure database credentials in spring mvc service layer

I have to create a banking application using Spring MVC and MySQL enterprise database. Encryption and Decryption of data are done using keys provided by MySQL Enterprise database. Some of the options that I have found to secure this database…
0
votes
0 answers

Kyy management for Website

I have a website that communicate with the webservice(the website doesn't have Database all communication via Webservice). so you can access this webservice, you need a AES key to encrypt some fields and the webservice verify this encryption. the…
iaskari
  • 24
  • 1
  • 4
0
votes
0 answers

WSO2 API Manager 1.9.1 Key Manager access token translation

I have an OpenIdConnect Identity Provider hooked up to the API Manager. I am able to authenticate and retrieve an access token using authorization_code and implicit grant types. The access token created by the OpenIdConnect IP is different than the…
0
votes
1 answer

Key Management Interoperable Protocol

When we say "KMIP is an interoperable protocol", what does this really mean ? Please explain in this context only. I know the meaning of interoperable.
User1234
  • 1,543
  • 4
  • 22
  • 32
0
votes
1 answer

How to protect secret from other programs in Windows

Is there a way to securely save sensitive data, such as AES encryption key, in Windows? I'd like to make the data available only to my program. I know that DPAPI (CryptProtectData / CryptUnprotectData) protects my data from the access from other…
Susumu Arai
  • 309
  • 1
  • 2
  • 7
0
votes
2 answers

Apigee key management in Java

For our portal development, we have decided to use Apigee to expose the web service to the portal. For which currently I am storing the API Key and Api URL in the properties file of the project. Can anyone help with some pointers on how else can I…
Ash
  • 21
  • 2
0
votes
1 answer

Storing encryption keys for desktop application(Email Client)[Duplication]

There are so many articles on stack-overflow and security.stackexchange on storing encryption keys, but I am still confused, so that's why I decided to ask again here. Basically, I am creating an Email client for education purpose, in that Users can…
0
votes
1 answer

Verifying Signed Hash using Digital Signature

I am implementing a interface that takes 3 things as input X509 certificate A signedHash that was signed with that certificate’s private key The initial hash It must perform the following actions: Confirm that this hash is signed using the…
0
votes
1 answer

Secure method for holding user logins between backend and another service

My Java app server is about to integrate with a RESTful web service and will be polling it for content (JSON) to display to my users. My users login with their usernames/passwords, which I must then hash + salt and then forward on to the web service…
smeeb
  • 27,777
  • 57
  • 250
  • 447
0
votes
1 answer

Multicast encryption for a file download

I have a program which has paid addons, which get updated frequently. Users will have to buy a subscription to be able to use certain addons (i.e pay a monthly free). The main reason I chose a subscription based model for the addons is simple, the…
user3746280
0
votes
1 answer

where to store cryptographic keys

I am inviting a temporary worker to write a part of my app for iPhone. Much of the data is encrypted using mcrypt. The data is generated on Android or iPhone and decrypted in php, and vice-versa. Is there any way the temporary worker can do his task…
user462990
  • 5,472
  • 3
  • 33
  • 35
0
votes
0 answers

Jenkins do not authenticate by SSH key on Git

I've been trying to start a job on Jenkins to clone a repository by SSH Key but even after I setup the credentials I've keep getting a passphrase error. Sorry by portuguese prints. I missed some setup configuration? Thanks. WORKAROUND I removed…
Idemax
  • 2,712
  • 6
  • 33
  • 66