Skip to main content
Solved

Encrypting

  • September 27, 2021
  • 3 replies
  • 98 views

Rene Willems
Apprentice

In IAM it is possible to specify environment specific settings (similar to app.config in C#). See Authorization >> Applications >> Properties. Is it possible to encrypt fields here (e.g. in case of a security token or password?)

Best answer by Mark Jongeling

Hi Rene,

Using Extended properties is possible, creating session variables for security tokens and passwords. That way you can use them inside SSMS code and process/system flows. Only Root administrators in IAM may see and create Extended properties for applications in IAM making is quite secure. We don't recommend making every developer/user a Root administrator in IAM; only people that truly need this role should have it. Marking data as "Password” is something we could do but it does not make it impossible for other Root administrators to hide these secrets.

Alternatively you could make a table with those secret credentials in your end product and only give rights to the correct users. That would mean it doesn't have to be offered as session variables but can be easily obtained with SQL queries with your Process procedures or others.

Most secure option would be to have an Azure Key Vault or AWS Secrets manager. These can hold your secrets away from you IAM and End product and can only be obtained using a HTTP Connector process action. This will have the benefit of your users never seeing the secrets themselves. More info on it here: 

Azure: https://docs.microsoft.com/en-us/rest/api/keyvault/vaults/get
AWS: https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_GetSecretValue.html

Do these alternatives sound like a good fit for you?

View original
Did this topic help you find an answer to your question?
This topic has been closed for replies.

3 replies

Mark Jongeling
Administrator
Forum|alt.badge.img+23

Hi Rene,

The properties you are referring to are the Extended properties. These properties can be used to alter the behavior of the GUI. For a complete list, see the docs: Extended properties · Thinkwise Docs (thinkwisesoftware.com). These fields cannot be encrypted.

What kind of information would you have liked to put/name there and to what purpose? Maybe there's something else we can recommend.


Rene Willems
Apprentice
  • Author
  • Apprentice
  • 7 replies
  • October 25, 2021

Sorry Mark, the word 'Encypting' was incorrect. I meant the following…

I use security tokens and passwords in the extendend properties. These parameters are for calling external APIs. These settings are environment dependent. However, I want eg a password or token not to be readable from the screen. An option to indicate that it is a 'password' field type would be a nice option


Mark Jongeling
Administrator
Forum|alt.badge.img+23
  • Administrator
  • 3945 replies
  • Answer
  • October 27, 2021

Hi Rene,

Using Extended properties is possible, creating session variables for security tokens and passwords. That way you can use them inside SSMS code and process/system flows. Only Root administrators in IAM may see and create Extended properties for applications in IAM making is quite secure. We don't recommend making every developer/user a Root administrator in IAM; only people that truly need this role should have it. Marking data as "Password” is something we could do but it does not make it impossible for other Root administrators to hide these secrets.

Alternatively you could make a table with those secret credentials in your end product and only give rights to the correct users. That would mean it doesn't have to be offered as session variables but can be easily obtained with SQL queries with your Process procedures or others.

Most secure option would be to have an Azure Key Vault or AWS Secrets manager. These can hold your secrets away from you IAM and End product and can only be obtained using a HTTP Connector process action. This will have the benefit of your users never seeing the secrets themselves. More info on it here: 

Azure: https://docs.microsoft.com/en-us/rest/api/keyvault/vaults/get
AWS: https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_GetSecretValue.html

Do these alternatives sound like a good fit for you?


Cookie policy

We use cookies to enhance and personalize your experience. If you accept you agree to our full cookie policy. Learn more about our cookies.

 
Cookie settings