Questions tagged [key-management]
77 questions
0
votes
1 answer
Websphere BASE version - Manage endpoint security configurations
I need to set-up the Endpoint security configuration ( Reference - This IBM Doc )
When I do Admin Console -> Security -> SSL certificate and key management -> Manage endpoint security configurations
According to the IBM doc, I should be seeing…
![](../../users/profiles/913749.webp)
adbdkb
- 1,331
- 4
- 26
- 45
0
votes
1 answer
How to secure database credentials in spring mvc service layer
I have to create a banking application using Spring MVC and MySQL enterprise database. Encryption and Decryption of data are done using keys provided by MySQL Enterprise database. Some of the options that I have found to secure this database…
![](../../users/profiles/4926239.webp)
Chinta Sai Vamshi
- 179
- 2
- 11
0
votes
0 answers
Kyy management for Website
I have a website that communicate with the webservice(the website doesn't have Database all communication via Webservice).
so you can access this webservice, you need a AES key to encrypt some fields and the webservice verify this encryption.
the…
![](../../users/profiles/344181.webp)
iaskari
- 24
- 1
- 4
0
votes
0 answers
WSO2 API Manager 1.9.1 Key Manager access token translation
I have an OpenIdConnect Identity Provider hooked up to the API Manager. I am able to authenticate and retrieve an access token using authorization_code and implicit grant types. The access token created by the OpenIdConnect IP is different than the…
![](../../users/profiles/4347269.webp)
Jumpman
- 43
- 2
0
votes
1 answer
Key Management Interoperable Protocol
When we say "KMIP is an interoperable protocol",
what does this really mean ? Please explain in this context only.
I know the meaning of interoperable.
![](../../users/profiles/4570744.webp)
User1234
- 1,341
- 3
- 17
- 30
0
votes
1 answer
How to protect secret from other programs in Windows
Is there a way to securely save sensitive data, such as AES encryption key, in Windows? I'd like to make the data available only to my program. I know that DPAPI (CryptProtectData / CryptUnprotectData) protects my data from the access from other…
![](../../users/profiles/856990.webp)
Susumu Arai
- 279
- 1
- 2
- 7
0
votes
2 answers
Apigee key management in Java
For our portal development, we have decided to use Apigee to expose the web service to the portal. For which currently I am storing the API Key and Api URL in the properties file of the project. Can anyone help with some pointers on how else can I…
![](../../users/profiles/4072945.webp)
Ash
- 21
- 2
0
votes
1 answer
Storing encryption keys for desktop application(Email Client)[Duplication]
There are so many articles on stack-overflow and security.stackexchange on storing encryption keys, but I am still confused, so that's why I decided to ask again here.
Basically, I am creating an Email client for education purpose, in that Users can…
![](../../users/profiles/2032189.webp)
Rushabh RajeshKumar Padalia
- 1,263
- 1
- 13
- 22
0
votes
1 answer
Verifying Signed Hash using Digital Signature
I am implementing a interface that takes 3 things as input
X509 certificate
A signedHash that was signed with that certificate’s private key
The initial hash
It must perform the following actions:
Confirm that this hash is signed using the…
![](../../users/profiles/439916.webp)
Manish Sahni
- 468
- 1
- 7
- 20
0
votes
1 answer
Secure method for holding user logins between backend and another service
My Java app server is about to integrate with a RESTful web service and will be polling it for content (JSON) to display to my users.
My users login with their usernames/passwords, which I must then hash + salt and then forward on to the web service…
![](../../users/profiles/4009451.webp)
smeeb
- 22,487
- 41
- 197
- 389
0
votes
1 answer
Multicast encryption for a file download
I have a program which has paid addons, which get updated frequently. Users will have to buy a subscription to be able to use certain addons (i.e pay a monthly free).
The main reason I chose a subscription based model for the addons is simple, the…
user3746280
0
votes
1 answer
where to store cryptographic keys
I am inviting a temporary worker to write a part of my app for iPhone. Much of the data is encrypted using mcrypt. The data is generated on Android or iPhone and decrypted in php, and vice-versa.
Is there any way the temporary worker can do his task…
![](../../users/profiles/462990.webp)
user462990
- 5,162
- 3
- 31
- 33
0
votes
0 answers
Jenkins do not authenticate by SSH key on Git
I've been trying to start a job on Jenkins to clone a repository by SSH Key but even after I setup the credentials I've keep getting a passphrase error.
Sorry by portuguese prints.
I missed some setup configuration?
Thanks.
WORKAROUND
I removed…
![](../../users/profiles/575643.webp)
xpto
- 2,521
- 4
- 27
- 59
0
votes
1 answer
Cryptographic Agility and Key Management
I have a design question. I have a web application that uses .NET encryption APIs to encrypt/decrypt data. (App uses old crypto algorithms like MD5 and SHA-1). Also, app hard-codes the encryption keys in the production code.
I would like to;
1 )…
![](../../users/profiles/1296863.webp)
ilker Acar
- 381
- 1
- 3
- 11
0
votes
0 answers
How to restrict access to a resource based on frequency of access?
I want to restrict access to a particular resource based on time (configurable). So suppose user A has time t configured from him. He can access the resource only once every t time units. The values of t can be from a fixed set but not a very small…
![](../../users/profiles/2494258.webp)
Ruchir Patwa
- 171
- 2
- 10