Page History
...
- Jobs can be subject to a number of scenarios:
- Jobs might want to read secrets from specific sources such as arguments, configuration files etc.
- Jobs might want to create secrets on-the-fly that should be processed by successor jobs.
- Jobs should consider not to expose secrets to logging, database persistence etc.
- Jobs can use the scripts and cmdlets explained with the JS7 - How to encrypt and decrypt article section to encrypt and to decrypt values.
- Jobs can use JS7 - Job Resources to store encrypted values, see JS7 - How to update a Job Resource using Unix Shell
For creation of Encryption Keys see JS7 - How to create X.509 Encryption Keys.
Integration
Use with Workflow Variables
...
- JS7 - Encryption and Decryption
- JS7 - How to create X.509 Encryption Keys
- JS7 - How to encrypt and decrypt
- JS7 - How to update a Job Resource using Unix Shell
- JS7 - How to encrypt and decrypt Database Credentials
...
Overview
Content Tools