Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Jobs can be subject to a number of scenarios:
    • Jobs might want to read secrets from specific sources such as arguments, configuration files etc.
    • Jobs might want to create secrets on-the-fly that should be processed by successor jobs.
  • Jobs should consider not to expose secrets to logging, database persistence etc.

For creation of Encryption Keys see JS7 - How to create X.509 Encryption Keys.

Integration

Use with Workflow Variables

...

...