All the sensitive data is encrypted and stored in the Qntrl database.
Sensitive data:
Task payload, response
Credentials
Tokens used to connect with the Bridge
AES algorithm is used to encrypt the data at rest.
Encryption keys are different for each org and kept confidential. To know more about our encryption policy refer to this link.
All the sensitive data is encrypted and stored, as required, in either the file system or the bridge database.
Sensitive data:
Bridge credentials - to login bridge in UI
OAuth credentials - to connect with the Qntrl
Registration Token
All the Credentials are created in the Bridge.
AES algorithm is used to encrypt the data.
A unique encryption key is generated while installing the bridge. So, even if the encrypted data is exposed, it will be difficult to view the original data.
Task payload may contain sensitive information. So, in addition to protocol encryption, the payload will be encrypted to avoid exposure of original data.
AES/SHA256 algorithm is used to encrypt the payload.
Sensitive data in logs are masked on both the Qntrl and Bridge sides.
Users can create credentials either in Qntrl or in Bridge. In both cases, data will be encrypted and stored in respective databases.
Credentials created in the Qntrl are encrypted as per our EAR policy. Profile-level permissions can be configured for credentials. Also, it can be viewed only by the created user.
The credentials created in the Bridge will be encrypted using the AES algorithm with AES/CBC/PKCS5P mode.
You are currently viewing the help articles of Qntrl 3.0. If you are still using our older version and require guidance with it, Click here.