and more in a single search tool across platforms. Read the announcement here. |
03/11/2024 11:24 PM
From the documentation at Configuring Password Synchronization from Active Directory (saviyntcloud.com)
>>>
The password filter stores the password changes locally on the Active Directory server in an SQLite database to ensure that there is no loss of information in case of unscheduled interruptions, encrypts the passwords, and then sends the password information to EIC.
<<<<
03/12/2024 12:08 AM
May be info need full for your subject
03/12/2024 07:01 PM
Some general insights:
1. Encryption Keys for SQLite Database:
- Typically, encryption keys for data stored in a SQLite database are managed by the application itself. Saviynt's password filter would likely generate and manage these encryption keys internally. The specific details of how these keys are managed, including whether they are stored securely or not, would be outlined in Saviynt's documentation or provided by their support team.
2. Encryption of Outbound Payloads:
- It's standard practice for sensitive data, such as passwords, to be encrypted before transmission over a network. Saviynt's password filter should employ encryption mechanisms (such as TLS/SSL) to ensure that all outbound payloads containing sensitive information are encrypted before being sent to the Saviynt Cloud instance
3. Options for Encrypting Payloads:
- Within the Saviynt password filter application, there should be configuration options to enable encryption for outbound payloads. These options might include specifying the encryption protocol, key management, and other settings related to data security.
4. Encryption of Inbound Payloads:
- Similarly, inbound payloads from the Saviynt Cloud instance to application endpoints (whether in the cloud or on-premise) should also be encrypted. Saviynt likely employs encryption mechanisms to ensure the security of data in transit.