Encryption

Configuration

Sensitive configuration data, such as passwords, are encrypted using AES128.

Keystores

HSM

PKI keystores, used to encrypt and sign, can be stored in a HSM module.

Use keystores in Hardware Security Module (HSM)

Communication

Inbound and outbound communication should always be encrypted. PhenixID platform supports encrypted communication.

Some examples:

- HTTPS (SSL)

- LDAPS