Automation Anywhere 설명서 읽기 및 검토

Automation Anywhere Version 11.3

콘텐츠 닫기

콘텐츠

콘텐츠 열기

Password hashing

  • 업데이트: 2019/09/25
    • 11.3.x
    • 탐색
    • Enterprise

Password hashing

Password hashing does a one-way, permanent transformation of the passwords of the Control Room users, inline with standard password management practices.

Control Room passwords are concatenated with a salt and then hashed using the Password-Based Key Derivation Function (PBKDF2) with HMAC SHA512 algorithm before being stored in the database.

  • The salt is 256-bits in size and randomly generated by a cryptographically secure PRNG.
  • The HMAC SHA512 algorithm is used for hashing and provides additional security over traditional approaches.
    • A keyed hash provides protection against hash length extension attacks.
    • SHA 512-bit key is larger than the commonly used SHA 256-bit key.
  • The key used for the HMAC is from the secure PBKDF2.
  • Hashing is done for 100,000 rounds (based on NIST recommendations).

Every time a Bot Creator or Bot Runner authenticates against Control Room, its credentials are authenticated against the hashed credentials.

피드백을 보내주십시오