Applies to: Kyvos Enterprise Kyvos Cloud (SaaS on AWS) Kyvos AWS Marketplace
...
Panel | ||||||
---|---|---|---|---|---|---|
| ||||||
Note
|
The Manage Credentials feature in Kyvos Manager enables you to:
Functionality | AWS | Azure | GCP | On-prem |
---|---|---|---|---|
Change Node Authentication |
|
|
|
|
Change Repository Password |
|
|
|
|
Change Password Storage |
|
|
|
|
Change |
Encryption Algorithm |
|
|
|
|
...
Changing Repository Password
...
Info |
---|
Note You MUST restart the BI Server to bring the new password into effect. |
Changing
...
Encryption Algorithm
You can change password encryption to configure a cryptographic algorithm at the application level. All sensitive information stored in the Azure Key Vault or AWS Secrets Manager is also encrypted using the cryptographic algorithm.
To change the password encryption, perform the following steps.
Note
...
On the Kyvos Manager navigation pane, click Manage Credentials.
Click Change repository password.
On the displayed Encryption Algorithm dialog box, select the encryption from any of the following options.
...
panelIconId | atlassian-note |
---|---|
panelIcon | :note: |
bgColor | #DEEBFF |
AES_GCM: This mode operates by XOR'ing (eXclusive OR) each block with the previous block and cannot be written in parallel. Kyvos supports both 128 and 256
...
- DEFAULT: MD5 encryption for Kyvos user login password and DES for saved passwords for other services
variants for this. This is the default option applied to all clusters at the time of deployment Kyvos version 2023.3 onwards.
AES_CBC: In this mode, each ciphertext block is dependent on all plain text blocks processed up to that point. Kyvos supports both 128 and 256 variants for this.
AES_CFB: This mode can be used as a stream cipher. First, it encrypts the IV, and then it will xor with the plain text block to get ciphertext. Then CFB encrypts the encryption result to xor the plain text. It needs an IV. Kyvos supports both 128 and 256 variants for this.
None: Use this option to keep the secret values in plain text. In this case, no encryption will be applied to the secrets being saved in the Key Vault/Secrets Manager.
DEFAULT: This is the MD5 encryption for Kyvos user login password and DES for saved passwords for other services for Kyvos clusters to support backward compatibility, in case the cluster was deployed on a version prior to version 2023.3.
Provide Kyvos Manager Password to continue.
Click the Save button to save your changes.
...
Kyvos Manager allows you to migrate your repository passwords (like SMTP, LDAP, Repository, OIDC, etc.) from the configuration file to a secrets manager like AWS Secrets Manager, Azure Key Vault, or GCP Secrets Manager.
Panel | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||
Note Once you migrate your passwords to a secret store, you cannot switch back to the configuration file. | ||||||||||||
Aura tab collection | ||||||||||||
| ||||||||||||
These are the steps
Step 1 for editing |