![]() |
AW: Wie Speicher ich den Schlüssel für verschlüsselte Datenbanken oder Dateien
Hi,
CryptProtectData and its companion API, are good as they encrypt and store the encrypted data on a local machine, but it comes with few cons, the ability to decrypt from within the system, by either an application running with same user, or any an application running on any user, all you need is to extract the entropy from the application. USB and TPM also not that viable for portability. Better the above is using the LDAP, but again this has its own cons. I solved this in two ways over the years and hope you finds them useful: 1) My data bank server will load (grab) the key from another different location over the wire (internet or local network), the connection is secure, also that server is a windows service, that detect any login for Windows user and delete the key from the memory, meaning stop the server operation until no more user are logged on the system, then grab the key again, in fact i use it a little differently, the server on detecting a connection it does encrypt all the high value and critical data in memory to make sure, then proceed to march them to the controller, if failed to march them then it will dump them encrypted on the disk with a already supplied key from the controller and will not be able to decrypt them without an admin interaction on the controller side. 2) For easier deploy also when many instances will be used, I use WinLicense ![]() ![]() It has its own highly protected storage that support custom data in the licensing key ![]() It also can lock the license key to a hardware and this will make things way easier by deploying and then apply licenses that have hidden encryption keys. |
AW: Wie Speicher ich den Schlüssel für verschlüsselte Datenbanken oder Dateien
Sorry for the screenshot, but for now this what i can post and hope you find it useful
Hi, CryptProtectData and its companion API, are good as they encrypt and store the encrypted data on a local machine, but it comes with few cons, the ability to decrypt from within the system, by either an application running with same user, or any an application running on any user, all you need is to extract the entropy from the application. USB and TPM also not that viable for portability. Better the above is using the LDAP, but again this has its own cons. I solved this in two ways over the years and hope you finds them useful: 1) My data bank server will load (grab) the key from another different location over the wire (internet or local network), the connection is secure, also that server is a windows service, that detect any login for Windows user and delete the key from the memory, meaning stop the server operation until no more user are logged on the system, then grab the key again, in fact i use it a little differently, the server on detecting a connection it does encrypt all the high value and critical data in memory to make sure, then proceed to march them to the controller, if failed to march them then it will dump them encrypted on the disk with a already supplied key from the controller and will not be able to decrypt them without an admin interaction on the controller side. 2) For easier deploy also when many instances will be used, I use WinLicense from "oreans.com" ( i posted this yesterday few times and there was some redirection of the page notifying that my post should be approved by administrator, so i re-posting without links in case it is the problem) It has its own highly protected storage that support custom data in the licensing key , custom data in this case can be you encryption key oreans com -> support -> online help WinLicense -> Licensing with WinLicense -> Customizing features in licenses Zitat:
|
AW: Wie Speicher ich den Schlüssel für verschlüsselte Datenbanken oder Dateien
It did went through !!, may be the "Hi" thingy.
|
AW: Wie Speicher ich den Schlüssel für verschlüsselte Datenbanken oder Dateien
Zitat:
This service is currently still running as a system user for too many customers, but in the future it will be a separate user account. Either way, from the client computers, as well as as a "simple user" on the server, you wouldn't normally have access to the user account used by the service. Currently, the client mostly still uses a database connection with SuperUser authorization, so that it would theoretically be easy to get the password that is stored in the database. And the password has to be decryptable in order to use it for login, I can't hash it. Unfortunately, the API does not offer the possibility of a restricted API key for the connection. In addition, the RESTful service runs into a timeout every 30 minutes, so that so far after at least 30 minutes the user + password, almost unencrypted, goes from the client to the Internet, which in future will only happen from the more protected server, which normal users will access less have access. |
AW: Wie Speicher ich den Schlüssel für verschlüsselte Datenbanken oder Dateien
Zitat:
Thanks for your suggestion. This sounds like very sophisticated system you have. Also double thanks for taking the effort to read/translate all those German posts, just to provide me with help. |
AW: Wie Speicher ich den Schlüssel für verschlüsselte Datenbanken oder Dateien
Zitat:
|
Alle Zeitangaben in WEZ +1. Es ist jetzt 10:44 Uhr. |
Powered by vBulletin® Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
LinkBacks Enabled by vBSEO © 2011, Crawlability, Inc.
Delphi-PRAXiS (c) 2002 - 2023 by Daniel R. Wolf, 2024-2025 by Thomas Breitkreuz