IDM 7.2.2

Secret stores, certificates, and keys

Encryption makes it possible to protect sensitive data. IDM depends on encryption to negotiate secure network connections, and to keep sensitive data confidential. Encryption in turn depends on keys. IDM stores keys in secret stores, and supports the following secret store types:

  • File-based keystores

  • Property-based secret stores

  • Hardware Security Modules (HSM)

In production environments, avoid using self-signed certificates and certificates associated with insecure ciphers.