Secret stores, certificates, and keys
Encryption makes it possible to protect sensitive data. IDM depends on encryption to negotiate secure network connections, and to keep sensitive data confidential. Encryption in turn depends on keys. IDM stores keys in secret stores, and supports the following secret store types:
Property-based secret stores
Hardware Security Modules (HSM)
|In production environments, avoid using self-signed certificates and certificates associated with insecure ciphers.