Secret Stores, Certificates and Keys
Encryption makes it possible to protect sensitive data. IDM depends on encryption to negotiate secure network connections, and to keep sensitive data confidential. Encryption in turn depends on keys. IDM stores keys in secret stores. This chapter describes the supported secret stores and the features available for managing keys.
As a general precaution in production environments, avoid using self-signed certificates and certificates associated with insecure ciphers.
IDM supports the following secret store types:
File-based keystores
Hardware Security Modules (HSM)