The following document provides a summary of the Automic security concept for databases.
Encrypt SQL Connection
During setup you have to configure the connection to the database management system. The default installationnull uses an unencrypted connection to the database. Depending on your requirements, for example the network infrastructure, an unencrypted connection can be read by an attacker, which can lead to information leakage.
Automic components encrypt all sensitive data, for example passwords and LoginAnmeldedaten für Zielsysteme. Auch ein eigener Objekttyp in der Automation Engine. objects, before transmitting them to the database using industry encryption standards.
Thus passwords or sensitive information transmitted over the wire cannot be read in plain text, if the SQL connection is pried upon by a sniffer.
Therefore an encrypted connection to the database management system can add an additional layer of security.
Please refer to the following list of step-by-step guides. If you have questions in regards to this topic, please contact your database management system vendor.
Depending on your database management system you may have to add additional parameters to the ODBC connection string. You have to set these parameters in the configuration file UCSRV.INI.
Encrypt Passwords in Configuration Files
The user name and the password for database access has to be stored in the configuration file of the automation engines and utilities. For security reasons it is recommended to encrypt that information.
You can encrypt the credentials by using the UCYBCRYP utility.