Encryption
The Encryption section allows administrators to generate, encrypt, and validate secrets used across the TIM platform. These encrypted values are required in multiple configurations, such as database connections, action handlers, and timer settings.
Reference | Attribute | Description |
|---|---|---|
1 | Unencrypted secret (input field) | Enter a plain text value (e.g., a password, API key, or token) that should be encrypted before being used in system configurations. |
2 | Information message (blue box) | Provides guidance about the deprecation of old |
3 | Encrypt Secret (button) | Encrypts the value entered in the Unencrypted secret field. The result will be displayed in the Encrypted secret field. |
4 | Reset (button) | Clears the Unencrypted secret field, allowing the user to start over. |
5 | Encrypted secret (input field) | Displays the encrypted version of the provided plain text secret. This encrypted string should be copied and used in configuration files (e.g., |
6 | Validate encrypted secret (button) | Validates whether the entered encrypted string is correct and can be decrypted by the system. This ensures that copied or stored encrypted values are valid. |
This page ensures secure handling of sensitive values like passwords and tokens, enforcing system-wide consistency and stronger encryption standards.
© TIM Solutions GmbH | AGB | Datenschutz | Impressum