How does Akabot encrypt and protect sensitive information such as login credentials and configuration data?

Created by Akabot Support, Modified on Wed, 17 Sep at 1:25 PM by Akabot Support

Akabot uses multiple encryption and hashing mechanisms to ensure sensitive information is securely protected:

Akabot Center

  • Login accounts: Passwords are hashed using BCrypt, which is resistant to brute-force and rainbow table attacks thanks to its built-in salting and configurable work factor.

  • Stored login information (e.g., for Agent auto unlock): Encrypted with AES/CBC/PKCS5Padding.

  • Assets (Credentials): Also encrypted with AES/CBC/PKCS5Padding.

  • Sensitive data in configuration files (if any): Supports multiple strong encryption algorithms, with PBEWITHHMACSHA1ANDAES_256 used as the default.

Akabot Agent

  • Sensitive data in configuration files (e.g., proxy user/password, AgentKey) are encrypted using HMAC with SHA-256 (HS256).

  • Additional Security Options

    • Akabot can be integrated with HashiCorp Vault and AWS Secrets Manager for enterprise-grade key management and advanced security.

With these mechanisms, Akabot ensures that sensitive data such as credentials and configuration details remain secure against unauthorized access.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article