Spotfire® Server and Environment Security

Cryptography

Most authentication data and cryptographic keys for user-facing services are configurable by the administrator.

A Spotfire system also uses cryptographic keys to bind together the internal components and services using connections requiring TLS client authentication. These keys are randomly generated by the services when the system is set up, therefore, they are unique to each Spotfire system. They cannot be modified by the purchaser, but the keys can be replaced by new random keys at any time.