Cryptography
Most authentication data and cryptographic keys for user-facing services are configurable by the administrator.
A Spotfire system also uses cryptographic keys to bind together the internal components and services using connections requiring TLS client authentication. These keys are randomly generated by the services when the system is set up, therefore, they are unique to each Spotfire system. They cannot be modified by the purchaser, but the keys can be replaced by new random keys at any time.
- Data At Rest
Data at rest is data stored, either temporarily or permanently. Data at rest has certain encryption types, or no encryption, depending on where it is being stored. - Data In Motion
Data in motion is moving through the Spotfire environment. Data in motion has certain encryption protection, depending on how and where it is moving. - Standards and Algorithms
Spotfire provides the following standards and algorithms for encryption.
- Data At Rest
Data at rest is data stored, either temporarily or permanently. Data at rest has certain encryption types, or no encryption, depending on where it is being stored. - Data In Motion
Data in motion is moving through the Spotfire environment. Data in motion has certain encryption protection, depending on how and where it is moving. - Standards and Algorithms
Spotfire provides the following standards and algorithms for encryption.