For additional system protection, it is recommended to encrypt the configuration files after final edits.

Pam components protection

The distribution kit includes the Configuration protector utility that located in the \MISC\Core.IdP.Encryptor\ folder.

The utility can encrypt the configuration files of the Core, IdP, ProxyApp and SSHProxy components. 

Run the following commands to encrypt the corresponding configuration files:

  • Core component:

    Pam.Tools.Configuration.Protector protect --component Core --file C:\inetpub\wwwroot\pam\core\appsettings.json
  • IDP component

    Pam.Tools.Configuration.Protector protect --component Idp --file C:\inetpub\wwwroot\pam\idp\appsettings.json
  • Log Server component

    Pam.Tools.Configuration.Protector protect --component LogServer --file C:\inetpub\wwwroot\ls\targetConfigs\sampleDb.config
  • ProxyApp component

    Pam.Tools.Configuration.Protector protect --component ProxyApp --file "C:\Program Files\Indeed Identity\Indeed PAM\Gateway\ProxyApp\appsettings.json"
  • SSHProxy component

    Pam.Tools.Configuration.Protector protect --component SshProxy --file "C:\Program Files\Indeed Identity\Indeed PAM\SSH Proxy\appsettings.json"

To decrypt the configuration, run the command:

Pam.Tools.Configuration.Protector unprotect --file "c:\path\to\configuration\file"

Encryption mechanism details

Encryption is performed using the AES-256 algorithm by a keyset which is generated using the Data Protection API. Keys are stored in %ProgramData%\Indeed Identity\Indeed PAM\Keys folder.

Keys are encrypted using the Windows Data Protection API with binding to a computer. So, any user within a computer can encrypt or decrypt keys. If the Data Protection API encryption keys are not synchronized between the load balancer instances, then the configuration must be re-encrypted, since the instances will have different keys.


  • No labels