Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. The sentitive information, like datastore credentials, WiFi Passwords etc., are in clear-text format inside the configuration blob, received from controlled module. The sensitive information is exchanged between agents in the EVE, as is through pubsub channel.
  2. The sensitive information should be in cypher text format inside the configuration blob for EVE node. And a A set of APIs will be provided to the EVE agents to decrypt them, using TPM.
  3. The sensitive information exchange between the controller and EVE node should be encrypted end-to-end,  in man-in-the middle proxy deployments also.
  4. There encryption methodolgy used for achiving this, should also work with third-party CA verification

...