Key Vault Management

Key vault integration needs to be enabled for AES HMAC to be available for the BOT connect API. Enabling this creates a key vault service that are used to manage keys and these keys are used in BOT connect API.

  1. Log into Global admin and navigate to Tenants page under Provider tab.
Figure 1. Figure 342 – Global Admin Console
  1. Click on the Configure buttonIcon Description automatically generated available in Actions column.
  2. In tenant’s configuration page, click on Open in “Choose Integrations” card.
Figure 2. Figure 343 – Tenant’s Configurations Page
  1. Click on Open on “Key Vault Services” connector. If it is already enabled, it will have a green check, otherwise it will not have a check at all.
Figure 3. Figure 344 – Key Vault Connector
  1. Click on Open key vault services connector
Figure 4. Figure 345 – Key Vault Connector Configuration
  1. The service has a dropdown which has IBM Keyprotect service listed. On choosing the service option SAVE button gets enabled. Save the integration to enable the service.
Figure 5. Figure 346 – Service Options for key vault services
Figure 6. Figure 347 – Service Options for key vault services
  1. On enabling the integration successfully, a success message appears:

Figure 348 – Success Message

Figure 7. Figure 349 – Key vault services enabled
  1. Once the service is enabled it cannot be disabled.
Figure 8. Figure 350 – Key vault services page after enabling
  1. The following points illustrate how to create a BOT connect API with HMAC and AES encryption.
  2. If the key vault services integration is enabled in Global Admin there will be an Additional Security toggle that will be visible in the Register your application page for BOT Connect API page. On enabling, other fields related to HMAC authentication and AES encryption are shown below the Additional Security toggle.
Figure 9. Figure 351 – Additional Security fields in BOT connect API register
Graphical user interface, application Description automatically generated
  1. Encoding type decides the encoding with which HMAC signature is sent, encrypted data is received, and decrypted data is sent.
  2. User has the option to enable or disable either HMAC Authentication or AES Encryption and Decryption during application registration for BOT connect API. These options are for additional security:
  1. HMAC Authentication: On enabling HMAC authentication the following fields will be visible:
  • HMAC Encryption key: It is a mandatory field. It should be of length between 32 and 512.It can contain any alpha numeric character except whitespace.
  • Generate: provides user an option to generate an encryption key instead of entering one. On clicking the respective field will have a key generated.
  • Header signing algorithm: This will let user choose an algorithm for their HMAC signature. By default, it is SHA256.
Figure 10. Figure 352 – HMAC Authentication Setup
Graphical user interface, application Description automatically generated
Figure 11. Figure 353 – HMAC Authentication fields on click of generate in BOT connect API register
Graphical user interface, text, application, email Description automatically generated
  1. AES Encryption: On enabling AES Encryption and Decryption fields the following fields will be visible:
  • AES encryption key:
  • AES decryption key:
Figure 12. Figure 354 – AES Encryption Setup
Graphical user interface, text, application Description automatically generated
  1. In case of entering key values that doesn’t satisfy the criteria as mentioned, there will be an error on application registration.
Figure 13. Figure 355 – Error message for invalid key data
  1. Editing BOT Connect API configurations
  2. BOT connect API page with both HMAC Authentication & AES Encryption and Decryption
Figure 14. Figure 356 – BOT connect API page with both HMAC Authentication & AES Encryption and Decryption
Graphical user interface Description automatically generated
  1. BOT connect API page with only AES Encryption and Decryption enabled
Figure 15. Figure 357 – BOT connect API page with AES Encryption and Decryption Only
Graphical user interface, application Description automatically generated
  1. BOT connect API page with only HMAC Authentication enabled
Figure 16. Figure 358 – BOT connect API page with HMAC Authentication Enabled Only
Graphical user interface, application, Teams Description automatically generated
  1. Editing Keys
  2. Clicking on view key icon against the Key field displays the value of the key
Figure 17. Figure 359 – View key for an encryption key
Table Description automatically generated
  1. On clicking of edit icon against the key, the options to enter a new key are provided
Figure 18. Figure 360 – Edit key for an encryption key
Table Description automatically generated
  1. User can either enter the key manually or can generate a key with Generate key value icon
Figure 19. Figure 361 – Generate key value for an encryption key
Graphical user interface, application Description automatically generated
  1. Clicking save change icon replaces the old key with the newly generated key
Figure 20. Figure 362 – Save key value for an encryption key
Graphical user interface, application Description automatically generated
  1. Discard change value will discard the changes made
Figure 21. Figure 363 – Discard key value for an encryption key
Graphical user interface, application, Teams Description automatically generated
  1. Configurable Parameters
  2. Change in any of the configurable parameters will enable SAVE and DISCARD options at the bottom of the page
Figure 22. Figure 364 – Configurable parameters SAVE and DISABLED being enabled
Graphical user interface, application Description automatically generated
  1. Clicking DISCARD, the values of configurable parameters will be set to previous saved value.
  2. Clicking SAVE changes will be save with confirmation message

Graphical user interface, application Description automatically generated

Figure 23. Figure 365 – Saving changed Configurable parameters
Graphical user interface, application Description automatically generated