Macros and security
Because a macro is an easily transportable, unencrypted, text-based representation of interactions between a user and a host application, you should consider protecting your macros as valuable pieces of intellectual property.
In particular, you should consider not storing unencrypted passwords
or other sensitive data in a macro script. Instead:
- You can design the macro so that it obtains sensitive information from an outside source, for example by prompting the user for a password or by obtaining data from a host or local application.
- You can use the following features for encrypting input:
- The Password field of the FileUpload action (see User ID and Password).
- The Password checkbox of the Input action (see Password).
- The Password Response listbox of the Prompt action (see Password Response).
- The Password field of the SQLQuery action (see User ID and Password).
- The Record Password option (enabled by default) (see Record password).