IBM RPA Vault security aspects

Learn more about the security of IBM RPA Vault.

IBM RPA Vault uses asymmetric encryption. This type of encryption uses a pair of keys:

  • Public keys that can be propagated
  • Private keys available only to their owners

In this encryption system, any person can encrypt a message by using the public key. However, the message can be decrypted only by using the private key. This system ensures strong encryption security without the need to share a single common key across all parties.

IBM RPA Vault has two methods: the system and the local vault. Both of them use asymmetric encryption, and they both are responsible for the configuration and encryption of credentials. You can use credentials in your bots so they can automate tasks that require confidential data.

  • Systemic IBM RPA Vault
    The systemic method of IBM RPA Vault uses user-provided public and private keys to encrypt and decrypt credentials. In this mode, credentials' data are available to users in your IBM RPA Control Center environment.

  • Local IBM RPA Vault
    The local method of IBM RPA Vault uses a public and private key that the IBM RPA system generates by using the user's vault password. The vault password is the password that you use to access IBM RPA Vault on your computer and manage credentials locally.

    In this mode, users in your IBM RPA Control Center environment have access to a credential profile. In each o the users' local computers, they can configure this profile to store the data they want.

See IBM RPA Vault for details on how to use IBM RPA Vault.