<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.appian.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/"><channel><title>Securing a second api key that must be passed in a header</title><link>https://community.appian.com/discussions/f/integrations/26522/securing-a-second-api-key-that-must-be-passed-in-a-header</link><description>We have what is effectively an API broker or proxy tool between our Appian instance and an API we consume. The broker/proxy requires API Authentication to properly identify our system and allow access to the API&amp;#39;s that it brokers. It does not however</description><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>RE: Securing a second api key that must be passed in a header</title><link>https://community.appian.com/thread/104190?ContentTypeID=1</link><pubDate>Sat, 12 Nov 2022 18:05:25 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:8cd38697-dc89-4ef6-a4dd-b508a882f157</guid><dc:creator>Richard Nolan</dc:creator><description>&lt;p&gt;That&amp;#39;s an approach that I&amp;#39;ve hashed out with others.&amp;nbsp; We&amp;#39;ve also gone back to the architects of this network configuration with some questions.&amp;nbsp;&amp;nbsp;&lt;br /&gt;&lt;br /&gt;My main concern here is that some escalation of privilege attack on an Appian environment could necessarily then have an escalation on another system.&amp;nbsp;&lt;br /&gt;&lt;br /&gt;The advantage of encrypting the local constant based key is that it puts the vulnerable key in the admin console, which I like.&amp;nbsp; It does however feel clunky.&amp;nbsp; I&amp;#39;d rather the underlying architecture owned this problem.&lt;/p&gt;
&lt;p&gt;Thanks for your response!&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Securing a second api key that must be passed in a header</title><link>https://community.appian.com/thread/104180?ContentTypeID=1</link><pubDate>Sat, 12 Nov 2022 09:43:26 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:53d990f0-607e-40eb-91b7-167abf9aaed8</guid><dc:creator>Stefan Helzle</dc:creator><description>&lt;p&gt;Any header in HTTP is clear text, that is why we use SSL to encrypt the transport.&lt;/p&gt;
&lt;p&gt;The encryption functions plugin can encrypt and decrypt strings using a static key stored in the secure credential store. So, you could put the encrypted API key into a constant and decrypt it on demand using that static key. That would at least increase the effort to get the access to the API key.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>