Variable Hash Transformation

With the Internet of Things: Edge Connect product, connected users and devices can communicate on a publish-subscribe basis within reserved namespaces. In conjunction with the Mutual Authentication behavior, this behavior affects how clients can authenticate themselves to the edge servers, and which groups within namespaces are authorized to access topics.

How it works

This behavior transforms a source string value extracted from the client certificate and stored as a variable, then generates a hash value based on the selected algorithm, for use in authenticating the client request.

πŸ“˜

You can apply this hash transformation, or either of the Variable Regex Transformation or Variable Substring Transformation behaviors.

Features and options

Field

What it does

Sub-options

Algorithm

Specifies the algorithm used to generate the hash value.

**

  • SHA256
  • MD5
  • SHA384
**

Secret Key

Specifies the key to generate the hash, ideally a long random string to ensure adequate security.


Did this page help you?