Variable Hash Transformation
With the Internet of Things: Edge Connect product, connected users and devices can communicate on a publish-subscribe basis within reserved namespaces. In conjunction with the Mutual Authentication behavior, this behavior affects how clients can authenticate themselves to the edge servers, and which groups within namespaces are authorized to access topics.
How it works
This behavior transforms a source string value extracted from the client certificate and stored as a variable, then generates a hash value based on the selected algorithm, for use in authenticating the client request.
You can apply this hash transformation, or either of the Variable Regex Transformation or Variable Substring Transformation behaviors.
Features and options
Field | What it does | Sub-options |
---|---|---|
Algorithm | Specifies the algorithm used to generate the hash value. |
|
Secret Key | Specifies the key to generate the hash, ideally a long random string to ensure adequate security. |
Updated over 2 years ago