Variable Hash Transformation

With the Internet of Things: Edge Connect product, connected users and devices can communicate on a publish-subscribe basis within reserved namespaces. In conjunction with the Mutual Authentication behavior, this behavior affects how clients can authenticate themselves to the edge servers, and which groups within namespaces are authorized to access topics.

How it works

This behavior transforms a source string value extracted from the client certificate and stored as a variable, then generates a hash value based on the selected algorithm, for use in authenticating the client request.

πŸ“˜

You can apply this hash transformation, or either of the Variable Regex Transformation or Variable Substring Transformation behaviors.

Features and options

FieldWhat it doesSub-options
AlgorithmSpecifies the algorithm used to generate the hash value.
  • SHA256
  • MD5
  • SHA384

Secret KeySpecifies the key to generate the hash, ideally a long random string to ensure adequate security.