[ 
https://issues.apache.org/jira/browse/FINERACT-1034?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17135183#comment-17135183
 ] 

Michael Vorburger commented on FINERACT-1034:
---------------------------------------------

> I have encountered some instances where the request body in an API need to be 
> encrypted from the source. (An Example for this is can be a guideline on 
> `Authentication api` to encrypt username and password right from the source). 

Is the main goal here to encrypt "in transit" (so to protect from eavesdropping 
on the network) or "at rest" (to protect someone obtaining the database) ? For 
the former, one could argue that HTTPS (which Fineract enforces) already 
provides that. I'm concerned that requiring e.g. Web UI and App clients of the 
Authentication API to encrypt username and password will add significant 
complexity to such clients.

I don't want to be PITA (and want to encourage you [~fynmanoj] to contribute 
more! and I'm concerned that "pushing back" here could be misinterpreted as the 
project not welcoming contributions... we would love to see more from you!), 
but I have to admit that I still don't really get the point of this feature.

> The decryption method is added to the PR

Perhaps seeing a real world example usage of the decryption method would help 
the project's current maintainers better understand its value.

[~ptuomola] and [~awasum] FYI.

> RSA Encryption
> --------------
>
>                 Key: FINERACT-1034
>                 URL: https://issues.apache.org/jira/browse/FINERACT-1034
>             Project: Apache Fineract
>          Issue Type: Improvement
>            Reporter: Manoj
>            Assignee: Manoj
>            Priority: Minor
>             Fix For: 1.4.0
>
>
> Add RSA key generation API and decryption infra for requests that require 
> encryption from source such as biometric, authentication etc.. Also create a 
> self expiring keystore



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to