Fortanix DSM
Fortanix DSM Pack.#
This Integration is part of theSupported versions
Supported Cortex XSOAR versions: 6.8.0 and later.
Manage Secrets and Protect Confidential Data using Fortanix Data Security Manager (DSM)
#
Authorize Cortext XSOAR to Fortanix DSM#
User/password or Client Certificate Auth MethodThese fields accept the Username and Password parameters for a user or App. These credentials may also be used for mutual-TLS using a client key and certificate. The may be signed by a Trusted CA if Fortanix DSM is configured accordingly.
#
API KEY Auth MethodAn easy and quick way to test the integration is to specify the Basic Authentication token parameter from the Fortanix DSM App's API KEY.
#
Configure Fortanix DSM in CortexParameter | Description | Required |
---|---|---|
Fortanix DSM server endpoint | URL e.g., https://amer.smartkey.io | True |
Username / App UUID / Certificate | If Certificate, specify PEM | False |
Password / App Secret / Private Key | Private key cannot be encrypted | False |
API Key | Alternative to Username and Password | False |
Trust any server certificate (insecure) | Ignores TLS, not recommended | False |
Use system proxy settings | Whether to use proxy settings from the Environment | False |
Group UUID to list secrets from | Filter the secrets accessible to a single DSM Group | False |
Data protection key used for encryption and decryption | Also configure the Cipher Mode | False |
Encryption and decryption mode | e.g. FPE, GCM, CBC | False |
#
CommandsYou can execute these commands from the CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
fortanix-list-secretsList secrets from one or more specified group(s)
#
Base Commandfortanix-list-secrets
#
InputArgument Name | Description | Required |
---|---|---|
group_id | Group UUID to list secrets from (overrides integration settings). | Optional |
state | Current state of the secret (default show all except deleted or destroyed). Possible values are: enabled, disabled, preactive, active, deactivated, compromised, deleted, destroyed. | Optional |
page | Page offset to return (100 results at a time). | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Fortanix.Secret.Name | string | Secret Name |
Fortanix.Secret.ID | string | Secret ID (Key ID or kid) |
Fortanix.Secret.Group | unknown | Group ID |
#
fortanix-get-secret-metadataGet the secret metadata without exposing its value
#
Base Commandfortanix-get-secret-metadata
#
InputArgument Name | Description | Required |
---|---|---|
name | Name of the secret (mandatory, unless kid is specified). | Optional |
kid | Secret UUID (unless name is unspecified). | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Fortanix.Secret | unknown | Secret metadata, if successful |
#
fortanix-fetch-secretRetrieve the secret value
#
Base Commandfortanix-fetch-secret
#
InputArgument Name | Description | Required |
---|---|---|
kid | Secret UUID (obtained from the list-secrets command). | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Fortanix.Secret.Value | unknown | Sensitive value of the secret |
#
fortanix-new-secretImport a new secret
#
Base Commandfortanix-new-secret
#
InputArgument Name | Description | Required |
---|---|---|
name | Name of the secret. | Required |
value | Sensitive value of the secret. | Required |
group_id | Group UUID to import the secret into. | Optional |
metadata | List of key-value pairs. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Fortanix.Secret | unknown | Secret metadata, if successful |
#
fortanix-rotate-secretUpdate an existing secret, which will be rotated
#
Base Commandfortanix-rotate-secret
#
InputArgument Name | Description | Required |
---|---|---|
name | Name of the secret. | Required |
value | Sensitive value of the secret. | Required |
metadata | List of key-value pairs. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Fortanix.Secret | unknown | Secret metadata, if successful |
#
fortanix-delete-secretDelete the secret
#
Base Commandfortanix-delete-secret
#
InputArgument Name | Description | Required |
---|---|---|
kid | Secret UUID. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Fortanix.Secret.Result | unknown | Deletion status |
#
fortanix-invoke-pluginInvoke a Fortanix Plugin that is executed in a Confidential Computing enclave
#
Base Commandfortanix-invoke-plugin
#
InputArgument Name | Description | Required |
---|---|---|
pid | Plugin UUID. | Required |
input | Arbitrary user input based on the plugin. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Fortanix.Plugin.Output | unknown | Plugin invocation output |
#
fortanix-encryptProtects data using key configured in Fortanix DSM
#
Base Commandfortanix-encrypt
#
InputArgument Name | Description | Required |
---|---|---|
data | User data. | Required |
key | Key name used for protection (overrides configured). | Optional |
mode | Encryption mode (overrides configured). Possible values are: FPE, GCM, CBC. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Fortanix.Data.Cipher | unknown | Encryption output |
#
fortanix-decryptReveal data using key configured in Fortanix DSM
#
Base Commandfortanix-decrypt
#
InputArgument Name | Description | Required |
---|---|---|
cipher | Protected ciphertext. | Required |
kid | Key UUID for decryption (overrides configured). | Optional |
mode | Decryption mode (overrides configured). Possible values are: FPE, GCM, CBC. | Optional |
iv | Nonce or initialization vector (if any). | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Fortanix.Data.Plain | unknown | Decryption output |