The embedded security vault feature of Jiffy helps to reduce the risk of a security breach of sensitive data. The BOT designers need not know the actual credentials of the applications being automated. These credentials are entered by the operations users in the Data security vault, and the bot accesses these credentials on a need basis through predefined tokens.
The Vault can be accessed by business users, designers, and the bots with varying degree of access
JiffyRPA automatically ensures that the secure data is not appearing any logs.
The Business User stores credentials and secure data including login questionnaire on the vault and shares the key with the designer. Bot designer has access to vault and he defines values for keys in the vault. The Designer designs and executes bots and during execution, bots extract values for keys during run time and retrieve keys defined by designer, not what is defined by business user
Yes Jiffy supports Integration with Client security applications like CyberArk . As a best practice we recommend using CyberArk for internal applications, which has the inbuilt key feature of password rotation and use the Security Vault of Jiffy for external applications
Jiffy’s Secure Vault uses best in class security with AES 256 for data at rest and TLS 1.2 for data in motion, ensuring that no data can be spied upon. All passwords are masked and not visible to the user in plain text. All communications between Jiffy User, Jiffy Web Console and Jiffy Service running on the bot desktop are performed using outbound WCF TLS communications and inbound SSL.