blue prism credential manager
Pre-requisites for creating Credentials is having access to System Tab/Manager and then go ahead of creating credentials and you can even restrict these credentials being accessed by roles, processes, and Resources. You can learn more depth about the blue prism credential manager in these tutorials.
The Blue Prism Credential Manager provides a number of functions and features for the secure storage of the user credentials which are used to access target applications. By encrypting and storing credentials securely, Blue Prism can log into applications within a secure run time environment whilst preventing the casual user or developer from re-using those credentials away from the production environment.
Overview
The Credentials Management functionality provides a secure repository for login details used to access target applications. Credentials are stored in the Blue Prism database but are encrypted in such a way that only those who are authorized can retrieve them. The encryption key is stored separately, on the Blue Prism Application Server machine, and is used to provide credentials to validated clients.
The Credentials Management system is responsible for determining which processes, Resource PCs and users are able to access this information, and for providing it on request if allowed by a set of permissions controlled via System Manager.
Used in conjunction with Active Directory integration and the Blue Prism server, the Credentials Manager creates a secure and fully audited access control capability for enterprise implementations.
The Credential Manager is only available for Blue Prism Enterprise Editions.

Authorization
Access to each set of credentials is governed at run time by the following criteria:
Process – Only specified processes can retrieve the credentials. Where a credential is used as part of a sub-process or within a Visual Business Object, the parent process (e.g. the one that started the session) must be appropriately authorized. Therefore, if a second process attempted to use a pre-built object; it will be prevented from using the associated credentials unless it is explicitly authorized.
Resource – Credentials can be restricted such that only specified Run time Resources are authorized to retrieve and utilize the credentials.
User Role – Restricts access to the credential based on the account that the Run time Resource is operating as. This is only valid for Run time Resources which are NOT public (i.e. /public) and which have been configured to run under the context of a user (i.e. /SSO or /user [username] [ password]).
Restricting access to a credential by User Role will prevent the credential from being accessed in the following scenarios:
- When process sessions are created by the scheduler.
- When process sessions are created on Resources which are configured as public.
Note: It is not appropriate to restrict based on User Role when process sessions are created by the scheduler
These restrictions work in combination, i.e. if a set of credentials is restricted by Processes and Resource then both of these criteria must be fulfilled to allow the credentials to be retrieved.
At the request of an authorized and validated client, a credential is decrypted locally on the Blue Prism Server and passed to that client via a secure connection.
Recommended configuration
It is recommended that the configuration of the Blue Prism environment will include:
Encryption Schemes configured with a Server key location.

Configuring Application Servers to store the keys within separate files and optionally applying custom security to the files to restrict access to only the Blue Prism Server service logon account (and a named administrator). Configuring all clients to connect via an Application Server, and to establish secure connections. Leveraging Single Sign On for Blue Prism.
Where Application Servers are not used within the environment, or where native communication security cannot be applied, it may be necessary to manually configure external security measures to prevent sensitive information being transmitted as plain-text.
Protecting the key
When configuring an encryption scheme it is possible to select whether the key will be stored:
Database: the encryption key will be stored within the Blue Prism database. This is commonly appropriate for scenarios where there isn’t an Application Server deployed.
Support clients that connect directly to the database, and those that connect via an Application Server.
Blue Prism Server (recommended): the encryption key will be stored on the Application Server – in this situation, the key will need to be manually deployed to each Application Server within the environment. This is the most commonly selected scenario as it ensures the key is stored separately to the encrypted data. Supports clients that connect via an Application Server.
Data Encryption/Decryption
When a client device submits data that needs to be stored using reversible encryption, or requests data that is stored using reversible encryption, the device that is responsible for carrying out the conversion between plain-text and cipher-text will be dependent on how the client device is connected to the environment.
Application server connection (recommended): The Application Server is responsible for converting between plain-text and cipher-text for client devices that connect via a Blue Prism Application Server.
When appropriately configured, the plain-text will be transmitted between client and server over a secure channel, and the cipher-text will be transmitted between the server and the database over a secure channel.
Direct database connection (not recommended): Client devices that have a direct connection to the Blue Prism database will be responsible for requesting the key and locally converting the data item between plain and ciphertext.
When appropriately configured the cipher-text and key will be transmitted between the client and database over a secure channel.
Irrespective of where the conversion takes place, once the conversion has taken place the memory on the device is immediately cleared and disposed of.
Key revocation
Blue Prism provides the ability easily revoke a key, and there is an option to forcibly revoke (i.e. immediately convert all data encrypted with an old key to use a new key).
The steps required to configure Blue Prism to use a new key for all subsequent data encryption and decryption include:
- Create a new encryption scheme record. Where the key is stored in the database, add the key to the record.Where the key is stored in the application server, update the configuration of each application server to hold the key.
- Update the Credential Manager to use the new scheme
- Update any applicable Work Queues to use the new scheme
- Mark the “old” encryption scheme as unavailable
Hey There. I came across your blog using search.
This is a really well crafted
article. I’ll be sure to bookmark it and come back to read more of your
useful information. Thanks for the post. I’ll be back 🙂