Global Bilgi RPA (EN)

Security

Security

Aktiviteler

Credential Manager

Using the Add Credential, Get Credential and Remove Credential activities, you can access the Windows Credential Manager and perform saved passwords, adding and deleting new credentials.

Decrypt File

Decrypt File activity is used to decrypt an encrypted file and make its contents readable. This activity enables securely encrypted files to become accessible within automation processes.

Parameters:

  • InputFilePath: The full file path of the encrypted file to be decrypted.

  • OutputFilePath: The folder or full path where the decrypted file will be saved.

  • Key: The key value used for the decryption process.

  • IV (optional): Initialization Vector – an additional value used for more secure encryption.

  • Algorithm: The encryption algorithm to be used (e.g., AES, DES).

  • DelayTime: The waiting time before or after the operation (in milliseconds).

  • OutputPath: The full path of the file generated after the operation.

Usage Scenario:
In an RPA process, a daily report is saved in an encrypted format for security reasons. To access and process this file, the robot decrypts it using the Decrypt File activity.

  • InputFilePath: C:\GizliRaporlar\rapor.enc

  • OutputFilePath: C:\CozulmusRaporlar\rapor.xlsx

  • Key: my_secure_key_2024

  • Algorithm: AES

  • IV: iv_gizli_16byte (if required)
    After this operation, the encrypted file is decrypted, and the robot can use the newly created file through OutputPath.

Decrypt Text

Decrypt Text activity is used to decrypt an encrypted text (string) using a specific algorithm and key. It allows securely transmitted or stored text data to be converted into readable form.

Parameters:

  • EncryptedText: The encrypted text to be decrypted.

  • Key: The key value used for the decryption process.

  • IV: Initialization Vector – an optional parameter used for additional security.

  • Algorithm: The decryption algorithm to be used (e.g., AES, DES).

  • DelayTime: The waiting time to be applied before or after the operation.

  • DecryptData: The output containing the decrypted text.

Usage Scenario:
In an automation process, data coming from another system may be received in encrypted text format for security reasons. For example, a username or verification code may arrive encrypted through an API. With the Decrypt Text activity, this text is decrypted and becomes usable in the next steps of the scenario.

  • EncryptedText: a7F3B88dK1==

  • Key: my_secure_key

  • Algorithm: AES

  • IV: iv_16bytes_val

  • DecryptData: KullaniciAdi123
    After this operation, the encrypted text is decrypted and stored in a variable for further use.

Encrypt File

Encrypt File activity is used to encrypt the contents of a file using a specific algorithm and key. This ensures that sensitive files can be securely stored or transferred within an automation process.

Parameters:

  • InputFilePath: The full file path of the file to be encrypted.

  • InputFilePathChoose: Option to manually select the file via user interface (used in interactive applications).

  • OutputFilePath: The directory or full path where the encrypted file will be saved.

  • Key: The secure key used for the encryption process.

  • Algorithm: The encryption algorithm to be used (e.g., AES, DES, RSA).

  • DelayTime: The waiting time applied before or after the encryption process.

  • IV: Initialization Vector – an optional encryption value used for additional security.

Usage Scenario:
In an RPA process, the robot needs to securely store a generated report so that unauthorized users cannot access it. Therefore, the report file must be encrypted and saved to a specific directory.

  • InputFilePath: C:\Raporlar\GunlukRapor.xlsx

  • OutputFilePath: C:\SifreliRaporlar\GunlukRapor.enc

  • Key: my_secure_key_2024

  • Algorithm: AES

  • IV: 16byte_vector_123 (if required)

  • DelayTime: 500
    After this process, the file is encrypted and securely stored for later use.

Encrypt Text

Encrypt Text activity is used to secure a text (string) by encrypting it with a specific algorithm and key. This activity is especially useful when sensitive data such as usernames, passwords, or tokens must be stored or transmitted securely.

Parameters:

  • Text: The raw text to be encrypted.

  • Key: The key to be used for the encryption process.

  • Algorithm: The encryption algorithm to be used (e.g., AES, DES).

  • IV: Initialization Vector – an optional parameter that adds an extra layer of security to the encryption.

  • DelayTime: The waiting time in milliseconds before or after the operation.

  • EncryptData: The encrypted text output (can be stored or transmitted in its cryptographic form).

Usage Scenario:
In an RPA scenario, a user-provided password must not be stored in plain text but instead saved in encrypted form.

  • Text: Parola2025!

  • Key: anahtar_123

  • Algorithm: AES

  • IV: vector_16bytes_xyz (if required)

  • EncryptData: a7F3B88dK1==
    As a result of this activity, the text “Parola2025!” is encrypted and can be used securely within the system.

Hash File

Hash File activity is used to apply a hash algorithm to a file’s contents, producing a unique digital fingerprint of the file. Hashing is commonly used for data integrity checks, change detection, and security validations.

Parameters:

  • InputFilePath: The full path of the file to be hashed.

  • InputFilePathChoose: Option for the user to select the file through an interface.

  • OutputFilePath: The path where the resulting hash value will be saved.

  • Key: A security key used in certain algorithms (e.g., HMAC).

  • Algorithm: The hash algorithm to be used (e.g., MD5, SHA1, SHA256, SHA512, HMACSHA256).

  • DelayTime: The waiting time applied before or after the process.

Usage Scenario:
In an automation process, you may want to check whether a file has been modified at any stage. To do this, the file is hashed once, and later hashed again for comparison.

  • InputFilePath: C:\Belgeler\rapor.xlsx

  • Algorithm: SHA256

  • OutputFilePath: C:\Kontroller\rapor_hash.txt

  • DelayTime: 200
    When this activity is executed, the SHA256 hash value of the “rapor.xlsx” file is generated and can be written to a file if needed.

Hash Text

Hash Text activity is used to generate a cryptographic hash of a given text using a selected algorithm. This activity is commonly used for password storage, data integrity validation, or general security checks.

Parameters:

  • Text: The plain text to be hashed.

  • Key: A security key used only if the selected algorithm is HMAC (e.g., HMACSHA256).

  • Algorithm: The hash algorithm to be used (e.g., MD5, SHA1, SHA256, SHA512, HMACSHA256).

  • DelayTime: The waiting time before or after the process (in milliseconds).

  • HashedData: The resulting hashed output (encrypted summary data).

Usage Scenario:
In a scenario where a user-provided password must not be stored as plain text, the system requires it to be saved in hashed form. This provides security and ensures the password cannot be reversed.

  • Text: Parola2025!

  • Key: gizli_anahtar (only for HMAC)

  • Algorithm: SHA256

  • DelayTime: 300

  • HashedData: 5e88489…bcb34
    When this activity is executed, the SHA256 hash value of “Parola2025!” is generated and stored in a variable for comparison or storage purposes.

Do you want to have Digital Employees?