Previous Topic: Encryption LibrariesNext Topic: About Certificates and Key Files


Algorithms Used

Computer products that use FIPS 140-2 certified cryptographic modules in FIPS mode can use only FIPS-approved security functions. These include AES (Advanced Encryption Algorithm), SHA-1 (Secure Hash Algorithm), and higher level protocols such as TLS v1.0 as explicitly allowed in the FIPS 140-2 standard and implementation guides.

In non-FIPS mode, CA User Activity Reporting Module uses the following algorithms:

In FIPS mode, CA User Activity Reporting Module uses the following algorithms:

CA User Activity Reporting Module uses SHA-1 as the default digest algorithm to encrypt passwords and sign server requests.

CA User Activity Reporting Module uses TLS v1.0 for communications with external LDAP directories if the LDAP connection uses TLS, communications between iTechnology components, the agent to iGateway service communication in FIPS mode, and the event channel between an agent and the logDepot service.

More information:

FIPS Support Limitations