Skip to content

Commit d2e3028

Browse files
committed
add Security article for CloudUpload and update Security article for AsyncUpload.
1 parent 0b01176 commit d2e3028

File tree

2 files changed

+20
-1
lines changed

2 files changed

+20
-1
lines changed

controls/asyncupload/security.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,10 @@ position: 14
1010

1111
# Security
1212

13-
##
13+
## ConfigurationEncryptionKey
1414

1515
One of the approaches, which ensures a secure application is to store the sensitive information not in a readable or easily decodable format. Therefor, the information about the configuration of RadAsyncUpload(e.g. Target Folder, AllowedFileExtensions ) is encrypted and sent to the client, using with default encryption key. In order to encrypt the configuration in a secure way, we strongly recommend to set the custom encryption key in the **web config** using the following app setting -**Telerik.AsyncUpload.ConfigurationEncryptionKey**.
16+
17+
## ConfigurationHashKey
18+
19+
In addition to the ConfigurationEncryptionKey, as from **R1 2017**, the Encrypt-then-MAC approach is implemented, in order to improve the integrity of the encrypted temporary and target folders. It includes adding a new **Telerik.Upload.ConfigurationHashKey** in the web.config and a hashing function that hashes the encrypted text. The encrypted text is later checked in the upload handler for verifying the integrity of the values. If the hashing attempt is incorrect, a **new CryptographicException("The hash is not valid!");** will be thrown.

controls/cloudupload/security.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
---
2+
title: Security
3+
page_title: Security | RadCloudUpload for ASP.NET AJAX Documentation
4+
description: Security
5+
slug: cloudupload-security
6+
tags: security
7+
published: True
8+
position: 14
9+
---
10+
11+
# Security
12+
13+
## ConfigurationHashKey
14+
15+
As from **R1 2017**, the Encrypt-then-MAC approach is implemented, in order to improve the integrity of the for the CloudUpload encryption. The encrypted options, which are sent to the storage, are **AllowedFileExtensions** and **MaxFileSize**. The implementation includes adding a new **Telerik.Upload.ConfigurationHashKey** in the web.config and a hashing function that hashes the encrypted text. The encrypted text is later checked in the upload handler for verifying the integrity of the values. If the hashing attempt is incorrect, a **new CryptographicException("The hash is not valid!");** will be thrown.

0 commit comments

Comments
 (0)