The exponential growth in developing applications and devices has put a spotlight on ensuring that both the end user and service provider's data is secure. Therefore, finding the right mix of security is crucial. For some high security requirement applications, ConfD’s built-in crypto support, which is based on OpenSSL libcrypto, may not be sufficient.
In these cases, ConfD’s built-in crypto support can be removed and then replaced with external components which provide the appropriate crypto support.
This replacement makes use of ConfD’s existing mechanisms which were designed to allow the use of external components, e.g., OpenSSH instead of ConfD’s built-in SSH server. In this application note, we will examine how to remove ConfD’s built-in crypto support and make use of external components instead.
Download this application note to learn how to use ConfD when your system has high security requirements.