This is the API to get the secrets. Place your ACID in getsecrets/{acid}&password={password}
AC keeps the private keys, and the cloud only gets the public keys. The cloud generates the sync keys and sends them to the AC using the public key to encrypt the sync keys.
Create a pair in Linux Example:
openssl genpkey -algorithm RSA -out private_key.pem -pkeyopt rsa_keygen_bits:4096
Create a public key:
openssl rsa -in private_key.pem -pubout -out public_key.pem
If you want to download an RSA key pair, click the button below:
Download RSA Key PairEnter your public key filename and ACID below to generate the curl command:
Generated curl command:
COMMAND example
function copyToClipboard(elementId) {
const copyText = document.getElementById(elementId).textContent;
navigator.clipboard.writeText(copyText).then(() => {
alert('Curl command copied to clipboard!');
}).catch(err => {
console.error('Error copying to clipboard: ', err);
});
}
Note: Get the password from Jade to replace $MYPASSWORD in the curl command.
or Simply export MYPASSWORD=password_got_from_Jade and use the curl command
The private key is stored only on your system, ensuring secure access. Sync keys are stored in both the cloud and the AC device.
Encrypt the file containing sensitive information:
openssl pkeyutl -encrypt -inkey public_key.pem -pubin -in AC0000.sec -out AC0000.bin
Decrypt the file using your private key:
openssl pkeyutl -decrypt -inkey private_key.pem -in AC0000.bin -out AC0000.sec
Generate a public key from your existing private key:
openssl rsa -in private_key.pem -pubout -out public_key.pem
For Admin manage keys, visit the following link:
Manage Keys