AC Key Generation Guide

API to Get Secrets

This is the API to get the secrets. Place your ACID in getsecrets/{acid}&password={password}

Basic Idea

AC keeps the private keys, and the cloud only gets the public keys. The cloud generates the sync keys and sends them to the AC using the public key to encrypt the sync keys.

Steps to Follow for the AC

1. Download or Create a RSA Key Pair

Create a pair in Linux Example:

openssl genpkey -algorithm RSA -out private_key.pem -pkeyopt rsa_keygen_bits:4096

Create a public key:

openssl rsa -in private_key.pem -pubout -out public_key.pem

Download RSA Key Pair

If you want to download an RSA key pair, click the button below:

Download RSA Key Pair

2. Use the Public Key to Get the Sync Keys

Enter your public key filename and ACID below to generate the curl command:

Generated curl command:

COMMAND example

function copyToClipboard(elementId) { const copyText = document.getElementById(elementId).textContent; navigator.clipboard.writeText(copyText).then(() => { alert('Curl command copied to clipboard!'); }).catch(err => { console.error('Error copying to clipboard: ', err); }); }

Note: Get the password from Jade to replace $MYPASSWORD in the curl command. or Simply export MYPASSWORD=password_got_from_Jade and use the curl command

The private key is stored only on your system, ensuring secure access. Sync keys are stored in both the cloud and the AC device.

Other instructions

Encrypt the File

Encrypt the file containing sensitive information:

openssl pkeyutl -encrypt -inkey public_key.pem -pubin -in AC0000.sec -out AC0000.bin

Decrypt the File

Decrypt the file using your private key:

openssl pkeyutl -decrypt -inkey private_key.pem -in AC0000.bin -out AC0000.sec

If You Already Have a Private Key

Generate a public key from your existing private key:

openssl rsa -in private_key.pem -pubout -out public_key.pem

Manage Keys

For Admin manage keys, visit the following link:

Manage Keys