O'Reilly logo

Moodle 3.x Developer's Guide by Ian Wild

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Encrypting data

Our client has insisted that the completion data be protected from unauthorized access in some way as it is being sent across the network (that is, data in transit); It will fall within the remit of the European General Data Protection Requirements (GPDR). In this section, we investigate implementing public key cryptography. Our client provides us with a public key with which to encrypt the data. They then can decrypt the data with a private key which only they possess (visit https://en.wikipedia.org/wiki/Public-key_cryptography for an overview of the process). PHP contains a built-in API that can be used to create a public-private key pair. It is the OpenSSL extension library (visit http://php.net/manual/en/book.openssl.php ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required