© Ravikanth Chaganti 2018
Ravikanth ChagantiPro PowerShell Desired State Configurationhttps://doi.org/10.1007/978-1-4842-3483-9_13

13. Security in DSC

Ravikanth Chaganti1 
(1)
Saideep Helicon, Bengaluru, India
 

In Chapter 5, you learned how to secure credentials or other sensitive data such as API keys in a DSC configuration document. This ensures that passwords and other sensitive strings are encrypted in the compiled configuration MOF to anyone reading it. You also saw, as a part of the configuration life cycle in Chapter 3, that once the enact completes successfully, the enacted configuration gets stored as current.mof in the C:\Windows\System32\Configuration folder. In this chapter, you will learn how DSC secures the MOF documents at rest in the ...

Get Pro PowerShell Desired State Configuration: An In-Depth Guide to Windows PowerShell DSC now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.