O'Reilly logo

Pro PowerShell Desired State Configuration: An In-Depth Guide to Windows PowerShell DSC by Ravikanth Chaganti

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

© Ravikanth Chaganti 2018

Ravikanth Chaganti, Pro PowerShell Desired State Configuration, https://doi.org/10.1007/978-1-4842-3483-9_13

13. Security in DSC

Ravikanth Chaganti

(1)Saideep Helicon, Bengaluru, India

In Chapter 5, you learned how to secure credentials or other sensitive data such as API keys in a DSC configuration document. This ensures that passwords and other sensitive strings are encrypted in the compiled configuration MOF to anyone reading it. You also saw, as a part of the configuration life cycle in Chapter 3, that once the enact completes successfully, the enacted configuration gets stored as current.mof in the C:\Windows\System32\Configuration folder. In this chapter, you will learn how DSC secures the MOF documents at rest in ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required