{"id":91445,"date":"2017-10-18T10:06:12","date_gmt":"2017-10-18T08:06:12","guid":{"rendered":"http:\/\/artigianodelsoftware.it\/blog\/?p=91445"},"modified":"2017-10-18T14:01:33","modified_gmt":"2017-10-18T12:01:33","slug":"criptiamo-i-contenuti-di-jira-test-addon","status":"publish","type":"post","link":"https:\/\/artigianodelsoftware.it\/blog\/2017\/10\/18\/criptiamo-i-contenuti-di-jira-test-addon\/","title":{"rendered":"Criptiamo i contenuti di JIRA &#8211; Test addon"},"content":{"rendered":"<div class=\"pdfprnt-buttons pdfprnt-buttons-post pdfprnt-top-right\"><a href=\"javascript: imageToPdf()\" class=\"pdfprnt-button pdfprnt-button-pdf\" target=\"_self\"><img src=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/plugins\/pdf-print\/images\/pdf.png\" alt=\"image_pdf\" title=\"Visualizza PDF\" \/><\/a><a href=\"https:\/\/artigianodelsoftware.it\/blog\/wp-json\/wp\/v2\/posts\/91445?print=print\" class=\"pdfprnt-button pdfprnt-button-print\" target=\"_blank\"><\/a><\/div><blockquote>\n<h1>Torniamo sull&#8217;argomento<\/h1>\n<\/blockquote>\n<p>IN questo post andremo a testare questo addon che tratta un argomento delicato ma importante: Come criptare i contenuti di JIRA.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/marketplace-cdn.atlassian.com\/files\/images\/559576ca-9b91-4e84-96c5-321e60f957d8.png\" \/><\/p>\n<blockquote>\n<h1>Installazione<\/h1>\n<\/blockquote>\n<p>Partiamo dalla fase di installazione. Ricerchiamo il nostro addon nella maschera di ricerca:\u00a0<img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-91458\" src=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-01.png\" alt=\"\" width=\"1065\" height=\"209\" srcset=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-01.png 1065w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-01-300x59.png 300w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-01-768x151.png 768w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-01-1024x201.png 1024w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-01-619x121.png 619w\" sizes=\"(max-width: 1065px) 100vw, 1065px\" \/><\/p>\n<p>Selezioniamo\u00a0<em><strong>Free trial<\/strong><\/em>\u00a0per attivare l&#8217;installazione &#8230;.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-91457\" src=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-02.png\" alt=\"\" width=\"634\" height=\"298\" srcset=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-02.png 634w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-02-300x141.png 300w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-02-619x291.png 619w\" sizes=\"(max-width: 634px) 100vw, 634px\" \/><\/p>\n<p>&#8230;. lasciamo quindi il tempo della installazione &#8230;.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-91456\" src=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-03.png\" alt=\"\" width=\"628\" height=\"281\" srcset=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-03.png 628w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-03-300x134.png 300w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-03-619x277.png 619w\" sizes=\"(max-width: 628px) 100vw, 628px\" \/><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-91455\" src=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-04.png\" alt=\"\" width=\"615\" height=\"281\" srcset=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-04.png 615w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-04-300x137.png 300w\" sizes=\"(max-width: 615px) 100vw, 615px\" \/><\/p>\n<p>&#8230; una volta che l&#8217;installazione viene conclusa, si passa alla gestione della licenza &#8230;.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-91454\" src=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-05.png\" alt=\"\" width=\"462\" height=\"231\" srcset=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-05.png 462w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-05-300x150.png 300w\" sizes=\"(max-width: 462px) 100vw, 462px\" \/><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-91453\" src=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-06.png\" alt=\"\" width=\"427\" height=\"235\" srcset=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-06.png 427w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-06-300x165.png 300w\" sizes=\"(max-width: 427px) 100vw, 427px\" \/><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-91452\" src=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-07.png\" alt=\"\" width=\"427\" height=\"279\" srcset=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-07.png 427w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-07-300x196.png 300w\" sizes=\"(max-width: 427px) 100vw, 427px\" \/><\/p>\n<p>&#8230; una volta applicata la licenza, lasciamo che si chiudano le ultime operazioni fino al termina con il messaggio finale:<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-91450\" src=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-09.png\" alt=\"\" width=\"629\" height=\"344\" srcset=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-09.png 629w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-09-300x164.png 300w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-09-619x339.png 619w\" sizes=\"(max-width: 629px) 100vw, 629px\" \/><\/p>\n<p>Passiamo alla fase successiva: configurazione.<\/p>\n<p>&nbsp;<\/p>\n<blockquote>\n<h1>Configurazione<\/h1>\n<\/blockquote>\n<p>Proseguiamo con la configurazione. La prima cosa che viene richiesta \u00e8 eseguire una\u00a0<em><strong>Re-index<\/strong><\/em>, dato che l&#8217;addon introduce nuovi tipi di campi custom. Quindi, come mostrato dalla seguente immagine:<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-91451\" src=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-08.png\" alt=\"\" width=\"491\" height=\"264\" srcset=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-08.png 491w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-08-300x161.png 300w\" sizes=\"(max-width: 491px) 100vw, 491px\" \/><\/p>\n<p>Eseguiamo tale operazione e continuiamo nella fase di configurazione. Come vediamo dalla seguente immagine:<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-91449\" src=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-10.png\" alt=\"\" width=\"1009\" height=\"344\" srcset=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-10.png 1009w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-10-300x102.png 300w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-10-768x262.png 768w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-10-619x211.png 619w\" sizes=\"(max-width: 1009px) 100vw, 1009px\" \/><\/p>\n<p>generiamo la chiave di codifica\/decodifica dei dati. \u00a0Usiamo il tasto <em><strong>Generate<\/strong><\/em> per generare tali chiavi e memorizzarle. :-). Una volta impostato, possiamo eseguire la codifica\/decodifica dei dati.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-91448\" src=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-11.png\" alt=\"\" width=\"809\" height=\"420\" srcset=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-11.png 809w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-11-300x156.png 300w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-11-768x399.png 768w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-11-619x321.png 619w\" sizes=\"(max-width: 809px) 100vw, 809px\" \/>Passiamo alla fase di test.<\/p>\n<p>&nbsp;<\/p>\n<blockquote>\n<h1>Test<\/h1>\n<\/blockquote>\n<p>Concludiamo con il test. Definiamo un nuovo campo criptato, come indicato nella seguente immagine<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-91465\" src=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-16.png\" alt=\"\" width=\"867\" height=\"342\" srcset=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-16.png 867w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-16-300x118.png 300w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-16-768x303.png 768w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-16-619x244.png 619w\" sizes=\"(max-width: 867px) 100vw, 867px\" \/><\/p>\n<p>dopo di che, dopo aver eseguito una nuova re-index dei dati, procediamo con riempire il campo con i seguenti dati . Come possiamo vedere, abbiamo questa situazione:<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-91461\" src=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-15.png\" alt=\"\" width=\"1013\" height=\"548\" srcset=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-15.png 1013w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-15-300x162.png 300w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-15-768x415.png 768w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-15-619x335.png 619w\" sizes=\"(max-width: 1013px) 100vw, 1013px\" \/><\/p>\n<p>ma se andiamo su database e andiamo a leggere i dati, questo \u00e8 il risultato:<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-91462\" src=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-14.png\" alt=\"\" width=\"944\" height=\"530\" srcset=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-14.png 944w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-14-300x168.png 300w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-14-768x431.png 768w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-14-619x348.png 619w\" sizes=\"(max-width: 944px) 100vw, 944px\" \/><\/p>\n<p>ovvero il campo risulta criptato. Se invece andiamo a inserire una immagine, se andiamo a eseguire la criptazione, come indicato nella seguente figura:<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-91466\" src=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-17.png\" alt=\"\" width=\"1230\" height=\"471\" srcset=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-17.png 1230w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-17-300x115.png 300w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-17-768x294.png 768w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-17-1024x392.png 1024w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-17-619x237.png 619w\" sizes=\"(max-width: 1230px) 100vw, 1230px\" \/><\/p>\n<p>se selezioniamo <em><strong>Encrypt<\/strong><\/em> quello che otteniamo \u00e8 che il file allegato sar\u00e0 leggibile solo all&#8217;interno di JIRA, mentre se andiamo a basso livello e leggiamo il contenuto del file, questo sar\u00e0 il risultato:<img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-91464\" src=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-12.png\" alt=\"\" width=\"1324\" height=\"517\" srcset=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-12.png 1324w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-12-300x117.png 300w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-12-768x300.png 768w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-12-1024x400.png 1024w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-12-619x242.png 619w\" sizes=\"(max-width: 1324px) 100vw, 1324px\" \/><\/p>\n<p>se invece eseguiamo la decriptazione, attraverso il tasto <em><strong>Decrypt<\/strong><\/em>, allora il risultato sar\u00e0 il seguente:<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-91463\" src=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-13.png\" alt=\"\" width=\"1314\" height=\"520\" srcset=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-13.png 1314w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-13-300x119.png 300w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-13-768x304.png 768w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-13-1024x405.png 1024w, https:\/\/artigianodelsoftware.it\/blog\/wp-content\/uploads\/2017\/10\/Encrypt-02-13-619x245.png 619w\" sizes=\"(max-width: 1314px) 100vw, 1314px\" \/><\/p>\n<p>permettendo di leggere il file.<\/p>\n<p>&nbsp;<\/p>\n<blockquote>\n<h1>Addendum &#8211; 20171018<\/h1>\n<\/blockquote>\n<p>Come fatto notare dagli autori dell&#8217;addon (vedi commento a questo post), ogni volta che aggiungiamo un allegato, questo viene automaticamente criptato. Un ringraziamento per la precisazione che ci aiuta a descrivere meglio il funzionamento dell&#8217;addon \ud83d\ude42<\/p>\n<p>&nbsp;<\/p>\n<blockquote>\n<h1>Conclusione<\/h1>\n<\/blockquote>\n<p>Abbiamo visto un addon che permette di criptare i dati su database di JIRA\/allegati (che sono su File System), permettendo di mantenere la sicurezza dei dati anche se qualcuno dovesse in qualche modo andare a &#8216;bucare&#8217; la sicurezza del nostro server JIRA.<\/p>\n<p>&nbsp;<\/p>\n<blockquote>\n<h1>Reference<\/h1>\n<\/blockquote>\n<p>Maggiori informazioni sono presenti nella <a title=\"\" href=\"https:\/\/marketplace.atlassian.com\/plugins\/com.devoog.jira.plugin.encrypted\/server\/overview\" target=\"_blank\" rel=\"noopener\">pagina del marketplace<\/a>.<\/p>\n<div class=\"clearfix\"><span class='ldc-ul_cont' onclick=\"alter_ul_post_values(this,'91445','like')\" >Likes<img src=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/plugins\/like-dislike-counter-for-posts-pages-and-comments\/images\/up.png\" \/>(<span>0<\/span>)<\/span><span class='ldc-ul_cont' onclick=\"alter_ul_post_values(this,'91445','dislike')\" >Dislikes<img src=\"https:\/\/artigianodelsoftware.it\/blog\/wp-content\/plugins\/like-dislike-counter-for-posts-pages-and-comments\/images\/down.png\" \/>(<span>0<\/span>)<\/span><\/div>","protected":false},"excerpt":{"rendered":"<p>Torniamo sull&#8217;argomento IN questo post andremo a testare questo addon che tratta un argomento delicato ma importante: Come criptare i contenuti di JIRA. Installazione Partiamo dalla fase di installazione. Ricerchiamo il nostro addon nella maschera di ricerca:\u00a0 Selezioniamo\u00a0Free trial\u00a0per attivare<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":0,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","footnotes":""},"categories":[3,14,15,16,17,22],"tags":[30,34,70,71,74,75,89],"_links":{"self":[{"href":"https:\/\/artigianodelsoftware.it\/blog\/wp-json\/wp\/v2\/posts\/91445"}],"collection":[{"href":"https:\/\/artigianodelsoftware.it\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/artigianodelsoftware.it\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/artigianodelsoftware.it\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/artigianodelsoftware.it\/blog\/wp-json\/wp\/v2\/comments?post=91445"}],"version-history":[{"count":6,"href":"https:\/\/artigianodelsoftware.it\/blog\/wp-json\/wp\/v2\/posts\/91445\/revisions"}],"predecessor-version":[{"id":91475,"href":"https:\/\/artigianodelsoftware.it\/blog\/wp-json\/wp\/v2\/posts\/91445\/revisions\/91475"}],"wp:attachment":[{"href":"https:\/\/artigianodelsoftware.it\/blog\/wp-json\/wp\/v2\/media?parent=91445"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/artigianodelsoftware.it\/blog\/wp-json\/wp\/v2\/categories?post=91445"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/artigianodelsoftware.it\/blog\/wp-json\/wp\/v2\/tags?post=91445"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}