Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Democratizing RPA with Power Automate Desktop

You're reading from   Democratizing RPA with Power Automate Desktop Boost your productivity by implementing best practices for automating repetitive desktop processes

Arrow left icon
Product type Paperback
Published in Apr 2023
Publisher Packt
ISBN-13 9781803245942
Length 308 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Author (1):
Arrow left icon
Peter Krause Peter Krause
Author Profile Icon Peter Krause
Peter Krause
Arrow right icon
View More author details
Toc

Table of Contents (15) Chapters Close

Preface 1. Chapter 1: Getting Started with Power Automate Desktop 2. Chapter 2: Using Power Automate Desktop and Creating Our First Flow FREE CHAPTER 3. Chapter 3: Editing and Debugging UI Flows 4. Chapter 4: Basic Structure Elements and Flow Control 5. Chapter 5: Variables, UI Elements, and Images 6. Chapter 6: Actions for UI Automation 7. Chapter 7: Automate Your Desktop and Workstation 8. Chapter 8: Automating Standard Business Applications 9. Chapter 9: Leveraging Cloud Services and Power Platform 10. Chapter 10: Leveraging Artificial Intelligence 11. Chapter 11: Working with APIs and Services 12. Chapter 12: PAD Enterprise Best Practices 13. Index 14. Other Books You May Enjoy

Using additional security features

In the security environment, we have two action groups in PAD dedicated to this issue. In the Cryptography group, actions are available that enable the encryption and decryption of text or files. A so-called symmetric encryption method based on the Advanced Encryption Standard (AES) algorithm is offered, which allows a maximum key length of 256 bits.

Another option in this action group is to create a hash value for a text or a file. This hash value can also be calculated based on a key that is provided. Hash values are typically used when a text or a file should be checked against changes.

These mechanisms can, of course, fulfill a basic need for security. However, care must also be taken to ensure that the key information is stored securely and is not accessible to everyone. One way to do this is to use the actions in the CyberArk action group. CyberArk is a provider of identity and access management security solutions. After service access...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime