Use this activity to Securely send, share, and store sensitive data on demand or in batch, verify data integrity and users as part of an automated robotic process, and generate PGP Keys pairs within your workflow - locally on your own machine, and cryptographically sign a document so that recipients can be verified - and tampering detected.
Generate a Key Pair: Generate a new public and private key for the provided username and password.
Encrypt File: Encrypts a File using a PGP Public Key. The path to save the encrypted file is required.
Decrypt File: Decrypts an Encrypted File using your Private Key and Passphrase.
Sign File: Cryptographically sign a file. Sender can be verified and tampering detected
Sign Clear File: Cryptographically sign a file. Leave the Text is human readable. Sender can be verified and tampering detected
Verify Sign: Verify a file or stream was signed by the matching private key of the counterparty.
Verify Clear Sign: Verify that a clear signed file or stream was signed by the matching private key of the counterparty
Encrypt and Sign: Encrypt a file using a public key and sign using your private key. The process is often that you encrypt with the public key of your counterparty and sign with your private key. Your counterpart would then decrypt with their private key and verify your signature with your public key.
Decrypt and Verify: Decrypt and verify signature of an encrypted and signed file. This is used when your sender encrypts a document with your public key and then signs the encrypted document. You'd then decrypt the message with your private key and verify their identity with their public key.
Note: The PGP activities are offered to allow robots to interact directly with existing business processes that leverage PGP for privacy. They are not designed to provide new information security paradigms, but instead a means to allow the robot to interact with the existing security that is being deployed within a business.