Configuring allowed algorithms

CyberArk Trust Protection Foundation - Self-Hosted supports many algorithms1. As a system administrator, you can define which algorithms your organization can track and use at the platform level, and set their priority. Policies can further restrict allowed algorithms, if needed.

By default, CyberArk Trust Protection Foundation - Self-Hosted has enabled all but the most insecure algorithms. When your administrator installed CyberArk Trust Protection Foundation - Self-Hosted, they had the option to change those default settings. If you find they need further refinement, a system administrator can make future changes in CyberArk Configuration Console (VCC).

To configure allowed algorithms in CyberArk Configuration Console

  1. In CyberArk Configuration Console, under the root node, go to the Actions panel and click Configure Allowed Algorithms.

  2. If prompted, enter the local master administrator credentials.

  3. In the Default Algorithm Configuration window, adjust the allowed algorithms:

    • Use the left and right arrows to add or remove algorithms.

    • Use the up and down arrows to change the priority of allowed algorithms.

  4. Click Apply to save your changes.

For additional information, see About default algorithm configuration.