Ora

What activity uses salt keys?

Published in Marketing Cloud Security 2 mins read

Salt keys are primarily used in a Journey Builder activity within Salesforce Marketing Cloud to encode JSON Web Token (JWT) information. This process is crucial for enhancing the security and validation of API calls, especially when dealing with custom activities.

Understanding Salt Key Usage in Journey Builder

Salt keys play a vital role in securing communication for custom activities within Salesforce Marketing Cloud's Journey Builder. Their application is centered around the creation and validation of JSON Web Tokens (JWTs).

Here's a breakdown of how and why salt keys are utilized:

  • Encoding JSON Web Tokens (JWTs): Salt keys are employed to encode JWT information. A JWT is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure.
  • Validation of API Calls: The JWT, encoded with a salt key, serves to validate the identity of API calls made to your custom activities. This ensures that only authorized and legitimate requests are processed, preventing unauthorized access or manipulation.
  • Securing Sensitive Operations: This method of using JWTs with salt keys is particularly recommended for activities that involve:
    • Retrieving Sensitive Data: When your custom activity needs to access or pull confidential information.
    • Performing Sensitive Actions: For operations that could have significant implications, such as updating critical records or triggering sensitive processes.

By leveraging salt keys in this manner, organizations can establish a robust security framework for their custom integrations and activities within the Marketing Cloud ecosystem, safeguarding data integrity and user authentication.

For further details on managing encryption keys and security within Salesforce Marketing Cloud, you can refer to resources like Manage Your Encryption Keys.