As industries become increasingly cloud-dependent, the traditional model of local data access is rapidly giving way to remote storage and services. With that shift comes a new challenge: securely accessing cloud-based data and services through code. Credential management  especially when balancing automation with security  is anything but straightforward.

While JMP continues to lead in usability and innovation, one aspect that remains somewhat opaque is how credentials are handled under the hood. A prime example is the API key used for programmatic access to JMP Live  a powerful feature, but one that is specific to JMP with no ability for user-specific keys.

In this presentation, I walk through a proof-of-concept infrastructure that enables secure credential invocation within a code-driven workflow. Using test code provided by JMP Support, and JMPs built-in JSL encryption, we explore how to build a secrets management layer that maintains robust security without sacrificing flexibility.

Whether you're working toward automating JMP workflows or simply looking to deepen your understanding of secure integrations, this session provides a practical, example-driven look at a rarely discussed  yet increasingly critical  aspect of JMP in the modern data landscape.

GitHub Repositoryhttps://github.com/nrclark38258/JMP_JSL_Secrets_Management

Presented At Discovery Summit 2025

Presenters

Skill level

Intermediate
  • Beginner
  • Intermediate
  • Advanced

Files

Published on ‎07-09-2025 08:58 AM by Community Manager Community Manager | Updated on ‎09-03-2025 11:32 AM

As industries become increasingly cloud-dependent, the traditional model of local data access is rapidly giving way to remote storage and services. With that shift comes a new challenge: securely accessing cloud-based data and services through code. Credential management  especially when balancing automation with security  is anything but straightforward.

While JMP continues to lead in usability and innovation, one aspect that remains somewhat opaque is how credentials are handled under the hood. A prime example is the API key used for programmatic access to JMP Live  a powerful feature, but one that is specific to JMP with no ability for user-specific keys.

In this presentation, I walk through a proof-of-concept infrastructure that enables secure credential invocation within a code-driven workflow. Using test code provided by JMP Support, and JMPs built-in JSL encryption, we explore how to build a secrets management layer that maintains robust security without sacrificing flexibility.

Whether you're working toward automating JMP workflows or simply looking to deepen your understanding of secure integrations, this session provides a practical, example-driven look at a rarely discussed  yet increasingly critical  aspect of JMP in the modern data landscape.

GitHub Repositoryhttps://github.com/nrclark38258/JMP_JSL_Secrets_Management



Start:
Sun, Jun 1, 2025 09:00 AM EDT
End:
Sun, Jun 1, 2025 10:00 AM EDT
Attachments
0 Kudos