Encrypt Bitbucket configuration properties

Administer Bitbucket Data Center and Server

On this page

Still need help?

The Atlassian Community is here for you.

Ask the community

Deprecation notice

In Bitbucket 8.11, we've added a new property encrypted-property.cipher.classname that replaces the existing jdbc.password.decrypter.classname property. This new property allows you to encrypt all properties available in the bitbucket.properties file.

We will be removing the jdbc.password.decrypter.classname property in Bitbucket 9.0 and recommend switching to the new property.

To add extra security to your Bitbucket Data Center and Server instance, you can encrypt the configuration properties that are stored in the bitbucket.properties file. Different encryption methods are available for both basic and advanced users. Additionally, you can create your own encryption mechanism.

The solutions outlined below provide a level of obfuscation for encrypting property values but do not offer complete security. The configuration files will still contain the necessary data to decrypt the values, which means that an attacker with access to these files could potentially decrypt the property values.

These approaches are intended to provide an additional layer of protection against accidental exposure of sensitive data but should not be relied upon as a comprehensive security solution.

Basic encryption

This method uses a Base64 cipher, which is simple obfuscation. It is a straightforward solution for users who don’t want to store sensitive passwords in plain-text (for example, database password). 

Learn more about basic encryption

Advanced encryption

This method allows you to choose an algorithm to encrypt sensitive information. It provides more security as you don't have to store encrypted information anywhere in the configuration file, which makes it difficult for unauthorized parties to find and decrypt it. 

Learn more about advanced encryption

AWS Secrets Manager

AWS Secrets Manager provides a high-level secure storage option for your database credentials. This service retrieves credentials through a runtime call, eliminating hard-coded credentials, such as keys and tokens, altogether.

Learn more about AWS Secrets Manager for encryption

Custom encryption

If you have special requirements for encryption, you can create your own encryption mechanism based on our examples.

Learn more about custom encryption

Last modified on Aug 11, 2023

Was this helpful?

Yes
No
Provide feedback about this article
Powered by Confluence and Scroll Viewport.