Menu
Skip to main content
Table of Contents
<All topics
Print

Which hash value is used in Application Access?

In Appterix's Application Access, the identity of the applications is determined using a SHA-256 (SHA2) hash value. These hash values ​​are used alongside the manufacturer certificates to allow access in the allow lists and to block access to the respective applications in the block lists. Each application and each version of the application has its own hash value. Appterix Application Access can therefore be used to specifically allow or prohibit application updates and patches in order to avoid known vulnerabilities in the software products.

With a SHA-256 hash value of an application there are various possibilities.

  • Verify the integrity of the application: If the hash value of an application is known, it is possible to compare the hash value of the downloaded or installed application. If the two hash values ​​match, the application has remained unchanged.
  • Check the application for malware: If the hash values ​​of an application do not match, the application may be infected with malware.
  • Check the application for changes: Every change to an application also changes the hash value. This can happen, for example, through hotfixes, patches and updates - but also through targeted changes to source code by attackers.

SHA-256 hash values ​​are an important tool for verifying the integrity and security of applications.