Enable Enterprise Export for CA Flowdock

Document ID : KB000010087
Last Modified Date : 14/02/2018
Show Technical Document Details
Introduction:

This article will assist the organization admin of an Enterprise CA Flowdock account on how to initiate setup for the export of the content of their organization. The CA Flowdock account must be an Enterprise account to be able to use the export.  The export will be provided through an email that will contain a link to download the files.

Instructions:

In order for us to set up Enterprise Export, we will need the following to start the setup process: 


1. Verbal confirmation in the way of a reply to an email by the Owner of the Flowdock Organization - XXXXXX 
2. An email address that will receive the export 
3. A public encryption key (directions below)

     How to create a public/private key

Keys must be created using either the PEM or DER format.  Follow these steps to create a public/private key pair with the PEM format(all commands are run on the command line):

 

  1. openssl genrsa -aes256 -out private.pem 4096
    • Enter a pass phrase when prompted.
    • This will create a file called private.pem that contains the private key.
  2. openssl rsa -aes256 -inform PEM -outform PEM -pubout -in private.pem -out public.pem
    • Enter the pass phrase used in step 1.
    • This will create a file called public.pem that contains the public key.

 

Contact CA Flowdock Support and provide the entire contents of the public.pem file.  Include the BEGIN and END lines.  The information will be entered by Flowdock support into the Organization's enterprise export configuration.

 

Once the email link has been provided in an email called "Flowdock: Enterprise export finished", the files will need to be downloaded.  You will need to decrypt the .iv, .key and .zip files.  Follow these steps to generate an unencrypted zip file:

     How to decrypt the .zip file

  1. openssl rsautl -decrypt -in <input file name>.iv -out <output file name>.iv -inkey private.pem -keyform PEM
    • In this case, private.pem contains the previously generated private key.
    • <input file name>.iv is the downloaded .iv file.
    • Enter the pass phrase.
    • The decrypted initialization vector will then be stored in <output file name>.iv.
  2. openssl rsautl -decrypt -in <input file name>.key -out <output file name>.key -inkey private.pem -keyform PEM
    • In this case, private.pem contains the previously generated private key.
    • <input file name>.key is the downloaded .key file.
    • Enter the pass phrase.
    • The decrypted key will then be stored in <output file name>.key.
  3. openssl aes-256-cbc -d -iv `xxd -c256 -p <output file name>.iv` -K `xxd -c 256 -p <output file name>.key` -in <input file name>.zip -out <output file name>.zip
    • This will make use of the previously decrypted <output file name>.iv and <output file name>.key files
    • <input file name>.zip is the downloaded .zip file.
    • The output will be placed into <output file name>.zip which can then be unzipped using normal methods. Example: unzip <output file name>.zip