...
Logon credentials for the authentication server do not need to be stored in a way that the plain text can be restored. In order to validate a users password it’s enough to calculate the entered passwords hash and compare it to the saved hash. This salted hash is calculated using the scrypt hashing algorithm.
Digital Signature
A digital signature is a mathematical method to verify the authenticity of a message or a document. This is usually done by calculating a hash value over the message using the public certificate of the signer. If the content was modified, the hash will not match the attached hash of the message.
...
There are plenty of certificates used within the CoreOne Suite. There are communication certificates for WCF and HTTPS, there are signing certificates for OIDC and SAML messages and so on. You will find more information about them here: System requirement certificates
Configuration Files
All configuration files that contain sensitive information are symmetrically encrypted using AES-256.
Log Files
Any sensitive information such as connection strings, password or personal data about a user is redacted from the log files by default.
...