Discussions
Stay up-to-date with the latest news from NetSuite. You’ll be in the know about how to connect with peers and take your business to new heights at our virtual, in-person, on demand events, and much more.
Now is the time to ask your NetSuite-savvy friends and colleagues to join the NetSuite Support Community! Refer now! Click here to watch and learn more!
Update your Profile with your Support type to get your Support Type badge.
Uncover the power of data with the Analytics Hub —your ultimate guide to mastering NetSuite Saved Searches and Reports. Simplify the complex and unlock your organization's true potential. Dive into the Analytics Hub now and soar to new heights!
To help you get the most out of your 2025.2 Release Preview account, review the topics outlined in the 2025.2 Release Preview Guide.
Nominate Your Peers for NetSuite Support Community's Choice of the Quarter! Submit your nomination today.
Intelligent Payment Automation version 1.0.3 is now available in the SuiteApp Marketplace. The SuiteApp, powered by BILL, lets you automate payments, manage vendor details, and bank account information within NetSuite. Learn more
hmac.digest AN_ERROR_OCCURRED_WHILE_DECRYPT_PASSWORDGUID
I'm trying to create a Azure Security Access Token within SuiteScript. I am getting AN_ERROR_OCCURRED_WHILE_DECRYPT_PASSWORDGUID when calling hmac.digest method in the below NetSuite Code.
The Netsuite code is based on code found on Microsoft website to do the same thing in Node.Js below.
Node.Js Code.
var generateSasToken = function(resourceUri, signingKey, policyName, expiresInMins) { resourceUri = encodeURIComponent(resourceUri); // Set expiration in seconds var expires = (Date.now() / 1000) + expiresInMins * 60; expires = Math.ceil(expires); var toSign = resourceUri + 'n' + expires; // Use crypto var hmac = crypto.createHmac('sha256', new Buffer(signingKey, 'base64')); hmac.update(toSign); var base64UriEncoded = encodeURIComponent(hmac.digest('base64')); // Construct autorization string var token = "SharedAccessSignature sr=" + resourceUri + "&sig=" + base64UriEncoded + "&se=" + expires; if (policyName) token += "&skn="+policyName; return token; }; 0