Encrypt text with AES Action(Power Automate Desktop)


Japanese version.

Encrypt text with the privatekey method AES.

This function is used when sensitive information is exchanged via e-mail or stored in a shared folder.

This function is the counterpart to the "Decrypt text with AES" action.

How to use

Drag "Encrypt text with AES" under "Cryptography".

Set parameters.



Select the character encoding for encryption.

Text to encrypt

Specifies the text to be encrypted.

Encryption Key

Specifie the password for decryption.


In Advanced, you specify the strength of the encryption.

Basically, the higher the strength, the longer the encryption and compounding takes, the more time and effort required, and the less convenient it is.

It is necessary to consider the level of strength according to the importance of the encryption target.

Consult with the system administrator or security personnel to determine how high the strength should be.

If there is no system administrator or security personnel in the environment, there is no need to use the detailed parameter items.


Specifies the padding (characters to be filled in) when there is a space in the result of encryption.

None" and "Zeros" are low-strength, others are high-strength.

Key size

The larger the number of bits, the higher the strength.

Use salt / Use initialization vector

When used, generates a "Salt" and "Initialization vector".

Both are required for decryption.

You can use both or only one of them.

The intensity is higher when both are used.

Both have additional items when turned on,
Increasing the value increases the intensity.

Variables produced

Stores the result of the execution of the action.


The text of the encrypted result is stored.


Salt is stored if salt is used.

It is needed for decryption.


If an initialization vector is used, the initialization vector is stored.

It is needed for decryption.

For those who want to learn Power Automate Desktop effectively

The information on this site is now available in an easy-to-read e-book format.

Or Kindle Unlimited (unlimited reading).

You willl discover how to about basic operations.

By the end of this book, you will be equipped with the knowledge you need to use Power Automate Desktop to streamline your workflow.


Cryptography Actions