Page History
...
Open a command prompt and go to the
<PRODUCT_HOME>/bin
directory, where we stored theciphertool.sh
script.Run the
ciphertool.sh
script using the command prompt as shown below.Code Block ./ciphertool.sh -Dconfigure
Note The Cipher Tool reads the alias values and their corresponding plain text passwords from the
Note that this tool identifies plain text defined within square brackets as the plain text passwords.cipher-text.properties
file.Shown below is an example of an alias and the corresponding plain text password (in square brackets):
Code Block UserManager.AdminUser.Password=[admin]
If a password is not specified in the
a correspondingcipher-text.properties
file foran alias, the user needs to provide it through the command-line. Check whether the alias is a known password alias in Carbon configurations. If the tool modifies the configuration element and file, you must replace the configuration element with the alias name. Define a Secret Callback in the configuration file and add proper name spaces for defining the Secure Vault.
When the above command is executed, the following message is prompted: "[Please Enter Primary KeyStore Password of Carbon Server : ]". Enter the keystore password (which is "wso2carbon" for the default keystore). If the script execution completed successfully, you will see the following message: "Secret Configurations are written to the property file successfully".
- Now, to verify the password encryption:
- Open the
cipher-text.properties
file and see that the plain text passwords are replaced by a cipher value. Open the relevant configuration files (e.g., rss-config.xml file) and see that the passwords are encrypted.
Open the
secret-conf.properties
file stored in the<PRODUCT_HOME>/repository/conf/security/
folder and see that the default configurations are changed.
- Open the
...