Open a command prompt and go to the
<PRODUCT_HOME>/bindirectory, where we stored the
ciphertool.shscript using the command prompt as shown below.
Note The Cipher Tool reads the alias values and their corresponding plain text passwords from the
cipher-text.propertiesfile. Note that this tool identifies plain text defined within square brackets as the plain text passwords. If a password is not specified in the
cipher-text.propertiesfile for a corresponding alias, the user needs to provide it through the command-line. Check whether the alias is a known password alias in Carbon configurations. If the tool modifies the configuration element and file, you must replace the configuration element with the alias name. Define a Secret Callback in the configuration file and add proper name spaces for defining the Secure Vault.
When the above command is executed, the following message is prompted: "[Please Enter Primary KeyStore Password of Carbon Server : ]". Enter the keystore password (which is "wso2carbon" for the default keystore). If the script execution completed successfully, you will see the following message: "Secret Configurations are written to the property file successfully".
- Now, to verify the password encryption:
- Open the
cipher-text.propertiesfile and see that the plain text passwords are replaced by a cipher value.
Open the relevant configuration files (e.g., rss-config.xml file) and see that the passwords are encrypted.
secret-conf.propertiesfile stored in the
<PRODUCT_HOME>/repository/conf/security/folder and see that the default configurations are changed.
- Open the
If you want to change a password that is already secured, run the following command:
If you have encrypted passwords as explained above, note that these passwords have to be decrypted again for the server to be usable. That is, the passwords have to be resolved by a system administrator during server startup.