Open a command prompt and go to the
<PRODUCT_HOME>/bindirectory, where we stored the
ciphertool.shscript using the command prompt as shown below.
The Cipher Tool reads the alias values and their corresponding plain text passwords from theNote that this tool identifies plain text defined within square brackets as the plain text passwords.
Shown below is an example of an alias and the corresponding plain text password (in square brackets):
If a password is not specified in thea corresponding
an alias, the user needs to provide it through the command-line. Check whether the alias is a known password alias in Carbon configurations. If the tool modifies the configuration element and file, you must replace the configuration element with the alias name. Define a Secret Callback in the configuration file and add proper name spaces for defining the Secure Vault.
When the above command is executed, the following message is prompted: "[Please Enter Primary KeyStore Password of Carbon Server : ]". Enter the keystore password (which is "wso2carbon" for the default keystore). If the script execution completed successfully, you will see the following message: "Secret Configurations are written to the property file successfully".
- Now, to verify the password encryption:
- Open the
cipher-text.propertiesfile and see that the plain text passwords are replaced by a cipher value.
Open the relevant configuration files (e.g., rss-config.xml file) and see that the passwords are encrypted.
secret-conf.propertiesfile stored in the
<PRODUCT_HOME>/repository/conf/security/folder and see that the default configurations are changed.
- Open the