

- #KEYSTORE EXPLORER REMOTE MACHINE INSTALL#
- #KEYSTORE EXPLORER REMOTE MACHINE FULL#
- #KEYSTORE EXPLORER REMOTE MACHINE PASSWORD#
- #KEYSTORE EXPLORER REMOTE MACHINE WINDOWS#
#KEYSTORE EXPLORER REMOTE MACHINE PASSWORD#
Each of these files is protected by the associated CA password and contains the CA private key and all the hosts private keys signed by this CA. For each CA, a corresponding file is created in the CA store directory (by default /var/data). In interactive shell, arguments can be quoted with ".įor example, to create a CA with password 123 456: Exit from the shell with using the exit command or on Linux pressing Control+D on the command prompt.Print the tool version with the version command.You can execute the Managing host keys commands and use the closeCA command to go back to the initial state (no CA open).You can execute the Managing CA commands.No CA is open, this is the initial state:.On the interactive shell, you have two different states: on Linux, from a graphical file manager, double click the ksm.sh file in.on Windows, from the Explorer, double click the ksm.bat file in.Launch the ksm.bat or ksm.sh without any arguments. With an interactive shell in console in which you can enter many commands and their options.By command line, using command line arguments:.KeyStore manager can be used in the following ways: Later, you can use the KeyStore Manager to create and manage a new CA or on the existing CA to add new host key, or re-export existing host keys. Theses files must be configured in the Filebeat configuration file on The private key, protected by the export password used when exporting the host keys.The truststore and keystore to be used for the ADI Lumberjack TLS configuration.īoth files are protected by the export password used when exporting the host keys. Do not use it to configure the TLS configuration.

The host keys DNS names must match the host names. Scenario: You want to configure a TLS communication between two filebeat agents (hosted on and ) and a Lumberjack connector in DI (hosted on ).įor that, use KeyStore Manager to create a new CA named Lumberjack (the CA name can be freely chosen) with 3 hosts, 2 of them exported in OpenSSL ( and ) and 1 in JKS ( ). The private key encryption algorithm to be used when exporting the host key in OpenSSL format. The default value is equivalent to 3 years. The number of days for certificates validity. The size of the private key that will be generated.

PKCS12 is recommended since it is more secure and interoperable than JKS. The location of the exposed host key files. If changed, you must secure this location the way you did for /var in the Installation section. Check the Replace all child object permission entries with inheritable permission entries from this object checkbox.
#KEYSTORE EXPLORER REMOTE MACHINE FULL#
#KEYSTORE EXPLORER REMOTE MACHINE INSTALL#
Else you can install in any writable location.
#KEYSTORE EXPLORER REMOTE MACHINE WINDOWS#
On Windows to install in C:\Program Files, you must be an Administrator and grant the modification permission when asked by UAC. On Windows execute the following command to install in console mode: start /wait -c In console mode, execute the installer with the -c parameter.In GUI mode no special parameters are needed.This means that you must not install the KeyStore Manager on any Axway Decision Insight (DI) or Decision Insight Messaging System (DIMS) node.Ī Windows 7+, Windows Server 2008 R2+ or Linux (RHEL 5+, Ubuntu LTS 14+, Suse 11+, Oracle Linux+) system is required. Do not install it on the same servers that have to be configured for the TLS configuration. KeyStore Manager must be installed in a secured workstation or dedicated server.
