Page History
...
Code Block | ||||
---|---|---|---|---|
| ||||
js7 { web { # keystore and truststore location for https connections https { client-keystore { # Default: ${js7.config-directory}"/private/https-client-keystore.p12" file=${js7.config-directory}"/private/https-client-keystore.p12" key-password=jobscheduler store-password=jobscheduler } truststores=[ keystore { # Default: ${js7.config-directory}"/private/https-truststorekeystore.p12" file=${js7.config-directory}"/private/https-truststorekeystore.p12" key-password=jobscheduler store-password=jobscheduler } }truststores=[ ] { } } } |
Explanation:
# Default: ${js7.config-directory}"/private/https-truststore.p12"
file=${js7.config-directory}"/private/https-truststore.p12"
store-password=jobscheduler
}
]
}
}
} |
Explanation:
- HTTPS keystore and truststore are used to hold private keys and certificates
- The keystore holds the Controller instance's private key and certificate. This information is used for
- Server Authentication with JOC Cockpit and for
- Client Authentication with Agents.
- The truststore holds the certificate(s) used to verify
- Client Authentication certificates presented by JOC Cockpit and
- Server Authentication certificates presented by Agents.
- The keystore holds the Controller instance's private key and certificate. This information is used for
- Optionally a separate HTTPS client keystore can be used:
- The client keystore is used for HTTPS mutual authentication and holds a private key and certificate created for the extended key usage
Client Auth
. - When using HTTPS mutual authentication then
- a single certificate can be used that is generated for both extended key usages
Server Auth
andClient Auth
. In this case do not use the HTTPS client keystore but use the HTTPS keystore to hold the certificate. - separate certificates can be used with the certificate for key usage
Server Auth
being stored with the HTTPS keystore and the certificate for key usageClient Auth
being stored with the HTTPS client keystore.
- a single certificate can be used that is generated for both extended key usages
- For details see
Jira server SOS JIRA columns key,summary,type,created,updated,due,assignee,reporter,priority,status,resolution serverId 6dc67751-9d67-34cd-985b-194a8cdc9602 key JS-1959
- The keystore holds the Controller instance's private key and certificate. This information is used for
- Server Authentication with JOC Cockpit and for
- Client Authentication with Agents.
- The truststore holds the certificate(s) used to verify
- Client Authentication certificates presented by JOC Cockpit and Server Authentication certificates presented by Agents.
- The client keystore is used for HTTPS mutual authentication and holds a private key and certificate created for the extended key usage
- the keystore a password for the private keys included and a password for access to the keystore can be specified,
- the truststore a password for access to the truststore can be specified.
- The
key-password
setting is used for access to a private key in a keystore. - The
store-password
setting is used for access to a keystore or to a truststore. - For PKCS12 (*.p12) keystores both settings have to use the same value. The settings can be omitted if no passwords are used.
...
Overview
Content Tools