You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The process to generate and assemble keystore files involves several functions:
Generate a new keystore for repository encryption purposes (alfresco/keystore)
Generate a new CA Entity to issue digital certificates
Generate truststore and keystore for Alfresco Repository (alfresco)
Generate truststore and keystore for Search Services (solr)
Generate truststore and keystore for Apache Zeppelin (zeppelin) - Only applies to Enterprise deployments, SOLR keystore and truststore can be reused for this configuration
Generate browser client certificate for Search Services (client)
Improvement
Create a new set of command line parameters to cover these options:
-encryption creates the alfresco/keystore file
STORE_TYPE: PKCS12, JCEKS
KEY_ALG: AES -keysize 256, DESede
-ca creates a new CA Entity
CA_DNAME, for instance "/C=GB/ST=UK/L=Maidenhead/O=Alfresco Software Ltd./OU=Unknown/CN=Custom Alfresco CA"
KEY_SIZE: 2048, 4096
PASS: default password
DAYS: caducity
-alfresco-key creates keystore for Repository
KEY_SIZE: 2048, 4096
STORE_TYPE: PKCS12, JCEKS
PASS: default password
DAYS: caducity
REPO_CERT_DNAME: for instance "/C=GB/ST=UK/L=Maidenhead/O=Alfresco Software Ltd./OU=Unknown/CN=Custom Alfresco Repository"
ALFRESCO_SERVER_NAME, for instance "localhost"
-solr-key creates keystore for Search Services
KEY_SIZE: 2048, 4096
STORE_TYPE: PKCS12, JCEKS
PASS: default password
DAYS: caducity
SOLR_CLIENT_CERT_DNAME: for instance "/C=GB/ST=UK/L=Maidenhead/O=Alfresco Software Ltd./OU=Unknown/CN=Custom Alfresco Repository Client"
SOLR_SERVER_NAME, for instance "localhost"
-alfresco-trust creates truststore for Repository
SOLR_KEYSTORE: the path of the SOLR keystore
SOLR_PASS: the password for the SOLR keystore
-solr-trust creates truststore for Search Service
REPO_KEYSTORE: the path of the Repository keystore
REPO_PASS: the password for the Repository keystore
-solr-client creates the browser client certificate
KEY_SIZE: 2048, 4096
PASS: default password
DAYS: caducity
BROWSER_CLIENT_CERT_DNAME: for instance "/C=GB/ST=UK/L=Maidenhead/O=Alfresco Software Ltd./OU=Unknown/CN=Custom Browser Client"
The text was updated successfully, but these errors were encountered:
instead of introducing explicit signatures {alfresco,solr}-{key,trust} I suggest for simplicity a generic one using a parameter name for config key lookups like
The process to generate and assemble keystore files involves several functions:
alfresco/keystore
)alfresco
)solr
)zeppelin
) - Only applies to Enterprise deployments, SOLR keystore and truststore can be reused for this configurationclient
)Improvement
Create a new set of command line parameters to cover these options:
-encryption
creates thealfresco/keystore
file-ca
creates a new CA Entity-alfresco-key
creates keystore for Repository-solr-key
creates keystore for Search Services-alfresco-trust
creates truststore for Repository-solr-trust
creates truststore for Search Service-solr-client
creates the browser client certificateThe text was updated successfully, but these errors were encountered: