Summary
Sitescope Keystores
Question
-
Key management - used to hold persistency encryption key.
- SiteScope Trust Store - used for SSL communication (CACERTS), certification autorities we trust to tell us the real identity of outgoing connections (SSL).
- Server Key Store - Used by SiS server to be identified by SiS clients as trust SiS server.
Answer
- Monitors flow (outgoing SSL connections):
SITESCOPE_HOME_DIR/java/lib/security/cacerts - SiteScope trust store (converted to PKSC12 format when using monitors for outgoing SSL connections) - SiteScope server configured to SSL (ingoing SSL connections):
SITESCOPE_HOME_DIR/groups/serverKeystore (in FIPS mode created in PKSC12 format) - SiteScope server configured to SSL + client authentication\CAC (ingoing SSL connections):
SITESCOPE_HOME_DIR/templates.certificates/serverTrustStore (JKS format) - SiteScope API configuration (SiteScope server configured to SSL + client authentication):
SITESCOPE_HOME_DIR/groups/serverKeystore (in FIPS mode created in PKSC12 format)
SITESCOPE_HOME_DIR/templates.certificates/serverTrustStore (JKS format)
SITESCOPE_HOME_DIR/java/lib/security/cacerts (JKS format)
Client KeyStore and TrustStore for SiteScope API usage:
SCRIPT_HOME/API_Configuration/clientTrustStore (JKS format)
SCRIPT_HOME/API_Configuration/clientKeyStore (JKS format) - SiteScope client certificate authentication for BSM integration:
SITESCOPE_HOME_DIR/templates.certificates/BSMClientKeystore (JKS format)