Set up a KeyStore (tC)

Generate KeyStore

To set up a keystore for tia core you have to use the kgs create-keystore tool.

Caution: please use a java version that is newer or equal to the java version used in your tia Content Server instance.

Check if your java version ist set up correctly.

java -version

The output should look like the following screenshot

Navigate to the directory path where you have downloaded the kgs create-keystore tool and open powershell or terminal

 

java -jar kgs-create-keystore-1.5.0.jar <keystorename> <keystorepassword>

After executing the create-keystore tool there should be two generated files.

 

One keystore file and one vault file. Do not try to rename one of these generated files.

Both files should be provided to the tia Content Server according to the configuration specified in your tia contntserver repository.cfg. The vault file is used by tia core to read the password to having access to the keystore.

Import a password

This password is used to store passwords in combination with alias in case of encryption service or access to blob storages (Azure, Amazon etc.) or anything else.

Caution: please use a java version that is newer or equal to the java version used in your tia Content Server instance.

keytool -importpass -storetype pkcs12 -alias <aliasName> -keystore <Keystorename> -storepass <key>

With this command keytool asks for the password and store it in the keystore. Use the alias in repository.cfg for secret information like passwords, connectionstrings or encryption keys.

List all entries

if you want to know which entries are contained in your existing keystore, please use the following command

example → 1 entry with alias webserver

 

Provide keystore to the tia contentserver

modify your repository.cfg as follows

restart the tia contentserver service and check the repository status in the tia web ui

as of now, you can send certificates to the contentserver and view them via the tia web ui

shown certificate details