Protect sensible configuration data in repository.cfg file

Protect sensible configuration data in repository.cfg file

Using the keystore service, sensible configuration information can be stored savely as a secret in the keystore vault file.

For more information, please see https://kgs-software.atlassian.net/wiki/spaces/DOCUEN/pages/2415788037 .

 

Example:

  1. To import a secret referenced by alias MySecret into the keystore value file execute this command:

keytool -importpass -storetype pkcs12 -alias MySecret -keystore <Keystorename> -storepass <keystorepassword>

After execution of this command, keytool is asking for the phrase to store secretly.

 

  1. Reference this secret in repository.cfg file like this:

repo1.protocolservice.elastic.authentication.credentials:elasticuser,MySecret