Enable SSL for Security Provider
Enabling SSL is important for protecting user identity and the tokens used for authorization. Enabling SSL for Security Provider means user must also enable SSL for any application that uses Security Provider for single sign-on (SSO).
IMPORTANT:
Skip to step 1 if you get a certificate from your IT department.
Perform the steps given in the following example to generate private-CA scripts:
Example:
Copy the
P12
with your certificate and the truststore file (e.g. fta_truststore.jks) with the root certificate from C:\Users\Administrator\.fta-ca\certs
to FTASecurity\standalone\configuration. To generate test certificate refer “Enable SSL for Security Provider”.
|
NOTE:
Depending on the folder where the keystore and truststore are located, the paths may vary. If the keystore and truststore are located into a different folder other than the folder shown below, the folder/path instructions may be different for your machine. The default directory is the .fta-ca directory under the user's home directory. This can be changed by changing the CERT_ROOT_DIRECTORY setting in openssl-env.cmd
- Edit the file FTASecurity\standalone\configuration\standalone.xml and replace the following security-realm definition:
- keystore path, for example:host1.acme-int.com.p12
- aliasname, for example:host1.acme-int.com
- keystore-password="<password for keystore>"
- key-password="<password for key>"
- truststorepath, for example:fta_truststore.jks
|
with the one like below:
|
NOTE:
The highlighted values above will need to be changed according to how your certificates are packaged. Also, ensure that the
generate-self-signed-certificate-host
attribute is removed from keystore element in the standalone.xml
file.- Restart the FTASecurity Service.
Provide Feedback