Software AG Products 10.5 | Configuring API Gateway | API Gateway Data Store | Securing Communication with API Gateway Data Store | Configuring API Gateway Data Store Keystores | Configuring the API Gateway Data Store HTTP Keystore
 
Configuring the API Gateway Data Store HTTP Keystore
Use the following procedure to modify the keystore for the HTTP port of the Search Guard plugin.
*To modify the keystore for the HTTP port of the Search Guard plugin
1. In Command Central, navigate to Environments > Instances > All > API Gateway Data Store > Configuration.
2. Select Keystores from the drop-down menu.
3. In the Alias column, click HTTP_KEYSTORE and then click Edit.
4. Specify values for each field in the table as outlined in the description column:
Field
Description
Description
Optional. Specify a description for the keystore for the HTTP port of the Search Guard plugin.
Location
Required. Specify the absolute filepath to the Java keystore file as follows: folder/sub_folder/filename. The default value is: ../plugins/search-guard/sgconfig/node-0-keystore.jks
Password
Optional. Specify the password for the keystore.
5. Optionally, click Test to verify that your configuration is valid.
6. Save your changes.
7. Restart the API Gateway Data Store instance.
8. Alternatively, you can configure the Keystore using the following Command Central template:
Use these commands to configure the Keystore.
sagcc exec templates composite import -i keystores.yaml

sagcc exec templates composite apply sag-apigw-datastore-keystore nodes=local keystore.location=location_of_keystore keystore.password=password
Sample keystore configuration template:
alias: sag-apigw-datastore-keystore
description: API Gateway Data Store Keystore Configuration

layers:
runtime:
templates:
- apigw-datastore-keystore

templates:
apigw-datastore-keystore:
products:
CEL:
default:
configuration:
CEL:
COMMON-KEYSTORES:
COMMON-KEYSTORES-defaultHttp:
Keystore:
'@alias': HTTP_KEYSTORE
Description: This is a keystore for the HTTP port of the Search Guard® plugin
Type: JKS
Location: ${keystore.location}
Password: ${keystore.password}

provision:
default:
runtime: ${nodes}