Configuring Keystores using Template
You can configure Keystores using the following Command Central template:
sagcc exec templates composite import -i keystore.yaml
sagcc exec templates composite apply keyStoreAlias nodes=local
keystore.path=youekeystorepath
keystore.password=keystorepassword key.alias=keyAlias
key.password=keyPassword
Sample keystore configuration template
alias: keyStoreAlias
description: API Gateway keystore creation
layers:
runtime:
templates: keyStore-Template
templates:
keyStore-Template:
products:
integrationServer:
apigateway:
configuration:
OSGI-IS_apigateway-WmAPIGateway:
COMMON-KEYSTORES:
COMMON-KEYSTORES_pgkey:
Keystore:
'@alias': pgkey
Description: pgkey
Type: JKS
Provider: SUN
Location: ${keystore.path}
Password: '{AES/CBC/PKCS5Padding}
{7BhetRrOVU+AVsox8WKkwQwMVemomS3dpCgNJj5ByYA=}
{JSQ88/tEzqkDGq8D+GWlrw==}uSFvFjWALKWdMOAjuwGpVA=='
Key:
- '@alias': partner1
Password: '{AES/CBC/PKCS5Padding}
{VPQ5ojZEZgzUR7x0WfO317ROK+bxvMyjSCSigoBiAEo=}
{+96qyCFXAiXg2gX3CzdIWA==}7kAeXaZcieuJuRefScC0Ig=='
- '@alias': partner2
Password: '{AES/CBC/PKCS5Padding}
{4cu7D8zZ+Bng2CvoeX71tlb1TSv5yKwqNAXjDN1yLKI=}
{wOE8hwyO2s5BlSZV1tKtNA==}mIVtB9dVL8TCVb35zQGJaA=='
- '@alias': policygateway
Password: '{AES/CBC/PKCS5Padding}
{PWBrBO5D5w6KSdloz8q8yTcrVThiZEbyPhre1u7gXb4=}
{FuESDHiSW1rXqmBIfL7P7g==}/hMP4Bzp0hmCF2Jlrsy00w=='
ExtendedProperties:
Property:
- '@name': fileContent
$: