This documentation is for WSO2 Data Services Server 3.0.0. View documentation for the latest release.

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 3 Next »

WSO2 Carbon is shipped with a secure vault implementation which is a modified version of synapse secure vault. It provides capability to securely store sensitive data such as plain-text passwords in configuration files of the WSO2 Carbon platform, such as user-mgt.xml, Carbon.xml, Axis2.xml, registry.xml etc. All WSO2 Carbon-based products inherit the secure vault implementation from the core Carbon platform. For more information, refer to section WSO2 Carbon Secure Vault under Carbon Tools.

However, when securing passwords of more product-specific configuration files such as data service configurations, there are slight differences in the steps, as illustrated below.

WSO2 Data Services Server provides the feature to securely store sensitive data such as password fields in data service configuration files, using the Secure Vault functionality. Users can encrypt their passwords using tokens instead of the actual password inside the data service configuration file. This guide will explain you how to secure your password in data-source configuration.

 

Step 1 - Run ciphertool script from bin directory

Linux: sh ciphertool.sh -Dconfigure

Windows: ciphertool.bat -Dconfigure

 

Step 2 - Encrypt the plain text using ciphertool

 

Again run the ciphertool script without '-Dconfigure'. It will ask for the KeyStore Password of Carbon Server. The default value of the KeyStore password is 'wso2carbon'. Then provide the plain text value that need to be encrypted. It will return you the encrypted text value.

  • No labels