/
Certificate Management

Certificate Management

DDF uses certificates in a two distinct ways:

  1. Transmit and receive encrypted messages.
  2. Performing authentication of an incoming user request.

This page details general management operations of using certificates in DDF. 

Default Certificates

DDF comes with a number of default keystores that contain certificates. The keystores are used for different services and have different hostnames to denote the services they are being used for.

AliasKeystoreTruststoreConfiguration LocationUsage
serverserverKeystore.jksserverTruststore.jks

File: etc/org.ops4j.pax.web.cfg

File: etc/ws-security/server/encryption.properties

File: etc/ws-security/server/signature.properties

Used to secure (SSL) all of the endpoints for DDF. This also includes the admin console and any other web service that is hosted by DDF.
clientclientKeystore.jksclientTruststore.jks

Web Console: Platform Global Configuration

File: etc/ws-security/client/encryption.properties

File: etc/ws-security/client/signature.properties

Used for performing outgoing SSL requests. Examples include sending requests to federated sites and verifying tickets with CAS.

tokenissuerstsKeystore.jksstsTruststore.jks

File: etc/ws-security/issuer/encryption.properties

File: etc/ws-security/issuer/signature.properties

Used to sign STS SAML assertions.

File Management

File management deals with creating and configuring the files that contain the certificates. In DDF these files are generally Java Keystores (jks) and Certificate Revocation Lists (crl). This page gives commands and tools that can be used to perform these operations.

Cert File Management

Configuration Management

Configuration management deals with configuring DDF to use already made certificates and defining configuration options for the system. This includes configuration certificate revocation and keystores.

Cert Config Management