Creating a truststore

For the Cassandra servers to trust each other, they must have the certificate of every other server in their truststore. The same truststore can be used for client-to-node encryption and for node-to-node encryption.

Before you begin

Before you start, refer to the section Generating a self-signed personal certificate.

Procedure

To create a truststore, complete the following steps:

  1. Log in to the Cassandra server as the user who installed Sterling B2B Integrator and Global Mailbox.
  2. Use the Java™ keytool utility that is provided in the IBM JDK that is installed during installation with the following input:
    keytool

    -importcert -alias <name> -file <path to cert file>.cer -keystore <path to truststore> -storepass <password> -storetype JKS

    -alias <name>
    Alias can be any value. This might be the same alias from the keystore, or a descriptive label like self.
    -file <path to cert file>
    Specifies the fully-qualified path to the file where the server public certificate is exported when its personal certificate was created in Generating a self-signed personal certificate.
    -keystore <path to truststore>
    Specifies the fully-qualified path of the server truststore file that is created (for example: /etc/cassandra/conf/truststore.jks).
    -storepass <password>
    The truststore password can be any value. It is used to generate a key to encrypt the truststore file.
    -storetype JKS
    The keystore type must be JKS.
  3. When prompted, enter y to add the certificate into the truststore:
    Trust this certificate? [no]:  y 
    Certificate was added to keystore
  4. Create a trust store for each Cassandra server in all data centers by repeating steps 1 to 3 on all Cassandra servers.

What to do next

For more details, refer to the sections:

  1. Enabling client-to-node encryption
  2. Enabling node-to-node encryption
  3. Enabling client authentication
  4. Enabling server authentication
  5. Verifying SSL connections