Configuring security parameter
- Used for SSL configurations to specify the trust store for Sterling Order Management System Software containers.
- By default the Sterling Order Management System Software containers trust the java CA certs.
The following .yaml file is a sample schema of security
.
security:
ssl:
trust:
# storeLocation: ""
# storeType: PKCS12
# trustJavaCACerts: true
# trustedCertDir: ""
security
parameter of
OMEnvironment.
Property | Default value | Value type | Required | Description |
---|---|---|---|---|
ssl.trust.trustedCertDir |
string | No | Specify the directory in shared volume, which contains the certificates that Sterling Order Management System Software containers should trust. Note: The importing of certificates is a CPU
intensive task, hence this feature is recommended to be used when you have only a few certificates
to import.
|
|
ssl.trust.storeLocation |
string | No | Specify the path to the JVM TrustStore. Note: Ensure to pass the TLS TrustStore password is
provided under
stringData.trustStorePassword attribute of the secret created in
Create a Secret page. |
|
ssl.trust.storeType |
PKCS12 |
string | No | Specify the type of truststore. Available options are PKCS12 and
JKS . |
|
true |
boolean | No | Set the value to true if you want the servers to trust the default Java CA certificates. |
SSL configurations for securing external connections
https
instead of http
.- Trusting external server certificates
To trust an external service from your application or agent servers, the Sterling Order Management System Software Operator provides the following options.
- Using default java trusted certificates
By default, the application trusts all the CA certificates bundled with the JRE. Any certificate signed with a globally recognized CA is trusted. In case you do not want your servers to trust the certificates in default Java TrustStore, set the value of
ssl.trust.trustJavaCACerts
property toFalse
. - Using a custom TrustStore
This option provides you the flexibility to trust the specific services with which your application must establish SSL connection. You can create your own TrustStore by using the
keytool
command of JDK in p12 format. Copy the newly created TrustStore to the Persistent Volume and provide the complete path to the TrustStore with respect to the volume mounted within the pod in the custom resource parameters by usingssl.trust.storeLocation
. Also, add the password for this TrustStore in the secret that is created as a prerequisite provided in the Creating a secret section, with the keytrustStorePassword
.For example, if the TrustStore is present in the Persistent Volume at
certs/truststore.p12
, set the value ofssl.trust.storeLocation
property to/shared/certs/truststore.p12
. - Using a directory containing trusted certificates
This option provides you the ability to pass trusted server certificates as PEM files in the Persistent Volume. Provide the path to the directory that contains the trusted certificates in the custom resource parameters by using
ssl.trust.trustedCertDir
. The application and agent servers already use the default Java TrustStore.
Note: In Sterling Order Management System Software Operator version 1.0.1 and higher, thessl.trust.storeLocation
andssl.trust.trustedCertDir
parameters act independently. In earlier versions, these parameters were mutually exclusive. - Using default java trusted certificates