Configuring Keystores

About this task

This section provides information about adding keystores for API Gateway from Command Central.

To configure the Keystores

Procedure

  1. In Command Central, navigate to Environments > Instances > All > API Gateway > Configuration.
  2. Select Keystores from the drop-down menu.
    The Keystores list appears.
  3. Click to add a new keystore.
  4. Provide an Alias for the keystore.
  5. Provide Type, Provider, and Location of the keystore in the Keystore Configuration section.
  6. Click Save .
    The keystore is added to the list.

Configuring Keystores using Template

About this task

You can configure Keystores using the following Command Central template:

sagcc exec templates composite import -i keystore.yaml
sagcc exec templates composite apply keyStoreAlias nodes=local 
keystore.path=youekeystorepath 
keystore.password=keystorepassword key.alias=keyAlias
key.password=keyPassword

Sample keystore configuration template

alias: keyStoreAlias
description: API Gateway keystore creation

layers:
  runtime:   
    templates: keyStore-Template

templates:
  keyStore-Template:
    products:
      integrationServer:
        apigateway:
          configuration:
            OSGI-IS_apigateway-WmAPIGateway:
              COMMON-KEYSTORES:
                COMMON-KEYSTORES_pgkey:
                  Keystore:
                    '@alias': pgkey
                    Description: pgkey
                    Type: JKS
                    Provider: SUN
                    Location: ${keystore.path}
                    Password: '{AES/CBC/PKCS5Padding}
																				{7BhetRrOVU+AVsox8WKkwQwMVemomS3dpCgNJj5ByYA=}
                    {JSQ88/tEzqkDGq8D+GWlrw==}uSFvFjWALKWdMOAjuwGpVA=='
                    Key:
                    - '@alias': partner1
                      Password: '{AES/CBC/PKCS5Padding}
	                     {VPQ5ojZEZgzUR7x0WfO317ROK+bxvMyjSCSigoBiAEo=}
																						{+96qyCFXAiXg2gX3CzdIWA==}7kAeXaZcieuJuRefScC0Ig=='
                    - '@alias': partner2
                      Password: '{AES/CBC/PKCS5Padding}
																						{4cu7D8zZ+Bng2CvoeX71tlb1TSv5yKwqNAXjDN1yLKI=}
																						{wOE8hwyO2s5BlSZV1tKtNA==}mIVtB9dVL8TCVb35zQGJaA=='
                    - '@alias': policygateway
                      Password: '{AES/CBC/PKCS5Padding}
																						{PWBrBO5D5w6KSdloz8q8yTcrVThiZEbyPhre1u7gXb4=}
																						{FuESDHiSW1rXqmBIfL7P7g==}/hMP4Bzp0hmCF2Jlrsy00w=='
                  ExtendedProperties:
                    Property:
                    - '@name': fileContent
                      $: