This page was last edited on April 12, 2019, at 10:20.
Comments or questions about this documentation? Contact us for support!
You can encrypt the password used to access the Configuration Database so that it appears in the Configuration Server logs as an encrypted string of characters.
Once encrypted, the password to the Configuration Database is written as an encrypted string of characters into Configuration Server logs. This feature ensures that anyone reading the log cannot obtain the password and use it to access the Configuration Database directly through the DBMS.
This feature is configured on the Configuration Server accessing the Configuration Database.
All entries in configuration files and logs are readable in plain text, unless explicitly configured to be hidden in some way. You can encrypt your password for accessing the Configuration Database. After password encryption, Configuration Server decrypts the value when reading its configuration file at subsequent startups. It accesses the Configuration Database using the decrypted value, and prints an encrypted string of characters as the password value into the log. In this way, the password does not explicitly appear in the Configuration Server logs.
To encrypt the Configuration Database password, do the following:
1. Force Configuration Server to encrypt the password.
[+] Show steps Important Starting in release 8.5.1, the Configuration Server configuration file optionally supports an asymmetric encryption algorithm using separate encryption and decryption (private) keys that are not hardcoded. In this case, the keys are generated by Configuration Server and stored in separate files. The password is encoded using the key in the encryption file. Upon subsequent restarts of Configuration Server, it uses the key in the decryption file to decrypt and the password. See Encrypting the Configuration Database Password Prerequisites
Start of ProcedureForce Configuration Server to encrypt the password, by starting Configuration Server with the following command line: confserv -p <section name> <password value> where:
Important
confserv -p gauth_ldap ‘$Montana’
confserv -p dbserver "p&ssword"
Repeat this step for each Configuration Database section listed in the configuration file of Configuration Server. | ||||||
2. Configure the encryption option in the Configuration Server configuration file. [+] Show stepsPrerequisitesAny primary and backup Configuration Servers associated with this Configuration Server have encrypted the password. Start of Procedure
Now, Configuration Server is ready to operate with the encrypted password. | ||||||
3. Restart Configuration Server as for a regular operation. Refer to the Framework Deployment Guide for detailed information about starting Configuration Server. |