Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Each user with the permission to deploy has to add his X.509 signing certificate to JOC Cockpit.

Image Modified

Optional: Root CA Certificate

In addition, the X.509 certificate of the Root CA that signed the user's signing certificate can be added to JOC Cockpit. There is a single Root CA certificate for all user profiles.

Image Modified

  • Any user signing certificates have to be published to the Controller and Agents. Certificates are stored to the config/private/trusted-x509-keys folder of Controller and Agent installations.
  • If a Root CA certificate is present in JOC Cockpit, then it is sufficient to add the Root CA certificate to the config/private/trusted-x509-keys folder of  Controller and Agent installations.
    • No further user signing certificates have to be added to the Controller or Agents as long as the user signing certificates were created by the given Root CA.
    • This mechanism implies that any user signing certificate signed by the same Root CA certificate will be accepted.
    • Users who do not wish to use this implicit mechanism should not add the Root CA certificate to Controller and Agents but should add individual user signing certificates only.

...

  • Click Export either in the context menu of the folder to export or from the button in the top right corner:


  • In the Export popup pop-up window check the checkbox "for Signing":
    Image Removed
    Image Added

  • Select the scheduling objects to deploy.

...

Extract the configuration from the archive and preserve the folder structure of included scheduling objects:


Sign Signing the configuration.

For this example, we use OpenSSL to sign the configuration file.:

Code Block
languagebash
openssl dgst -sha256 -sign c:\tmp\sos.private-ec-key.pem -out c:\tmp\example-wf.workflow.json.sha256 c:\tmp\example-wf.workflow.json
  • -sha256
    • the signer algorithm
  • -sign c:\tmp\sos.private-ec-key.pem
    • the private key file to sign the content of the original configuration file
  • -out c:\tmp\example-wf.workflow.json.sha256
    • the path to the output file
    • the file contains the binary representation of the signature
  • c:\tmp\example-wf.workflow.json
    • the path to original scheduling object file (workflow)

...

OpenSSLJava with RSAJava with ECDSA
sha512SHA512withRSA-
sha256SHA256withRSASHA256withECDSA


During import, the scheduling object configuration and the signature from the archive will be forwarded to the Controller and will be validated. After successful validation by the Controller and by the Agent the scheduling object is deployed.

...