Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Table of Contents
outlinh1. true
outlinh1. true
1printablefalse
2stylh1. none
3indent20px

...

YADE Credential Store

See more More information about the Credential Store can be found in the following articles:

...

...

Setting up a Credential Store

Download

...

KeePass and create kdb file

Set-up Credential Store with Password

Step 1: Setup KeePassX DB

  • Open the KeePassX utility
  • Choose password as Master Key
  • Assign password to KeePass DB and click OK

JADE YADE will use the Master Key, i.e. "the password " specified during the creation process as access password of the KeePassX DBdatabase.

Image Modified

Set-up Credential Store with PPK key

  • Start KeePassX utility
  • Click on Key File as Master Key
  • Browse for pre-generated ssh SSH key as Master Key
  • Click Ok ok and KeePassX will open and will be ready to add new entries.

Image Modified

Create Credential Store entries

Create Credential Store entry for FTP server

KeePassX DB can organize entries in logical groups, using under groups and sub-groups.
One can organize Credential Store in groups, e.g. Internal-Server, External-Server etc, user . User is free to choose his own organization scheme.

  • Create new top group i.e. sos
  • Create new sub group i.e. server
  • Create new entry wilm wilma.sos for settings
    • Title : will            : Will be used as key in the hierarchy to access the credentials.
    • Username  : field Field is used to specify the username, user name used for file transfer, i.e. FTP/, SFTP user name
    • Password   : password field Field is used to specify the password, user can use the internal  KeePassX's password generation mechanism feature to specify strong passwords or can provide existing password.
    • Comment   : can Can contain extra parameters for JADE YADE along with credentials, all/ any JADE YADE parameter can be specified in Comment the comment section.
    • Expires       : expiry date for the entry, Expiry date is used to enforce a password and SSH key expiration policy. The user can define its own expiry period i.ethe expirarion period, e.g. 90 days, or check option Never never. JADE YADE will raise an error if a KeePassX DB entry is not validexpired.
    • Attachment : can have any Can contain private key file used during transfer, i.e. public keyfor file transfer

Image Modified

Create Credential Store entry for SFTP server

Image Modified

...

YADE profiles with Credential Store

Set-up global Credential Store profile

Define an a global profile having containing all the parameters concerning Credential Store. JADE YADE can reuse any profile defined in same jade_settings.ini file.
It 's is recommended to create such profile fragments and reuse them in profiles.
Alternatively a user can define multiple KeePassX DB files, e.g. Test, Integration, Production, and create corresponding profiles for the different environments.

Set-up global Credential Store profile with password

Code Block
 ; Global Profile for KeePassX Database WithPassword
 [Keepass_DataBase_WithPassword]
 use_credential_Store                = true
 CredentialStore_FileName            = C:\sos-berlin.com\jade\credential-store\keepassX-test.kdb
 CredentialStoreAuthenticationMethod = password
 CredentialStore_password            = ********* 

Set-up global Credential Store profile with public key

Code Block
 ; Global Profile for KeePassX Database With Public Key
 [Keepass_DataBase_WithPublicKey]
 use_credential_Store                = true
 CredentialStore_FileName            = C:\sos-berlin.com\jade\credential-store\keepassX-test.kdb
 CredentialStoreAuthenticationMethod = privatekey
 CredentialStore_KeyFileName         = C:\sos-berlin.com\jade\config\jade_cs_rsa.ppk

Set-up

...

YADE profile for FTP

In this example we are including Credential store Store settings from a global KeePassX database profile Keepass_DataBase_WithPassword .
JADE YADE then will open the KeePassX DB and refer to the entry sos/server/wilma.sos, we have already defined this settings  that has previously been defined in the KeePassX DB:

source_CredentialStore_KeyPath: JADE YADE will refer to the entry from KeePassX DB.

...

Code Block
 [ReceiveUsingKeePass]
 source_include                 = Keepass_DataBase_WithPassword
 source_CredentialStore_KeyPath = sos/server/wilma8of9.sos
 source_dir                     = /tmp/test/jade/out
 source_make_dirs               = true
 source_transfer_mode           = ascii
 target_protocol                = local
 target_dir                     = ${TEMP}/jade/in
 operation                      = copy
 file_spec                      = \.txt$
 transfer_mode                  = ascii

Set-up

...

YADE profile for SFTP

Code Block
 [ReceiveUsingKeePassReceiveUsingKeePassSourceSFTP]
 source_CredentialStore_KeyPath = sos/server/8of9.sos
 source_include operation                      = Keepass_DataBase_WithPasswordcopy
 sourcefile_dirspec                      = /tmp/test/jade/out\.txt$
 ;;
 source_make_Dirsinclude                 = trueKeepass_DataBase_WithPassword
 source_transfer_mode          CredentialStore_KeyPath = asciisos/server/8of9.sftp.sos
 target_protocol                = local
 target_source_dir                     = ${TEMP}/tmp/test/jade/inout
 operationsource_protocol                = SFTP

 source_ssh_auth_method    = copy
 file_spec   = password
 ;;
 target_protocol                = \.txt$local
 transfer_modetarget_dir                     = ascii${TEMP}/jade/in

...

Example for Server-to-Server File Transfer

...

profile using Credential

...

Store

A profile definition for Server-to-Server transferFile Transfer, from a an FTP to a na SFTP server:

Code Block
 [transfer_server_2_server]
 include                        = Keepass_DataBase_WithPassword
 file_spec                      = ^.*\.txt$
 operation                      = copy
 source_CredentialStore_KeyPath = sos/server/wilma.sos
 source_dir                     = /tmp/test/jade/out
 target_CredentialStore_KeyPath = sos/server/8of9.sos
 target_dir                     = ${TEMP}/jade/in 

In this example all files with the file name extension .txt should be transferred from the server wilma via FTP to the server 8of9 by SFTP.

To start this with from the command line client one must you would type:

Code Block
languagebash
 jade.sh -settings=name_of_settings_file -profile=transfer_server_2_server

Profile fragments SFTP with Public Key

...

To make the profile more reusable and more readable it is possible to reuse profiles snippets in the way like this:

Status
colourRed
titleTODO

Code Block
 [ReceiveUsingKeePass]
 source_include                                     = Keepass_DataBase_WithPassword
 source_source_CredentialStore_KeyPath              = keepass_homer_sftp_key
 source_dir                                         = /tmp/test/jade/out
 source_protocol                                    = sftp
 source_CredentialStore_ExportAttachment            = true
 source_CredentialStore_ExportAttachment2FileName   = c:\temp\8of9-sos.ppk	
 source_ssh_auth_method                             = publickey
 source_ssh_auth_file                               = c:\temp\8of9-sos.ppk
 source_make_Dirs                                   = true
 source_transfer_mode                               = ascii
 target_protocol                                    = local
 target_dir                                         = ${TEMP}/jade/in
 operation                                          = copy
 file_spec                                          = \.txt$
 transfer_mode                                      = ascii

Profile fragments SFTP with Public Key

...

To make the profile more reusable and more readable it is possible to reuse profiles snippets in the way like this:

Status
colourRed
titleTODO

Code Block
 

See also