Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The "Password Safe" (CS Credential Store ) offerers possibilities to store encrypted connection data and any other data securely and independententlly of application (i.e. JADE). The access to the CS is only possible with Access method such as SSH key or password.
Currently CS is using "KeePass" and "KeePassX" with the db verson 1.0, thus CS can be used on most popular OS platforms.
The advantage of using CS is , that CS store access credentials ( and also other informaition/parameters) in standarized , secure and encrypted database i.e. Keepass. JADE access the CS Database using standard interface. CS Database can only be access using Password, encryption-key file(ppk) or combination of both. CS Password is also used to encrypt contents stored in CS Database with AES.
CS can also be used for securely store information/parameters along side password, Database connection URL, runtime decryption key and other access data.
Following information can be retreived from CS's standard fields
Feature: UserID
The User identifaction of the user who is authorized for the operation.
Feature: Password
Assigned password for the user.
Feature: Server-Name
Target Server-Name or IP-address
Feature: Notes
In "notes" section of the CS other parameters/options can be stored i.e. extra JADE parameters , Database connection URL etc. The extra options are defined similarly as they are defined on the command line.
Feature: File-Attachment
Any file such as PGP file, SSH private key file can be stored in the CS as file attachment. Application will retrieve the attached file on runtime and will delete the file "immediately" once operation is finished.

...

An example for a job-xml file:

Code Block
languagehtml/xml

  <job order='no' >
     <params>
       <param     name="[[#CredentialStore_ProcessNotesParams|CredentialStore_ProcessNotesParams]]" value="false" />
       <param name="[[#CredentialStore_OverwriteExportedFile|CredentialStore_OverwriteExportedFile]]"           

<source>value="true" /&gt;
       &lt;param name="[[#CredentialStore_Permissions4ExportedFile|CredentialStore_Permissions4ExportedFile]]" value="600" /&gt;
       &lt;param name="[[#CredentialStore_DeleteExportedFileOnExit|CredentialStore_DeleteExportedFileOnExit]]" value="true" /&gt;
       &lt;param name="[[#CredentialStore_ExportAttachment|CredentialStore_ExportAttachment]]" value="false" /&gt;
       &lt;param name="[[#CredentialStore_ExportAttachment2FileName|CredentialStore_ExportAttachment2FileName]]" value="" /&gt;
       &lt;param name="[[#CredentialStore_KeyFileName|CredentialStore_KeyFileName]]" value="" /&gt;
       &lt;param name="[[#CredentialStore_password|CredentialStore_password]]" value="" /&gt;
       &lt;param name="[[#CredentialStore_AuthenticationMethod|CredentialStore_AuthenticationMethod]]" value="privatekey" /&gt;
       &lt;param name="[[#CredentialStore_StoreType|CredentialStore_StoreType]]" value="KeePass" /&gt;
       &lt;param name="[[#CredentialStore_KeyPath|CredentialStore_KeyPath]]" value="" /&gt;
       &lt;param name="[[#CredentialStore_FileName|CredentialStore_FileName]]" value="" /&gt;
       &lt;param name="[[#use_credential_Store|use_credential_Store]]" value="false" /&gt;
     &lt;/params&gt;
     &lt;script language="" java_class="" /&gt;
  &lt;/job&gt;
 

An example for a job-xml file:

Code Block
languagehtml/xml
  &lt;job order='no' &gt;
     &lt;params&gt;
       &lt;param name="[[#CredentialStore_ProcessNotesParams|CredentialStore_ProcessNotesParams]]" value="false" /&gt;
       &lt;param name="[[#CredentialStore_OverwriteExportedFile|CredentialStore_OverwriteExportedFile]]" value="true" /&gt;
       &lt;param name="[[#CredentialStore_Permissions4ExportedFile|CredentialStore_Permissions4ExportedFile]]" value="600" /&gt;
       &lt;param name="[[#CredentialStore_DeleteExportedFileOnExit|CredentialStore_DeleteExportedFileOnExit]]" value="true" /&gt;
       &lt;param name="[[#CredentialStore_ExportAttachment|CredentialStore_ExportAttachment]]" value="false" /&gt;
       &lt;param name="[[#CredentialStore_ExportAttachment2FileName|CredentialStore_ExportAttachment2FileName]]" value="" /&gt;
       &lt;param name="[[#CredentialStore_KeyFileName|CredentialStore_KeyFileName]]" value="" /&gt;
       &lt;param name="[[#CredentialStore_password|CredentialStore_password]]" value="" /&gt;
       &lt;param name="[[#CredentialStore_AuthenticationMethod|CredentialStore_AuthenticationMethod]]" value="privatekey" /&gt;
       &lt;param name="[[#CredentialStore_StoreType|CredentialStore_StoreType]]" value="KeePass" /&gt;
       &lt;param name="[[#CredentialStore_KeyPath|CredentialStore_KeyPath]]" value="" /&gt;
       &lt;param name="[[#CredentialStore_FileName|CredentialStore_FileName]]" value="" /&gt;
       &lt;param name="[[#use_credential_Store|use_credential_Store]]" value="false" /&gt;
     &lt;/params&gt;
     &lt;script language="" java_class="" /&gt;
  &lt;/job&gt;
 

Description of SOSCredentialStore - SOSCredentialStore

Code Block

                                        

<source>
                                    

</source>

Profile : jade_setting.ini

Code Block

                                    Profile : jade_setting.ini
                                    Profile : jade_setting.ini
                                      

</source>

...

  Profile : jade_setting.ini

...

Code Block


                                    
                                        
    [Keepass_DataBase_WithPassword]
    use_credential_Store = true
    CredentialStore_FileName Profile= : jade_setting.iniR:\backup\sos\java\development\com.sos.VirtualFileSystem\keepassX-test.kdb
    CredentialStore_KeyPath = sos/server/homer.sos
    CredentialStore_password = testing
Code Block

    [ReceiveUsingKeePass]
    include = Keepass_DataBase_WithPassword
    source_CredentialStore_KeyPath          Profile : jade_setting.ini
  = sos/server/homer.sos
    source_include = Keepass_DataBase_WithPassword
    source_Dir = /tmp/test/jade/out
    source_make_Dirs = true
    source_loadClassName = com.sos.VirtualFileSystem.FTP.SOSVfsFtp2
    target_protocol = local
    target_dir = /tmp/test/jade/in
    Profileoperation : jade_setting.ini= copy
    file_spec = \.txt$
    transfer_mode = ascii
    source_transfer_mode = ascii
    loadClassName = com.sos.VirtualFileSystem.FTP.SOSVfsFtp2
            
    
                                    
    [Keepass_DataBase_WithPassword]
    use_credential_Store = true
    CredentialStore_FileName = R:\backup\sos\java\development\com.sos.VirtualFileSystem\keepassX-test.kdb
    CredentialStore_KeyPath = sos/server/homer.sos
      CredentialStore_password = testing
Code Block

    [ReceiveUsingKeePass]
    include = Keepass_DataBase_WithPassword
    source_CredentialStore_KeyPath = sos/server/homer.sos
    source_include = Keepass_DataBase_WithPassword
           source_Dir = /tmp/test/jade/out
    source_make_Dirs = true
    source_loadClassName = com.sos.VirtualFileSystem.FTP.SOSVfsFtp2
      target_protocol = local
    target_dir = /tmp/test/jade/in
          operation = copy
    file_spec = \.txt$
    transfer_mode = ascii
    source_transfer_mode = ascii
    loadClassName = com.sos.VirtualFileSystem.FTP.SOSVfsFtp2
                
                            title
             
                           
             
                       
             
                       
                 
                       
                     title
                       example of jade profile using Credential Store
           
                             
       
                             
       
                             
           
                             
               example of jade profile using Credential Store
                       title
                 
                       
             
                       
             
                   
 

An example for a job-xml file:

Code Block
languagehtml/xml
  &lt;job order='no' &gt;
     &lt;params&gt;
       &lt;param name="[[#CredentialStore_ProcessNotesParams|CredentialStore_ProcessNotesParams]]"   value="false" /&gt;
       &lt;param name="[[#CredentialStore_OverwriteExportedFile|CredentialStore_OverwriteExportedFile]]" value="true" /&gt;
       &lt;param name="[[#CredentialStore_Permissions4ExportedFile|CredentialStore_Permissions4ExportedFile]]" value="600" /&gt;
              &lt;param name="[[#CredentialStore_DeleteExportedFileOnExit|CredentialStore_DeleteExportedFileOnExit]]" value="true" /&gt;
       &lt;param name="[[#CredentialStore_ExportAttachment|CredentialStore_ExportAttachment]]"  titlevalue="false" /&gt;
       &lt;param name="[[#CredentialStore_ExportAttachment2FileName|CredentialStore_ExportAttachment2FileName]]" value="" /&gt;
       &lt;param name="[[#CredentialStore_KeyFileName|CredentialStore_KeyFileName]]" value="" /&gt;
       &lt;param name="[[#CredentialStore_password|CredentialStore_password]]" value="" /&gt;
       &lt;param name="[[#CredentialStore_AuthenticationMethod|CredentialStore_AuthenticationMethod]]"   value="privatekey" /&gt;
              &lt;param name="[[#CredentialStore_StoreType|CredentialStore_StoreType]]" value="KeePass" /&gt;
       &lt;param name="[[#CredentialStore_KeyPath|CredentialStore_KeyPath]]" value="" /&gt;
       &lt;param name="[[#CredentialStore_FileName|CredentialStore_FileName]]"    value="" /&gt;
       &lt;param name="[[#use_credential_Store|use_credential_Store]]" value="false" /&gt;
     &lt;/params&gt;
     &lt;script language="" java_class=""          /&gt;
  &lt;/job&gt;
 

Parameter used by SOSCredentialStore

...

If you want to store your access data i.e. user-id , password, SSH key , DB URL in encrypted CS DB, unable this parameter and configure the rest if the CS accordinglly. By default JADE will look for the parameters from settings.ini, command line or from JITL job.
Data-Type : SOSOptionBoolean
The default value for this parameter is false.

</text>

Code Block

      </revision>
   </page>

</mediawiki>