Configuration Procedures
The following procedures describe how to configure Control-M MFT additional functionality:
Control-M MFT SecurityLink copied to clipboard
The following table lists the available options that you can use to secure and encrypt connections in Control-M MFT.
Option |
Description |
---|---|
PGP Encryption |
For push or pull actions (where the File Transfer job initiates a connection to a remote server directly and uploads or downloads a file), you can use PGP templates in File Transfer jobs to encrypt a file before uploading to remote server, or decrypt it after downloading to a local host. For more information, see PGP Template Management. BMC does not provide the PGP utility. You must install it separately.
|
SFTP (SSH) |
MFT Client
MFT Server
|
SSL/TLS |
|
Secured Data in Configurations |
|
FTP over SSL/TLS ConfigurationLink copied to clipboard
To configure your support for FTP over SSL/TLS, do the following to define jobs with Control-M MFT via an FTP over SSL/TLS server:
-
SSL Security Levels: Defines your security levels.
-
Control-M MFT Authentication: Configures Control-M MFT for server and client authentication.
-
Changing the MFT Keystore Password: Changes the key database password from the default password that is configured with Control-M MFT to a more secure password.
SSL Security LevelsLink copied to clipboard
The following table describes the SSL security levels of encrypted communication.
Security Level |
Authentication |
Client Certificate |
Security |
---|---|---|---|
2 |
No authentication. |
Not sent. |
Low |
3 |
Server authentication. |
Not sent. |
Moderate |
4 |
Server and client authentication. |
Sent |
High |
You can define the host security level in a connection profile utility, as described in FTP Protocol Parameters.
Control-M MFT AuthenticationLink copied to clipboard
An SSL certificate is a small data file that digitally binds a cryptographic key to the details of an organization and is used to authenticate connections between a client and server.
The following procedures describe how to configure server and client authentication for Control-M MFT:
To authenticate the identity of the server, and to configure the server to authenticate the identity of the client, you must complete both procedures.
Control-M MFT uses Java Keytool, a key and certificate management utility, which enables you to manage your own public-private key pairs and certificates. Java Keytool stores the keys and certificates in a keystore and protects the private keys and keystore with the same password.
The Java Keytool utility path is <Agent home directory>/cm/AFT/JRE/bin/keytool. Each certificate in a Java keystore is associated with a unique alias.
You must not use the sslcmd utility provided with the Agent. Control-M MFT no longer supports the sslcmd utility or *.kdb format.
Configuring Control-M MFT for Server AuthenticationLink copied to clipboard
This procedure describes how to configure Control-M MFT for server authentication. To implement server authentication you must import the CA belonging to each of the FTP over SSL/TLS servers to the Control-M MFT keystore.
Begin
-
Set the host security to level 3.
-
Copy the FTP over SSL/TLS server CA file to a temporary location where Control-M MFT is installed.
-
Navigate to the following location:
-
UNIX: <Agent_Home_Directory>/cm/AFT/JRE_LINK/bin/
-
Windows: <Agent_Home_Directory>\cm\AFT\JRE_LINK\bin\
-
-
Import the certificate for the CA, as follows:
-
FIPS ON:
-
UNIX: ./keytool -J-Djava.security.properties==<Java_Security_File_Path> -J--module-path="<Control-M/Agent>/ctm/cm/AFT/exe/providers" -J-Dorg.bouncycastle.fips.approved_only=true -importcert -alias <Server_Alias> -file <Server_Certificate_File> -keystore <Keystore_File> -storepass <Password> -storetype BCFKS
-
Windows: .\keytool -J-Djava.security.properties==<Java_Security_File_Path> -J--module-path="<ctm_agent>\ctm\cm\AFT\exe\providers" -J-Dorg.bouncycastle.fips.approved_only=true -importcert -alias <Server_Alias> -file <Server_Certificate_File> -keystore <Keystore_File> -storepass <Password> -storetype BCFKS
-
-
FIPS OFF: ./keytool -importcert -alias <Server_Alias> -file <Server_Certificate_File> -keystore <Keystore_File> -storepass <Password>
where the <Java_Security_File_Path> is as follows:
-
Solaris and AIX: <Control-M/Agent>/ctm/cm/AFT/data/java.security.mft
-
Linux: <Control-M/Agent>/ctm/cm/AFT/data/java.security.mft.bcf
-
Windows: <Control-M/Agent>\ctm\cm\AFT\data\java.security.mft
-
-
Ensure that the certificate is valid before you import it as a trusted certificate. View it with the keytool -printcert command or the keytool -importcert command without the -noprompt option, and verify that the displayed certificate fingerprints match the expected ones.
Configuring Control-M MFT for Client AuthenticationLink copied to clipboard
This procedure describes how to configure Control-M MFT for client authentication that allows the server to authenticate Control-M MFT. You can either use the Control-M MFT Certificate of Authentication (CA), or you can use one supplied by an outside vendor, as described in Configuring Control-M MFT for an Alternative CA.
Begin
-
Set the host security to level 4.
-
Configure Control-M MFT for Server authentication, as described in Configuring Control-M MFT for Server Authentication .
-
Do one of the following:
-
To use the Control-M MFT CA, use your server’s Import utility to import clientCA.crt file from the following location:
-
UNIX: <Agent_Home_Directory>/cm/AFT/data/SSL/cert
-
Windows: <Agent_Home_Directory>\cm\AFT\data\SSL\cert
-
-
To use an alternative CA, you must configure Control-M MFT so that this CA is recognized by the application, as described in Configuring Control-M MFT for an Alternative CA.
-
Configuring Control-M MFT for an Alternative CALink copied to clipboard
This procedure describes how to configure Control-M MFT for client authentication using an alternative CA.
Before You Begin
-
Create your own Java Keystore file.
-
Generate a CSR and submit the request to the CA.
-
Import the received certificate from the CA into the keystore.
-
Export the CA certificate that authenticates the public key to a file.
Use the same password to protect the keystore and private keys.
Begin
-
Copy your keystore file to the following location:
-
UNIX: <Agent_Home_Directory>/cm/AFT/data/SSL/cert
-
Windows: <Agent_Home_Directory>\cm\AFT\data\SSL\cert
-
-
Update the keystore filename, location, and type the following location, as described in Java Keystore Configuration:
-
UNIX: <Agent_Home_Directory>/cm/AFT/data/ftpssl_config.properties
-
Windows: <Agent_Home_Directory>\cm\AFT\data\ftpssl_config.properties
-
-
Do the following to update the password:
-
Navigate to the following directory:
-
UNIX: <Agent_Home_Directory>/cm/AFT/data
-
Windows: <Agent_Home_Directory>\cm\AFT\data
-
-
Open the ftpssl_config.properties file, and find the ssl.keystore.password parameter.
-
Update the ssl.keystore.password parameter value as follows:
ssl.keystore.password=PLAIN:<Cleartext_Password>
ssl.keystore.password=PLAIN:abcd1234
-
Run the following command to restart Control-M for MFT:
ctmaftcontainer stop
-
-
Import the CA to your FTP server.
Java Keystore ConfigurationLink copied to clipboard
By default, Control-M MFT is installed with a defined keystore file located in the following directory:
-
UNIX: <Agent_Home_Directory>/cm/AFT/data/SSL/cert/aftkeystore.pfx
-
Windows: <Agent_Home_Directory>\cm\AFT\data\SSL\cert\aftkeystore.pfx
The following table describes Java keystore configuration properties. A keystore is a database of cryptographic keys, X.509 certificate chains, and trusted certificates.
Parameter |
Description |
---|---|
ssl.securitydir |
Defines the path to the security directory where the Java keystore file is located. |
ssl.keystore.filename |
Defines the keystore filename. |
ssl.keystore.type |
(Optional) Defines a unique alias for the keystore. Use this option if you set security to level 4 and you have more than one private key entry in the keystore. If there is only one private key entry, do not set this property. |
ssl.keystore.password |
Defines the encrypted password for the keystore. Use the same password for keystore and private keys. The default password for the aftkeystore.pfx file is abcd1234, or password if you upgraded from Control-M MFT 9.0.20.200 or lower. To ensure data security, change this password immediately, as described in Changing the MFT Keystore Password. If you created a new keystore file in Configuring Control-M MFT for an alternative CA, use this password for future commands. If you have already changed it, use the new password. |
Changing the MFT Keystore PasswordLink copied to clipboard
This procedure describes how to change the keystore password and update the Control-M MFT SSL configuration file with the new encrypted password.
If this is the first time you are changing the keystore password, the default password is abcd1234, or password if you upgraded from Control-M MFT 9.0.20.200 or lower.
Begin
-
Navigate to the following location:
-
UNIX: <Agent_Home_Directory>/CM/AFT/
-
Windows: <Agent_Home_Directory>CM\AFT\
-
-
Type the following command:
keystoreutil –changepassword –help
-
For the keystoretype parameter, choose AFT_SSL.
The keystore and Control-M MFT SSL configuration files are updated with the new password.
Creating your Own KeystoreLink copied to clipboard
This procedure describes how to create your own keystore for Control-M MFT.
Begin
-
Run the keytool for Control-M MFT in the following location:
-
UNIX:
-
MFT: <Agent_Home>/cm/AFT/JRE_LINK/bin
-
-
Windows:
-
MFT: <Agent_Home>\cm\AFT\JRE_LINK\bin
-
-
-
Do one of the following:
-
To generate a new keystore in PKCS#12 format, do the following:
-
Run the following command:
keytool -genkeypair -v -alias <My_Alias> -keystore <Keystore_Path> -storetype PKCS12 -keypass <Keystore_Password> -storepass <Keystore_Password> -keyalg RSA -keysize 2048
-
Create a certificate signing request from a CA, and then import the certificate reply from a CA to the keystore.
-
-
To generate a new keystore in PKCS#12 format and bring your own key-pair into the keystore, do the following:
-
Run the following command to empty the keystore from public-private key-pair entry:
keytool -delete -alias <my_alias> -keystore <Keystore_Path> -storetype PKCS12 -storepass <Keystore_Password>
-
Run the following command to ensure that the keystore is empty:
keytool -v -list --keystore <Keystore_Path> -storetype PKCS12 -storepass <Keystore_Password>
-
Run the following command to import the public-private key-pair—which is stored on the <File_Location>.p12 (*.pfx) file—into the keystore:
keytool -v -importkeystore -srckeystore <Whatever_The_Filename_Is.p12> -srcstoretype PKCS12 - srcstorepass <Whatever_The_Filename_Is_Password> -destkeystore <Keystore_Path> -deststoretype PKCS12 -deststorepass <Keystore_Password>
-
-
Convert an existing keystore in JKS or PKCS12 format to PKCS#12 format.
keytool -v -importkeystore -srckeystore <srckeystorePath> -srcstoretype PKCS12 - srcstorepass <srcKeystorePassword> -destkeystore <destkeystorePath> -deststoretype PKCS12 -deststorepass <destKeystorePassword>
-
For more specific information, see the Keytool Documentation.
Configuring Connection Details for a Remote Windows ServerLink copied to clipboard
This procedure describes how to configure connection details for a remote Windows server, which enables you to avoid any problems caused by this issue when defining a Control-M MFT connection profile.
There is no standard way that Windows-based FTP/SFTP servers display the file system.
Begin
-
From your local FTP/SFTP client, connect to the remote Windows FTP/SFTP server, as follows:
-
FTP: Enter ftp <host>.
-
SFTP: Enter sftp <username>@<host>.
The FTP/SFTP server might require that you define the domain. Both the username and host must be the same values you use when defining the connection profile.
The SFTP Client Application name might vary, depending on the application or platform you are using.
-
-
Type your password.
-
From the command line, type pwd.
The user home directory appears.
The syntax of the path of the home directory indicates the operating system where it is running.
-
Select the appropriate host OS Type in Connection Profile Management utility according to the following:
-
If the path uses / (forward slashes), define the host as UNIX.
-
If the path uses \ (backslashes), define the host as Windows.
If you select UNIX as the OS Type, do not transfer files in ASCII mode.
-
-
In the Connection Profile utility, ensure that home directory path name is defined using the same syntax as that shown in the pwd command (see step 3).
Configuring LDAP with SSLLink copied to clipboard
This procedure describes how to configure LDAP with SSL/TLS, which takes the LDAP certificate (signed by CA) and adds it to the JRE trusted CA (cacerts) keystore.
Begin
-
Run the following command to import the CA certificate that signed the LDAP directory certificate:
-
UNIX: <MFT_JRE>/keytool -importcert -keystore <MFT_JRE>/lib/security/cacerts -file <Certificate> -alias <Unique_Name>
-
Windows: <MFT_JRE>\keytool -importcert -keystore <MFT_JRE>\lib\security\cacerts -file <Certificate> -alias <Unique_Name>
/home/ctmagent/ctm/cm/AFT/JRE_LINK/bin/keytool -v -importcert -keystore /home/ ctmagent/ctm/cm/AFT/JRE_LINK/lib/security/cacerts -file /p/qadata/LDAP/tlvldap.cer -alias myldap
-
-
At the password prompt, type changeit.
-
Modify the LDAP Server URL parameter to use LDAPS, as described in LDAP Settings for Internal Users (default SSL port is 636).
ldaps://tlv-ldp-srv.bmc.com:636
-
Restart the Hub.
Configuring an FTP Firewall in Active and Passive ModeLink copied to clipboard
Control-M MFT supports both the Active Data Transfer Process and the Passive Data Transfer Process enabling it to work behind a firewall and connect to remote FTP servers. The FTP mode is defined in the Connection Profile utility when you define the connection definition.
This procedure describes how to configure an FTP firewall in active and passive mode.
Begin
-
Open the following communication channels in the FTP server firewall:
-
FTP server port 21 from anywhere (Client Connects the Server).
-
FTP server port 21 to ports greater than 1023 (Server responds to client's control port).
-
FTP server port 20 to ports greater than 1023 (Server initiates data connection to client's data port).
-
FTP server port 20 from ports greater than 1023 (Client sends ACKs to server data port).
Active mode can be problematic for FTP clients behind a firewall because the FTP client does not initiate the connection to the data port of the server; rather the server connects to the client port as defined in the PORT command. Usually an outside system initiating a connection to the client is blocked by the client firewall.
The FTP Passive Data Transfer mode was developed to resolve this issue. In Passive mode, the following sequence of events occurs:
-
The client initiates both connections to the server, by first connecting to Server command port 21.
-
The client then issues the PASV command, (which requests that the Server open a random unprivileged port for the data port, and sends the PORT command to the client).
-
The client then connects to the data Server port as specified in the PORT command.
-
-
Open the following communication channels in the FTP server firewall, to support Passive mode FTP:
-
FTP server port 21 from anywhere (Client connects the server).
-
FTP server port 21 to ports greater than 1023 (Server responds to client's control port).
-
FTP server ports greater than 1023 from anywhere (Client initiates data connection to random port specified by server).
-
FTP server ports greater than 1023 to remote ports greater than 1023 (Server sends ACKs (and data) to client's data port).
Problems can occur if an FTP server is behind a firewall, when FTP clients try to use passive mode to connect to a temporary random port number on the FTP server machine. The most common of these is that the firewall blocks the connection from the client to the server.
When a restrictive firewall (one that denies a connection except for a few well known ports) exists on both the server and client sides, you should configure the firewall on the server side. Many FTP servers allow the administrator to specify a range of ports for the FTP server to use. The administrator can then limit the port range for the FTP server, and the firewall can then be configured to allow connection for the specified FTP server port range.
-
Configuring an SFTP FirewallLink copied to clipboard
This procedure describes how to configure an SFTP firewall.
Begin
-
If the SSH server resides behind a firewall, open the SSH port for traffic.
The client usually connects to SSH server port 22.
Adding Users to Local Security PoliciesLink copied to clipboard
This procedure describes how to add users that are defined in the connection profile in the host where the Local CM checkbox is selected to Administrators, which enables you to execute PGP commands (Windows only).
Begin
-
From the Computer Management window, select Local Users and Groups -> Groups ->Administrators.
The Administrators Properties window appears.
-
Click Add to define the user name defined in the connection profile, and then click OK.
-
Click OK.
Extending the Timeout Period in Control-M/ServerLink copied to clipboard
This procedures how to extend the timeout period in Control-M/Server, which prevents timeouts from occurring when you are generating an SSH key in the Control-M Configuration Manager.
Begin
-
Navigate to the following directory:
-
UNIX: CTM_Server/data
-
Windows: CTM_Server\data
-
-
Open the config.dat file and search for the following parameter:
CTM_CONFIG_AGENT_TUNNEL_TIMEOUT <value>
-
Do one of the following:
-
If the parameter exists, change the value to 3600 or higher.
-
If the parameter does not exist, add it to the file.
-
-
Restart the Control-M/Server Configuration Agent.
Setting the Output File PermissionsLink copied to clipboard
(UNIX only) This procedure describes how to configure the Control-M for MFT Output file permissions.
Begin
-
Open the <Agent_Home_Directory>/ctm/data/FILE_TRANS.dat file and add the following:
SYSOUT_MODE <Required_File_Permission>
SYSOUT_MODE 755
If the SYSOUT_MODE is not configured in the FILE_TRANS.dat, but rather the Agent CONFIG.dat, AFT uses the value configured in Agent CONFIG.dat.
Activating the Control-M for MFT Debug LevelLink copied to clipboard
This procedure describes how to activate the Control-M for MFT debug level, which enables you generate Control-M for MFT debug information.
Begin
-
Raise the Agent debug level to 4, as described in the Defining the Agent Debug Level.
The debug files are created in the following location:
-
UNIX: <Agent_Home_Directory>/proclog
-
Windows: <Agent_Home_Directory>\proclog
-
-
When you have all the required debug information, decrease the debug level to 0.
Changing the Encryption Key in MFTLink copied to clipboard
This procedure describes how to change the AES256 key used to encrypt passwords in MFT accounts and property files.
The password can be encrypted with a non-default key for Control-M/Agent version 9.0.18 or later and Control-M MFT 9.0.18 or later.
Begin
-
Stop the Agent.
-
Create a new key using the keygen script, as follows:
-
UNIX: ./ctm_agent/ctm/scripts/keygen.sh -keyoutput <File_Pathnname>
-
Windows: <Agent_Home>\keygen.bat -keyoutput <File_Pathnname>
-
-
To rotate the the MFT existing key, copy and rename the created file as follows:
-
UNIX: /home/dbauser/ctm_agent/ctm/cm/AFT/data/new_local.txt
-
Windows: \home\dbauser\ctm_agent\ctm\cm\AFT\data\new_local.txt
This is the MFT encryption key, as described in Control-M Encryption Keys.
-
-
Start the Agent.
After the MFT container starts, all secured data in accounts.xml and property files are re-encrypted with the new key.
Enabling FIPS on Control-M MFTLink copied to clipboard
This procedure describes how to enable FIPS on Control-M MFT.
Before You Begin
Back up all data before making any changes.
Begin
-
Create the environment variable MFT_FIPS set to ON on all Hub and Gateway hosts.
-
Create and configure FIPS compliant keystores, as described in Creating FIPS Compliant Keystores.
-
Modify the MFT client SSL configuration by opening the following file and modifying the relevant properties:
-
UNIX: <Agent>/cm/AFT/ftpssl_config.properties
-
Windows: <Agent>\cm\AFT\ftpssl_config.properties
# The path to the security directory where keystore file resided:
ssl.securitydir=${cm.home}/data/SSL/cert/fips
# The keystore filename:
ssl.keystore.filename=aftkeystore.bcfks
# The keystore type:
ssl.keystore.type=BCFKS
-
-
Modify the MFT Server SSL/SSH configuration by opening the <Agent>/cm/AFT/data/fts_config.properties file and modify the relevant properties.
-
ftp.secure.keystore=${cm.home}/data/SSL/cert/fips/ftskeystore.bcfks
-
ftp.secure.keystore.type=BCFKS
-
ftp.secure.ciphers=SSL_RSA_WITH_3DES_EDE_CBC_SHA,SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA,
TLS_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_DSS_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,
TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_DSS_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,
TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA,
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA -
ssh.host.keystore=${cm.home}/data/Keys/fips/keystore.bcfks
-
ssh.host.keystore.type=BCFKS
-
ssh.ciphers=AES128CBC,AES256CBC,AES192CBC,AES128CTR,AES192CTR,AES256CTR,TripleDESCBC
The FTP secure ciphers list does not include specific SHA functions security bits. If you want to enforce a specific cipher suite, add it as a suffix, such as TLS_DHE_RSA_WITH_AES_256_CBC_SHA256.
-
Restart the Hub by running the following command, and then wait until it starts again:
-
UNIX: <Agent>/cm/AFT/exe/shutb2b.sh
-
Windows: <Agent>\cm\AFT\exe\shutb2b.sh
-
-
Creating FIPS Compliant KeystoresLink copied to clipboard
This procedure describes how to create FIPS compliant keystores for Control-M MFT.
If using the JSSE in FIPS mode, the key-stores containing either the private server credentials, or the private client credentials must be readable using the BCFIPS provider. The only key-store type the BCFIPS provider has available, that is FIPS compliant, is the BCFKS. When using the JSSE in FIPS mode, the key-stores for private key credentials is BCFKS. The PKCS12 key store is not available in FIPS mode of operation due to the algorithms required for PBE key generation in the PKCS12 standard.
The <Java_Security_File_Pathname> must be one of the following:
-
Solaris and AIX: <Agent_Home>/ctm/cm/AFT/data/java.security.mft
-
Linux: <Agent_Home>/ctm/cm/AFT/data/java.security.mft.bcf
-
Windows: <Agent_Home>\ctm\cm\AFT\data\java.security.mft
Begin
-
Run the keytool for Control-M MFT in the following locations:
-
UNIX:
-
MFT: <Agent_Home>/cm/AFT/JRE_LINK/bin
-
-
Windows:
-
MFT: <Agent_Home>\cm\AFT\JRE_LINK\bin
-
-
-
Do one of the following:
-
To generate a new keystore in BCFKS format, do the following:
-
Run the following command:
-
UNIX: keytool -J-Djava.security.properties==<Java_Security_File_Pathname> -J--module-path="<ctm_Agent>/ctm/cm/AFT/exe/providers" -J-Dorg.bouncycastle.fips.approved_only=true -genkeypair -v -alias <My_Alias> -keystore <Keystore_Pathname> -storetype BCFKS -keypass <Keystore_Password> -storepass <Keystore_Password> -keyalg RSA -keysize 2048
-
Windows: keytool -J-Djava.security.properties==<Java_Security_File_Pathname> -J--module-path="<ctm_Agent>\ctm\cm\AFT\exe\providers" -J-Dorg.bouncycastle.fips.approved_only=true -genkeypair -v -alias <My_Alias> -keystore <Keystore_Pathname> -storetype BCFKS -keypass <Keystore_Password> -storepass <Keystore_Password> -keyalg RSA -keysize 2048
-
-
Create a certificate signing request from a CA and then import the certificate reply from a CA to the keystore.
-
-
To generate a new keystore in BCFKS format and bring your own key-pair into the keystore, do the following:
-
Run the following command to empty the keystore from public-private key-pair entry:
-
UNIX: keytool -J-Djava.security.properties==<Java_Security_File_Pathname> -J--module-path="<ctm_agent>/ctm/cm/AFT/exe/providers" -delete -alias <My_Alias> -keystore <Keystore_Pathname> -storetype BCFKS -storepass <Keystore_Password>
-
Windows: keytool -J-Djava.security.properties==<Java_Security_File_Pathname> -J--module-path="<ctm_agent>\ctm\cm\AFT\exe\providers" -delete -alias <My_Alias> -keystore <Keystore_Pathname> -storetype BCFKS -storepass <Keystore_Password>
-
-
Run the following command to ensure that the keystore is empty:
-
UNIX: keytool -J-Djava.security.properties==<Java_Security_File_Pathname> -J--module-path="<ctm_agent>/ctm/cm/AFT/exe/providers" -v -list --keystore <Keystore_Pathname> -storetype BCFKS -storepass <Keystore_Password>
-
Windows: keytool -J-Djava.security.properties==<Java_Security_File_Pathname> -J--module-path="<ctm_agent>\ctm\cm\AFT\exe\providers" -v -list --keystore <Keystore_Pathname> -storetype BCFKS -storepass <Keystore_Password>
-
-
Run the following command to import the public-private key-pair—which is stored in the <Filename>.p12 (*.pfx) file—into the keystore:
-
UNIX: keytool -J-Djava.security.properties==<Java_Security_File_Pathname> -J--module-path="<ctm_agent>/ctm/cm/AFT/exe/providers" -v -importkeystore -srckeystore <Whatever_the_File_Is.p12> -srcstoretype PKCS12 - srcstorepass <Whatever_the_File_Is_Password> -destkeystore <Keystore_Pathname> -deststoretype BCFKS -deststorepass <Keystore_Password>
-
Windows: keytool -J-Djava.security.properties==<Java_Security_File_Pathname> -J--module-path="<ctm_agent>\ctm\cm\AFT\exe\providers" -v -importkeystore -srckeystore <Whatever_the_File_Is.p12> -srcstoretype PKCS12 - srcstorepass <Whatever_the_File_Is_Password> -destkeystore <Keystore_Pathname> -deststoretype BCFKS -deststorepass <Keystore_Password>
-
-
-
Convert an existing keystore in JKS or PKCS12 format to the BCFKS format.
keytool -v -importkeystore -srckeystore <srckeystorePath> -srcstoretype PKCS12 - srcstorepass <srcKeystorePassword> -destkeystore <destkeystorePath> -deststoretype BCFKS -deststorepass <destKeystorePassword>
-
For more specific information, see Java Keytool.
Control-M MFT KeystoresLink copied to clipboard
The following table lists the Control-M MFT keystores and locations.
Keystore |
Location |
Non-FIPS keystore |
FIPS keystore |
---|---|---|---|
FTS Keystore for fingerprints |
data\keystore\ |
keystore.pfx |
keystore.bckfs |
MFT client keystore |
data\SSL\cert\ |
aftkeystore.pfx |
aftkeystore.bcfks |
FTS keystore (SSL) |
data\SSL\cert\ |
ftskeystore.pfx |
ftskeystore.bcfks |