Java Connector
  • Java Connector
  • Concepts
    • Feature Summary
    • Terminology
    • Account Model
    • Packet Switching Fabric
    • Exchange Rates
    • Routing Table Design
    • Destination Address Handling
    • Balance Tracking
    • Settlement
  • Connector Configuration
  • Connector Configuration Properties
  • Persistence Initialization
  • Local STREAM Packet Termination
  • Connector Operation
  • Running with Docker
  • Peering: ILP-over-HTTP
  • Settlement: XRP Ledger
  • Running on GCP
  • Security Guide
    • Connector Crypto
    • test-jwt.io
    • Generating Keys
    • Spring Boot with TLS
  • API References
    • Admin API
  • Tutorials
    • ILP TestNet: Getting Started
  • Contributing
    • Connector Development
    • Project Testing
  • Releases
    • Changelog
Powered by GitBook
On this page
  • Keystores
  • JKS
  • Google GCP
  • Vault

Was this helpful?

  1. Security Guide

Connector Crypto

This Connector implementation supports various mechanism to support Encryption and Signing operations.

Keystores

To use a Java Keystore as your location of any key material, first create a Keystore using the following commands:

> keytool -keystore ./crypto.p12 -storetype PKCS12 -genseckey -alias secret0 -keyalg aes -keysize 256
> keytool -keystore ./crypto.p12 -storetype PKCS12 -list

Note the JKS and secret0 password used.

Next, update the following properties in your application.yml file:

jks:
  jks_filename: crypto.p12
  jks_password: password
  secret0_alias: secret0
  secret0_password: password

Finally, make sure the JKS file crypto.pkcs12 is added to the runtime classpath of the Connector.

JKS

Google GCP

Vault

PreviousRunning on GCPNexttest-jwt.io

Last updated 5 years ago

Was this helpful?