Skip to content

The Java Key Store Remote Orchestrator allows a user to manage Java Key Stores on either Linux or Windows servers. This orchestrator uses SSH to communicate with Linux orchestrated servers and WinRM to communicate with Windows orchestrated servers.

License

Notifications You must be signed in to change notification settings

Keyfactor/jks-remote-orchestrator

Repository files navigation

Remote JKS

PLEASE NOTE: This integration has been deprecated and replaced by The RemoteFile Orchestrator Extension - https://github.com/Keyfactor/remote-file-orchestrator.

The remote JKS Orchestrator Extension allows for the remote management of Java Key Stores. Discovery, Inventory, and Management functions are supported. The orchestrator extension performs operations by issuing remote commands over SSH to Linux based systems and WinRM to Windows based systems.

Integration status: Production - Ready for use in production environments.

About the Keyfactor Universal Orchestrator Capability

This repository contains a Universal Orchestrator Capability which is a plugin to the Keyfactor Universal Orchestrator. Within the Keyfactor Platform, Orchestrators are used to manage “certificate stores” — collections of certificates and roots of trust that are found within and used by various applications.

The Universal Orchestrator is part of the Keyfactor software distribution and is available via the Keyfactor customer portal. For general instructions on installing Capabilities, see the “Keyfactor Command Orchestrator Installation and Configuration Guide” section of the Keyfactor documentation. For configuration details of this specific Capability, see below in this readme.

The Universal Orchestrator is the successor to the Windows Orchestrator. This Capability plugin only works with the Universal Orchestrator and does not work with the Windows Orchestrator.

Support for Remote JKS

Remote JKS is supported by Keyfactor for Keyfactor customers. If you have a support issue, please open a support ticket with your Keyfactor representative.

To report a problem or suggest a new feature, use the Issues tab. If you want to contribute actual bug fixes or proposed enhancements, use the Pull requests tab.



Note that as a prerequisite for using the Remote JKS to manage/orchestrate a Linux or Windows server is that Java be installed on each server being managed/orchestrated.

Use Cases

The Java Keystore Windows AnyAgent implements the following capabilities:

  1. Create - Create a Java Keystore.
  2. Discovery - Discover all Java Keystores in a set of paths based on optional list of file extensions and partial name matching.
  3. Inventory - Return all certificates for a define certificate store.
  4. Management (Add) - Add a certificate to a defined certificate store.
  5. Management (Remove) - Remove a certificate from a defined certificate store.

The Java Keystore Windows AnyAgent supports the following types of Java Keystore:

  1. Trust stores (multiple public certificates with no private keys)
  2. Stores with one or more aliases
  3. Stores with certificate chains included in the alias (inventory only)

Versioning

The version number of a the Java Keystore Windows AnyAgent can be verified by right clicking on the JavaKeyStoreSSH.dll file in the Plugins installation folder, selecting Properties, and then clicking on the Details tab.

Keyfactor Version Supported

Versions >= 2.0 are compiled under the .Net Core 3.1 target framework and are compatible for use with the Keyfactor Universal Orchestrator. Versions < 2.0 are compiled under a .Net Framework target framework and are compatible for use with the Keyfactor Windows Orchestrator.

Security Considerations

For Linux orchestrated servers:

  1. The Java Keystore AnyAgent makes use of the Keytool program and other common Linux commands. If the credentials you will be connecting with will need elevated access to run these commands, you must set the id up as a sudoer with no password necessary and set the config.json "UseSudo" value to "Y" (See Section 4 regarding the config.json file). The full list of these commands below:
    • keytool
    • echo
    • rm
    • ls
    • find
    • dos2unix (only if running pre-run script - see "4. Update Settings in config.json")
    • chmod (only if running pre-run script - see "4. Update Settings in config.json")
  2. The Java Keystore AnyAgent makes use of SFTP to transfer files to and from the orchestrated server. SFTP will not make use of sudo, so all folders containing certificate stores will need to allow SFTP file transfer. If this is not possible, set the values in the config.json appropriately to use an alternative upload/download folder that does have SFTP file transfer (See Section 4 regarding the config.json file).
  3. To manage Java keystores, Java itself must be installed on the orchestrated server. With Java comes the Keytool program. The path where Java and Keytool reside must be in the $PATH system environment variable on the orchestrated server. If this is not possible, please review Section 4 regarding the config.json file to find information on setting up a client-written bash script to find the path where Keytool resides.

For Windows orchestrated servers:

  1. Make sure that WinRM is set up on the orchestrated server and that the WinRM port is part of the certificate store path when setting up your certificate stores (See Section 3a below).
  2. By default, the location of the Keytool program needs to be in the Windows System Environment PATH variable of the orchestrated server. If this is not possible, you can set the config.json item "FindKeytoolPathOnWindows" to "Y" to find it. When this value is set to "Y", the Java Keystore AnyAgent will search all available drives for the first occurrence of "Keytool.exe" and use that to execute all Keytool commands. See Section 4 regarding the config.json file below.

Java Keystore AnyAgent Configuration

1. Create the New Certificate Store Type for the New Java Keystore AnyAgent

In Keyfactor Command create a new Certificate Store Type similar to the one below:

  • Name – Required. The display name of the new Certificate Store Type
  • Short Name – Required. Similar to Name. A shorter display value.
  • Custom Capability - Required. Must be JKS-SSH. NOTE: If not adding this manually but rather upgrading to Keyfactor 9 with this being an existing store type, the Short Name of JKS-SSH from the previous store type will be moved to this field. It will not show up as checked and the value will not be shown, but as long as the Short Name shows as JKS-SSH, this will be correct.
  • Supported Job Types, General Settings, Password Settings, Store Path Types, and Other Settings – All checked/unchecked as shown. For "Supports Entry Password", this is optional. Selecting this allows users to specify a separate password from the certificate store password to be used as the key password for that entry when enrolling a new certificate with certificate store delivery or adding an existing certificate to a store. If this selection is checked for the certificate store type definition but the entryPassword field is left blank when adding a certificate to a store, the store password will be used for the key password.
  • Linux File Permissions on Store Creation - Optional. Overrides the optional config.json DefaultLinuxPermissionsOnStoreCreation setting (see section 4 below) for a specific certificate store. This value will set the file permissions (Linux only) of a new certificate store created via a Management-Create job. If this parameter is not added or added but not set, the permissions used will be derived from the DefaultLinuxPermissionsOnStoreCreation setting.

2. Create the proper Extension folder and move the installation binaries to this location

Download the desired AnyAgent version at https://github.com/Keyfactor/jks-remote-orchestrator. Within Windows File Explorer, navigate to the Keyfactor Orchestrator installation folder (usually C:\Program Files\Keyfactor\Keyfactor Orchestrator), find the "extensions" folder, and under that create a new folder named "JKS-SSH". Under the JKS-SSH folder copy all of the files from the downloaded release to this location.

3a. (Optional) Create a Java Keystore Certificate Store within Keyfactor Command

If you choose to manually create a Java Keystore store In Keyfactor Command rather than running a Discovery job to automatically find the store, you can navigate to Certificate Locations => Certificate Stores within Keyfactor Command to add the store. Below are the values that should be entered.

  • Category – Required. The JKS SSH type name must be selected.

  • Container – Optional. Select a container if utilized.

  • Client Machine & Credentials – Required. The server name or IP Address and login credentials for the server where the Certificate Store is located. The credentials for server login can be any of:

    • UserId/Password

    • UserId/SSH private key. If using a SSH private key, the following formats are supported:

      • RSA in OpenSSL PEM and ssh.com format
      • DSA in OpenSSL PEM and ssh.com format
      • ECDSA 256/384/521 in OpenSSL PEM format
      • ECDSA 256/384/521, ED25519 and RSA in OpenSSH key format
    • PAM provider information to pass the UserId/Password or UserId/SSH private key credentials

    When setting up a Windows server, the format of the machine name must be – http://ServerName:5985, where "5985" is the WinRM port number. 5985 is the standard, but if your organization uses a different port, use that. The Keyfactor Command service account will be used if the credentials are left blank. However, if you choose to not enter credentials and use the Keyfactor Command service account, it is required that the Change Credentials link still be clicked on and the resulting dialog closed by clicking OK.

  • Store Path – Required. The FULL PATH and file name of the Java Keystore being managed. File paths on Linux servers will always begin with a "/". Windows servers will always begin with the drive letter, colon, and backslash, such as "c:\". Valid characters for Linux store paths include any alphanumeric character, space, forward slash, hyphen, underscore, and period. For Windows servers, the aforementioned characters as well as a colon and backslash.

  • Orchestrator – Select the orchestrator you wish to use to manage this store

  • Store Password – Required. Set the store password for the Java Keystore

  • Linux File Permissions on Store Creation - Optional (Linux only). Set the Linux file permissions you wish to be set when creating a new physical certificate store via checking Create Certificate Store above. This value must be 3 digits all betwwen 0-7.

  • Inventory Schedule – Set a schedule for running Inventory jobs or none, if you choose not to schedule Inventory at this time.

3b. (Optional) Schedule a Java Keystore Discovery Job

Rather than manually creating Java Keystore certificate stores, you can schedule a Discovery job to search an orchestrated server and find them.

First, in Keyfactor Command navigate to Certificate Locations => Certificate Stores. Select the Discover tab and then the Schedule button. Complete the dialog and click Done to schedule.

  • Category – Required. The Java Keystore type name must be selected.

  • Orchestrator – Select the orchestrator you wish to use to manage this store

  • Client Machine & Credentials – Required. The server name or IP Address and login credentials for the server where the Certificate Store is located. The credentials for server login can be any of:

    • UserId/Password

    • UserId/SSH private key. If using a SSH private key, the following formats are supported:

      • RSA in OpenSSL PEM and ssh.com format
      • DSA in OpenSSL PEM and ssh.com format
      • ECDSA 256/384/521 in OpenSSL PEM format
      • ECDSA 256/384/521, ED25519 and RSA in OpenSSH key format
    • PAM provider information to pass the UserId/Password or UserId/SSH private key credentials

    When setting up a Windows server, the format of the machine name must be – http://ServerName:5985, where "5985" is the WinRM port number. 5985 is the standard, but if your organization uses a different, use that. The credentials used will be the Keyfactor Command service account. Because of this, for Windows orchestrated servers, setting an additional set of credentials is not necessary. However, it is required that the Change Credentials link still be clicked on and the resulting dialog closed by clicking OK.

  • When – Required. The date and time when you would like this to execute.

  • Directories to search – Required. A comma delimited list of the FULL PATHs and file names where you would like to recursively search for Java Keystores. File paths on Linux servers will always begin with a "/". Windows servers will always begin with the drive letter, colon, and backslash, such as "c:\". Entering the string "fullscan" when Discovering against a Windows server will automatically do a recursive search on ALL local drives on the server.

  • Directories to ignore – Optional. A comma delimited list of the FULL PATHs that should be recursively ignored when searching for Java Keystores. Linux file paths will always begin with a "/". Windows servers will always begin with the drive letter, colon, and backslash, such as "c:\".

  • Extensions – Optional but suggested. A comma delimited list of the file extensions (no leading "." should be included) the job should search for. If not included, only valid Java Keystore files in the searched paths that have no file extension will be returned. If providing a list of extensions, using "noext" as one of the extensions will also return valid Java Keystores with no file extension. For example, providing an Extensions list of "jks, noext" would return all valid Java Keystore locations within the paths being searched with a file extension of "jks" and files with no extensions.

  • File name patterns to match – Optional. A comma delimited list of full or partial file names (NOT including extension) to match on. Use "*" as a wildcard for begins with or ends with. Example: entering "ab*, *cd*, *ef, ghij" will return all stores with names that begin with "ab" AND stores with names that contain "cd" AND stores with names ending in "ef" AND stores with the exact name of "ghij".

  • Follow SymLinks – NOT IMPLEMENTED. Leave unchecked.

  • Include PKCS12 Files – NOT APPLICABLE. Leave unchecked.

Once the Discovery job has completed, a list of Java Keystore locations should show in the Certificate Stores Discovery tab in Keyfactor Command. Right click on a store and select Approve to bring up a dialog that will ask for the Keystore Password. Enter the store password, click Save, and the Certificate Store should now show up in the list of stores in the Certificate Stores tab.

4. Update Settings in config.json

The Java Keystore AnyAgent uses the Java command line tool "Keytool" to discover, inventory, and manage Java Keystores. The AnyAgent assumes that the location for this command exists in the %Path% environment variable for each server being managed/orchestrated. On Linux servers, in situations where this is not the case, an optional, client-created, bash script can be configured to run at the beginning of each Discovery, Inventory, or Management job. Also there are times, a client may prefer to use their own logic to return matching files for a Discovery job. This custom script can be used for this as well.

As a configuration step, you must modify the config.json file, found in the plugins folder of your Keyfactor Agent JKS-SSH installation (usually C:\Program Files\Certified Security Solutions\Certificate Management System Agent\plugins\JKS-SSH). This file contains the following JSON:

{

"UseSudo": "N",

"UsePrerunScript": "N",

"PreRunScript": "ScriptName.sh"

"PreRunScriptDestinationPath": "/path/to/script/"

"UseSeparateUploadFilePath": "N",

"SeparateUploadFilePath": "/path/to/upload/folder/",

"FindKeytoolPathOnWindows": "N",

"UseNegotiateAuth": "N",

"UseSCP": "N",

"DefaultLinuxPermissionsOnStoreCreation": "600"

}

Modify the six values as appropriate (all must be present regardless of Linux or Windows server orchestration):

UseSudo (Linux only) - to determine whether to prefix certain Linux command with "sudo". This can be very helpful in ensuring that the user id running commands ssh uses "least permissions necessary" to process each task. Setting this value to "Y" will prefix all Linux commands with "sudo" with the expectation that the command being executed on the orchestrated Linux server will look in the sudoers file to determine whether the logged in ID has elevated permissions for that specific command. For orchestrated Windows servers, this setting has no effect. Setting this value to "N" will result in "sudo" not being added to Linux commands.

UsePrerunScript (Linux only) – "Y" – The script identified in "PreRunScript" will be executed prior to the rest of the job. "N" – Do not run any pre-precessing script.

PreRunScript (Linux only) - The name of the script to be run on the orchestrated/managed server. This value will be ignored if UsePrerunScript is not set to "Y". This script MUST be located in the JKS-SSH installation folder.

PreRunScriptDestinationPath (Linux only) – The folder on the destination/orchestrated Linux server where the script should be copied to and executed from. The script will be removed at the end of the job.

UseSeparateUploadFilePath (Linux only) – When adding a certificate to a Java Keystore, the Java Keystore SSH AnyAgent must upload the certificate being deployed to the server where the certificate store resides. Setting this value to "Y" looks to the next setting, SeparateUploadFilePath, to determine where this file should be uploaded. Set this value to "N" to use the same path where the Java Keystore being managed resides. The certificate file uploaded to either location will be removed at the end of the process.

SeparateUploadFilePath (Linux only) – Only used when UseSeparateUploadFilePath is set to "Y". Set this to the path you wish to use as the location to upload and later remove certificates to be added to the Java Keystore being maintained.

FindKeytoolPathOnWindows (Windows only) – "Y" – The AnyAgent will search all available logical drives of the orchestrated server for the location of the "keytool.exe" program. This path will be used for all subsequent "keytool" commands. "N" – The "keytool.exe" program is assumed to be in the system environment %PATH% variable.

UseNegotiateAuth (Windows only) – Y/N - Determines if WinRM should use Negotiate (Y) when connecting to the remote server.

UseSCP (Optional, Linux only) - Y/N - Detemines if SCP (Y) or SFTP (N) should be used in uploading certificate files during Management-Add jobs

DefaultLinuxPermissionsOnStoreCreation (Linux only) - Optional. Value must be 3 digits all between 0-7. The Linux file permissions that will be set on a new certificate store created via a Management Create job. This value will be used for all certificate stores managed by this orchestrator instance unless overridden by the optional "Linux File Permissions on Store Creation" custom parameter setting on a specific certificate store. If "Linux File Permissions on Store Creation" and DefaultLinuxPermissionsOnStoreCreation are not set, a default permission of 600 will be used.

Json format that MUST be returned by script identified in PreRunScript if UsePrerunScript is set to "Y":

{
    "KeyToolPath": "string",
    "DiscoveredFiles":
    [
        "string",
        "string",
        .
        .
        .
        "string"
    ]
}

KeyToolPath is required but DiscoveredFiles is optional and only necessary if the client wishes to use their own logic to return certificate store locations.

KeyToolPath should contain the path where the Keytool command line program can be found on the orchestrated/managed server, and DiscoveredFiles, if exists, should contain an array of file paths and names of potential certificate stores based on the comma delimited list of file extensions passed as input. If no extensions are passed, DiscoveredFiles does not need to be returned and a JSON format of:

{
    "KeyToolPath": "string"
}

is acceptable.

About

The Java Key Store Remote Orchestrator allows a user to manage Java Key Stores on either Linux or Windows servers. This orchestrator uses SSH to communicate with Linux orchestrated servers and WinRM to communicate with Windows orchestrated servers.

Topics

Resources

License

Stars

Watchers

Forks

Languages