This section covers configuring a custom truststore for the Token Server.
It is possible to run the Token Server container with a custom truststore. The truststore is used to define the certificates that the Token Server can trust when creating SSL connections to external systems / a database.
This section is divided into the following subsections:
Before we can use the truststore, we need a folder to store the truststore file.
This folder will be mounted to the
Onegini Token Server container later on.
mkdir -p /opt/onegini/data/truststore
If you are using SELinux, you need to give Docker access to this folder. To do this you can use the following command:
chcon -Rt svirt_sandbox_file_t /opt/onegini/data/truststore
Perform the following command to generate the truststore.
keytool -genkey -alias tokenserver -keyalg RSA -keystore truststore.jks
Once prompted, enter the information required to generate a CSR.
Now we can copy the truststore to the folder we created.
cp truststore.jks /opt/onegini/data/truststore/truststore.jks
Before we can use the truststore in the
Onegini Token Server container we need to give the
onegini user access
to the truststore.
chown -R onegini:onegini /opt/onegini/data/truststore
Now add the following line to the docker-compose.yml
tokenserver: volumes: - "/opt/onegini/data/truststore:/opt/data/truststore" ports:
and edit the following Docker Compose environment variables:
TOKEN_SERVER_TRUSTSTORE_ENABLED=true TOKEN_SERVER_TRUSTSTORE_PASSWORD=<YOUR PASSWORD>
Restart the container with docker-compose
Onegini Token Server needs to connect to a server with SSL certificates. You need to trust this server before
Onegini Token Server can make a connection. If you do not import this SSL certificates you will get a execption.
keytool -import -alias apple-push -file apple-push.crt -keystore truststore.jks