-
Notifications
You must be signed in to change notification settings - Fork 136
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Issue with docs.zowe.org/stable/user-guide/configure-certificates #4122
Comments
That is very much correct understanding, and while Zowe does support PKCS#12. I definitely wouldn't recommend it for anything else then PoC deployments. Is there any change in documentation that is missing to make sure this is clear? |
How about Zowe supports using either file-based (PKCS12) or z/OS key ring-based (when on z/OS) keystores and truststores, and can reuse compatible stores. file-based .pem certificates are inherently not secure because they files can be accessed and the credentials stolen. You should use keyring based stores for your systems |
I'l go back to the documentation. I didn't see this page when going through the installation process, so I wonder how I missed it. I do find it hard to find a single path through the documentation which gives me what I need to know - and not too much information. |
There is not a single path through the documentation, because it covers different options. The numbers explain what I believe to be the path one must take. a,b,c. they're choices. the naming convention is as such. but some choices are better than others both in popularity and in documentation quality
4.1, 4.2, 4.3: much of this is covered in the automation of 4a,4b,4c, but are in their own sections right below as a detailing of what's really needed, and how to do things manually instead of automated. Hope you can appreciate the complexity of how does one make this linear when there's differences of opinion on what people want to see and do. |
Description
Pages to Update
It says
Zowe supports using either file-based (PKCS12) or z/OS key ring-based (when on z/OS) keystores and truststores, and can reuse compatible stores if they exist. Zowe can assist in creating the stores by either generating certificates or by allowing users to import their own compatible certificates via the zwe init certificate command.
I believe that PKCS12 (or .pem) files are not considered very secure - but you need to check with the security people.
Anyone with super user authority can access this .pem file, and so steal your private key.
If you use a keyring, you have to explicity grant someone access to the keyring to be able to use it - and give them control/update access to the ring to be able to use any private key on the ring.
Take our Certificates Configuration Questionnaire to assist with determining which configuration scenario and associated zowe.yaml format best suits your use case.
broken link
Screenshots
Expected behavior
Additional context
The text was updated successfully, but these errors were encountered: