<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: password and encryption-key parameters - EnvironmentManager hq-server.conf file in Administration and Deployment</title>
    <link>https://communities.sas.com/t5/Administration-and-Deployment/password-and-encryption-key-parameters-EnvironmentManager-hq/m-p/697881#M20666</link>
    <description>&lt;P&gt;For an update if anyone else also struggles with this kind of issue here's how it got solved.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The "server.encryption-key" parameter can't be changed without special tool. The problem is that&amp;nbsp;EAM_MEASUREMENT.DSN table (@WebInfrastructurePlatformDataServer) contains some ENC encrypted records and can't be changed because probably there might be thousands of those records.&lt;/P&gt;&lt;P&gt;The only solution is to get in touch with support and they provide a java tool for it. As it may be version dependent i can't put it here.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then the "server.encryption-key" value had to be renamed to "server.encryption-key-org" - this value will be read by the tool mentioned previously.&lt;/P&gt;&lt;P&gt;A new "server.encryption-key" must be generated with EG or similar (proc pwencode method=sas002 in="&amp;lt;the new password&amp;gt;"; run;) and also added to hq-server.conf file.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Next a new&amp;nbsp;server.keystore.password and&amp;nbsp;server.database-password had to be generated with jasypt tool like&lt;/P&gt;&lt;PRE&gt;./encrypt.sh password={sas002}xxxxx... input=&amp;lt;database-password/keystore-you-used-to-generate-java-keystore&amp;gt;&lt;/PRE&gt;&lt;P&gt;where "password" is the pwencoded value.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Note!&lt;/STRONG&gt; It is case sensitive so sas002 and SAS002 are not the same.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Note2!&lt;/STRONG&gt; Prefix {SAS002} itself is also a member of password so it must be included.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Note3!&lt;/STRONG&gt;&amp;nbsp;"server.keystore.password" and "server.database-password" must be encrypted or the tool provided won't work. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Next step would be to run the&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;../java -jar jasypttool.jar&lt;/PRE&gt;&lt;P&gt;and it does the magic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That's it. Maybe it is also possible without the jasypttool.jar tool manually or by some other script but.. i'm not sure. Maybe the jasypttool.jar decrypts the database values and re-encrypts again but why does it need&amp;nbsp;server.keystore.password parameter it that case.. (server.database-password is for accessing the database).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PL&lt;/P&gt;</description>
    <pubDate>Tue, 10 Nov 2020 12:47:49 GMT</pubDate>
    <dc:creator>PriitL</dc:creator>
    <dc:date>2020-11-10T12:47:49Z</dc:date>
    <item>
      <title>password and encryption-key parameters - EnvironmentManager hq-server.conf file</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/password-and-encryption-key-parameters-EnvironmentManager-hq/m-p/691252#M20390</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I currently have a passwords/passphrase renewal in progress.&lt;BR /&gt;In the server-5.8.0-EE/conf/hq-server.conf file there are three parameters that comes up with a question.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The first one is the "server.database-password" parameter which is for connecting to database and as the Deplyoment Wizard changed it by itself during password renewal process it works. So no problem with this one despite of fact that it is in java encrypted ENC() format and i don't know which passphrase was used to generate that. But i can live with that at the moment because at least it is renewed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now, the "server.keystore.password" and "server.encryption-key" are the problematic ones.&lt;/P&gt;&lt;P&gt;The "server.keystore.password" parameter is for server.keystore (java p12 certificate) file. If i want to change that i need to recreate a new p12 format certificate for EVM. But if i generate a new certificate i need to use an unencrypted password for this keystore in hq-server.conf file. So the first question is how can i generate ENC() format password for new certificate to use it as "server.keystore.password" parameter in server-5.8.0-EE/conf/hq-server.conf file?&lt;/P&gt;&lt;P&gt;At first i thought that maybe the second problematic parameter "server.encryption-key" is for&amp;nbsp;"server.keystore.password" and&amp;nbsp;"server.database-password" parameters as they are in java encrypted ENC format and the "server.encryption-key" is used as java encryption passphrase in SAS002 format. But.. no. At least with jasypt package i can't encrypt the hash that works for EVM service and decrypt for example "server.database-password" ENC format password with the passphrase (plain, of course) anything i can come to.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So the second question is that what for the "server.encryption-key" parameter is for and how can i change it? Are there any other parameter i have to change if i renew the "server.encryption-key" parameter?&lt;/P&gt;&lt;P&gt;I know that is still an old password as i can generate the same hash with Enterprise Guide from old password.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also have deleted the record&amp;nbsp;from eam_keystore from postgres database every time i change some parameter but still no luck.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2020 13:33:42 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/password-and-encryption-key-parameters-EnvironmentManager-hq/m-p/691252#M20390</guid>
      <dc:creator>PriitL</dc:creator>
      <dc:date>2020-10-13T13:33:42Z</dc:date>
    </item>
    <item>
      <title>Re: password and encryption-key parameters - EnvironmentManager hq-server.conf file</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/password-and-encryption-key-parameters-EnvironmentManager-hq/m-p/691305#M20396</link>
      <description>&lt;P&gt;I think you should engage support for this. Usually for the other Web Application servers SASServerX_X there is a secure file with the passphrase that is used to encode the passwords. I tried looking for some hyperic docs and could see some sections where the passphrase is generated randomly. I am not sure if that's the case for SAS EVM, but if it is then I don't know if you can figure that out any way.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If&amp;nbsp;&lt;SPAN&gt;server.encryption-key is SAS encrypted and you know which password it is, I think you can generate it yourself using PWENCODE?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2020 15:08:28 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/password-and-encryption-key-parameters-EnvironmentManager-hq/m-p/691305#M20396</guid>
      <dc:creator>AnandVyas</dc:creator>
      <dc:date>2020-10-13T15:08:28Z</dc:date>
    </item>
    <item>
      <title>Re: password and encryption-key parameters - EnvironmentManager hq-server.conf file</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/password-and-encryption-key-parameters-EnvironmentManager-hq/m-p/691465#M20400</link>
      <description>&lt;P&gt;Thanks for the reply.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To sum up, the currently working setup is:&lt;/P&gt;&lt;P&gt;server.keystore.password - currenlty for testing purposes plain text pw for java keystore (p12)&lt;/P&gt;&lt;P&gt;server.database-password - renewed password (changed by Deployment Manager wizard, ENC format&lt;SPAN style="font-family: inherit;"&gt;)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;server.encryption-key - SAS002 format &lt;STRONG&gt;old&lt;/STRONG&gt;&amp;nbsp;password&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, i can pwencode a new "server.encryption-key" but as i change it, EVM server won't come up. So it means that it is using it somewhere else and &lt;STRONG&gt;not&lt;/STRONG&gt; for java ENC format password as the "server.keystore.password" is plain text and "server.database-password" is renewed with password i don't know.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2020 06:47:37 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/password-and-encryption-key-parameters-EnvironmentManager-hq/m-p/691465#M20400</guid>
      <dc:creator>PriitL</dc:creator>
      <dc:date>2020-10-14T06:47:37Z</dc:date>
    </item>
    <item>
      <title>Re: password and encryption-key parameters - EnvironmentManager hq-server.conf file</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/password-and-encryption-key-parameters-EnvironmentManager-hq/m-p/691516#M20404</link>
      <description>I believe the server.encryption-key is the passphrase used to encode the passwords.</description>
      <pubDate>Wed, 14 Oct 2020 13:13:26 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/password-and-encryption-key-parameters-EnvironmentManager-hq/m-p/691516#M20404</guid>
      <dc:creator>gwootton</dc:creator>
      <dc:date>2020-10-14T13:13:26Z</dc:date>
    </item>
    <item>
      <title>Re: password and encryption-key parameters - EnvironmentManager hq-server.conf file</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/password-and-encryption-key-parameters-EnvironmentManager-hq/m-p/697881#M20666</link>
      <description>&lt;P&gt;For an update if anyone else also struggles with this kind of issue here's how it got solved.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The "server.encryption-key" parameter can't be changed without special tool. The problem is that&amp;nbsp;EAM_MEASUREMENT.DSN table (@WebInfrastructurePlatformDataServer) contains some ENC encrypted records and can't be changed because probably there might be thousands of those records.&lt;/P&gt;&lt;P&gt;The only solution is to get in touch with support and they provide a java tool for it. As it may be version dependent i can't put it here.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then the "server.encryption-key" value had to be renamed to "server.encryption-key-org" - this value will be read by the tool mentioned previously.&lt;/P&gt;&lt;P&gt;A new "server.encryption-key" must be generated with EG or similar (proc pwencode method=sas002 in="&amp;lt;the new password&amp;gt;"; run;) and also added to hq-server.conf file.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Next a new&amp;nbsp;server.keystore.password and&amp;nbsp;server.database-password had to be generated with jasypt tool like&lt;/P&gt;&lt;PRE&gt;./encrypt.sh password={sas002}xxxxx... input=&amp;lt;database-password/keystore-you-used-to-generate-java-keystore&amp;gt;&lt;/PRE&gt;&lt;P&gt;where "password" is the pwencoded value.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Note!&lt;/STRONG&gt; It is case sensitive so sas002 and SAS002 are not the same.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Note2!&lt;/STRONG&gt; Prefix {SAS002} itself is also a member of password so it must be included.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Note3!&lt;/STRONG&gt;&amp;nbsp;"server.keystore.password" and "server.database-password" must be encrypted or the tool provided won't work. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Next step would be to run the&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;../java -jar jasypttool.jar&lt;/PRE&gt;&lt;P&gt;and it does the magic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That's it. Maybe it is also possible without the jasypttool.jar tool manually or by some other script but.. i'm not sure. Maybe the jasypttool.jar decrypts the database values and re-encrypts again but why does it need&amp;nbsp;server.keystore.password parameter it that case.. (server.database-password is for accessing the database).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PL&lt;/P&gt;</description>
      <pubDate>Tue, 10 Nov 2020 12:47:49 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/password-and-encryption-key-parameters-EnvironmentManager-hq/m-p/697881#M20666</guid>
      <dc:creator>PriitL</dc:creator>
      <dc:date>2020-11-10T12:47:49Z</dc:date>
    </item>
  </channel>
</rss>

