Security properties of jks and jceks keystore implementations

Hi,
could somebody point me to a description of the security properties of the jks and jceks keystore implementations, which allow me to judge how secure they are?
Thanks in advance!
Basti

http://java.sun.com/javase/6/docs/technotes/guides/security/crypto/CryptoSpec.html#KeyManagement
Both are only as strong as the password used to protect them. Apparently JKS is relatively weak, JCEKS is probably equivalent to a PKCS12 as both can use 3DES PBE.
If you want good private key storage you need to move to hardware tokens and the PKCS11 interface.

Similar Messages

  • Difference between .jks and KeyStore

    In WL_HOME/Server/lib, I see DemoIdentity.jks and DemoIdentityKeyStore files. What
    is the difference between the two? When do we use either of them?
    -John

    Weblogic installation contains DemoIdentity.jks and DemoTrust.jks keystores with
    certificates for the server default Demo configuration. As far as I know no DemoIdentityKeyStore
    file is included.
    Pavel.
    "john hryn" <[email protected]> wrote:
    >
    In WL_HOME/Server/lib, I see DemoIdentity.jks and DemoIdentityKeyStore
    files. What
    is the difference between the two? When do we use either of them?
    -John

  • Cwallet.sso failed even after changes made to cwallet security properties

    WARNING: Opening of wallet based credential store failed. Reason java.io.IOExcep
    tion: F:\oracle\middleware\user_projects\domains\obiee_domain\config\fmwconfig\b
    ootstrap\cwallet.sso (Access is denied)
    Oct 19, 2011 6:20:12 PM oracle.security.jps.internal.keystore.file.FileKeyStoreM
    anager openKeyStore
    WARNING: Opening of file based farm keystore failed.
    cwallet.sso failed even after changes made to cwallet security properties in bootstrap

    The user you logged in does not have permissions to access cwallet.sso file and hence, it says access denied. Try to check the permissions and add the user, who is trying to start weblogic server.
    -Vamsi

  • Changing security properties

    how do I change security properties in Adobe Reader X or in Acrobat.com? I can create pdf's and convert but my documents have no security.

    There is no mechanism for changing the security on a PDF file from within Acrobat.com. You can choose to make it private or public, but that's all.
    To add password protection, you'll need to use Adobe Acrobat.
    Hope this helps!

  • Security.properties & ejb.properties

    Hello!
    I have a Enterprise Application project deployed correctly in the J2EE Server (this project include a WEB Module Project and a EJB Module Project) ..
    When I'm validating into the web application, both following errors happens :
    java.io.FileNotFoundException: C:
    usr
    sap
    J2E
    JC00
    j2ee
    cluster
    server0
    config
    security.properties (El sistema no puede hallar la ruta especificada)#
    java.io.FileNotFoundException: C:
    usr
    sap
    J2E
    JC00
    j2ee
    cluster
    server0
    config
    ejb.properties (El sistema no puede hallar la ruta especificada)
    What is the way to create this files?
    Any help, please?
    Thanks

    Hi Carlos,
    I am having same issue. Could you tell me how did you solved the issue?
    Thanks,
    Parimal

  • Security.properties file issue - Need help

    Hi Friend,
    I am trying to setup SUN IDM connection pool and getting this error. Can some one help me how to fix this issue.
    java.io.FileNotFoundException: C:\Sun\AppServer\config\security.properties (The
    system cannot find the file specified)
    at java.io.FileInputStream.open(Native Method)
    at java.io.FileInputStream.<init>(FileInputStream.java:106)
    at com.sun.enterprise.util.Utility.getPropertiesFromFile(Utility.java:42
    at com.sun.enterprise.iiop.POAEJBORB.<clinit>(POAEJBORB.java:78)
    at java.lang.Class.forName0(Native Method)
    at java.lang.Class.forName(Class.java:242)
    at org.omg.CORBA.ORB.create_impl(ORB.java:295)
    at org.omg.CORBA.ORB.init(ORB.java:336)
    at com.sun.enterprise.util.ORBManager.createORB(ORBManager.java:138)
    at com.sun.enterprise.util.ORBManager.init(ORBManager.java:65)
    at com.sun.enterprise.naming.SerialInitContextFactory.<init>(SerialInitC
    ontextFactory.java:31)
    at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
    at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstruct
    orAccessorImpl.java:39)
    at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingC
    onstructorAccessorImpl.java:27)
    at java.lang.reflect.Constructor.newInstance(Constructor.java:494)
    at java.lang.Class.newInstance0(Class.java:350)
    at java.lang.Class.newInstance(Class.java:303)
    at javax.naming.spi.NamingManager.getInitialContext(NamingManager.java:6
    54)
    at javax.naming.InitialContext.getDefaultInitCtx(InitialContext.java:247
    at javax.naming.InitialContext.init(InitialContext.java:223)
    at javax.naming.InitialContext.<init>(InitialContext.java:197)
    at com.waveset.util.JdbcUtil.getDataSourceObject(JdbcUtil.java:571)
    at com.waveset.repository.RelationalDataStore.setupJdbc(RelationalDataSt
    ore.java:3834)
    at com.waveset.repository.RelationalDataStore.init(RelationalDataStore.j
    ava:3779)
    at com.waveset.install.RepoMan.check(RepoMan.java:1194)
    at com.waveset.install.RepoMan.setRepo(RepoMan.java:1082)
    at com.waveset.install.RepoMan.main(RepoMan.java:1314)
    at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
    at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.
    java:39)
    at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAcces
    sorImpl.java:25)
    at java.lang.reflect.Method.invoke(Method.java:585)
    at com.waveset.util.CommandProcess.invokeMain(CommandProcess.java:212)
    at com.waveset.util.CommandProcess.launch(CommandProcess.java:162)

    Hi rhayn, I think you're getting confused about what "file sharing" really is used for. You need to say to yourself "do I want someone on another machine to access these files?" If yes, you need file sharing; if no, forget about it.
    So, the second user, are they on another machine or are they using the same mac as you?
    Just as in windows, when you share a folder over the network, you can set different permissions on the "share" compared to the permissions on the files and folders themselves. In all cases, the most restrictive permissions apply. Therefore if you give read/write to the shared folder (the "share"), but a folder is read only (to the second user), they will be able to view the list of files in that folder, but not open them (equivalent to the windows permission called "list folder contents"). If the folder was read/write, the second user can create files and edit them. If the folder is read/write and existing files are read only, they can open them but not save changes. Where OS X differs from windows is the mechanism for setting permissions; OS X uses the unix/posix permission system. In addition, if you are the owner of the folder or file, you can always do anything with the folder or file.
    All of the above paragraph is only information you need to use IF the other user is connecting to your mac from ANOTHER computer across a network.

  • Viewing/setting java security properties

    I am using a thrid party utility that is calling InetAddress.getLocalHost(). After checking the performance from JProfiler, I observed that this method poor at performance. Javadoc mentions that INetAddress is cached which is controlled by two java security properties: networkaddress.cache.ttl  and networkaddress.cache.negative.ttl. How do I view this property value and change it if required?

    I have done a little bit of more research in Java forums regarding setting these system properties. It looks like setting them is the only option to be able to connect to a Glassfish AS running on a seperate server, as the driver classes check this property at runtime to determine the host.
    So I am basically left with the only choice of finding a convenient way to set these properties properly per communication channel, but unfortunately, I still am not able to find how.
    Kind Regards,
    S. Gökhan TOPÇ

  • CIFS, not showing security properties

    When attempting to view the security properties of a remote share we get an error message that says, "Unable to display security information".  This happens when bringing up a remote server via UNC path, right clicking on a share or folder, and selecting the security tab.  This only happens when viewing them through an optimized connection.  If the domain admin remotes directly to that server, or another server at the same location, they are able to browse the properties fine.
    We're using 4.1.3 and have disabled legacy WAFS services.  All of our CIFS traffic is going through the CIFS accelerator.  Couple of questions:
    -Isn't the CIFS accelerator supposed to be transparent and pass this information along?
    -Do the WAE's still need to be joined to the domain?  I though this was a legacy WAFS function
    -I did packet captures on both ends of the connection (and on the WAE) but didn't see anything obvious in the way of errors, any specific thing I can look for?
    Thanks!

    In the failed trace, note that the NT Security Descriptor Length in frame 392 is 0, whereas in the working trace it is >0.  This looks like bug CSCtg28040, which is fixed in the WAAS 4.1.5f release.  Can you confirm that you have installed Microsoft patch MS10-020 (KB980232)?
    Thanks again for the traces.
    Regards,
    Zach

  • Need RICEF Security specfifications for Interfaces and Conversions

    Hi All,
    I need RICEF security specfications for Interfaces and Conversions. Can anyone provide any input on this.
    Regards
    Plaban

    Hi Plaban,
    Thanks for the detailed explanation. As mentioned, as per my knowledge there is no specific guideline/template that you may adapt while designing the security design for the Interfaces and Conversions.
    However, the most common issues that occurs with IDOCs is with file interfaces are related to file permissions, file ownership and character conversions moving between platforms.
    Ensure that the appropriate authorization (read/write and with filters) authorization is provided. Identify the various levels of authorizations required and implement the same.
    Further, most issues with ALE interfaces are with RFC user ID permissions. Ensure that the appropriate and only the Required authorization is provided to these IDs. This way you can tighten the authorization to the specific level. You may need to completely test the functionality before implementing this.
    It is always important to understand these limitations during the functional design. If any specific additional functionality is required, you may need to have a custom based solution.
    Hope this answers your question!!
    Warm Regards,
    Raghu

  • Security.core.useradmin.war AND configtool: Experts Advise Needed

    Hi,
    It is said in help.sap.com, there exists a way to make available only a few languages in the portal like in SDN at http://help.sap.com/saphelp_nw04/helpdata/en/49/e607426338da6fe10000000a1550b0/frameset.htm.
    It mentions, extract the languages to be made available say en,de and edit these properties files.
    Next it mentions that we should remove from the com.sap.security.core.useradmin.war file all the languages to be removed.
    Then, I have the confusing part; it says in config tool go to com.sap.security.core.ume.service and upload one by one all the languages_XX properties files.
    My question is do we have to upload all or only the ones we EXTRACTED for modification mentioned earlier?
    Secondly, if we removed the languages we dont want from the WAR file, what do we do with that file? It does not mention about uploading that file and its containing EAR file at all? How then will the change be reflected?
    If any of you have an idea about this and tried it out, please help me.

    According to this <a href="http://java.sun.com/j2se/1.4.2/docs/api/java/util/Locale.html">Sun Java site</a>, you can create a Locale with:
    Locale(String language)
    Locale(String language, String country)
    Locale(String language, String country, String variant)
    HTH

  • Training and Event Management Implementation based on competencies

    Dear Friends,
    My client is going ahead for Training and Event Managment Implementation. They have a basic requirement to start with and that is :
    1) They have done competency mapping for all its employees and they want that the competencies of each employees(along with the skill levels) to be recorded in the system and that has to be the starting point of using Training and Event Management module.
    2) They want, if the competencies can flow based on Job/ Position.
    3) Some identifier to the competencies, whther it has flowed from Appraisal or any other sources in the Final Training Needs.
    Kindly provide me help, as to how I will be able to achieve that and in what Infotypes the data pertaining to Training and Event Managment will be stored.
    If u all can kindly share with me the User Manuals and Configuration Docs of Training and Event Management, it will be of great help.
    Thank you all.

    Hi,
    Competencies can be stored as qualifications in PD and then by activation of PD PA intergration can be seen from pa30 infotype 24.
    Qualifications can be stored against a Job/Position and are called as the Requirements. They are seen as a separate Tab and to which ever position the person is linked to the corresponding qualifications of the position will appear in the requirements tab.
    You can maintain the proficiency and a note along with the qualification when assigned to a person.
    Also Appraisals can have qualifications in the template rather than criteria and criteria groups.
    Also after training is completed during the follow up we can create an appraisal and transfer the qualifications or simply transfer the qualifications to the employee.
    Regards,
    Divya

  • How many types of authentications in sharepoint and how to implement those authentication in sharepoint?

    Hi All,
    How many types of authentications in sharepoint and how to implement those authentication in sharepoint?
    can any one explain the above things with examples?
    Thanks in Advance!

    In addition to
    A Sai Gunaranjan you can also check this URL for Sharepoint 2010:
    http://technet.microsoft.com/en-us/library/cc288475(v=office.14).aspx
    http://www.codeproject.com/Tips/382312/SharePoint-2010-Form-Based-Authentication
    ***If my post is answer for your query please mark as answer***
    ***If my answer is helpful please vote***

  • HT5312 I didn't make a rescue e-mail and now i forgot the answers of my security questions!!' And the apple support contact wont open???

    I didn't make a rescue e-mail and now i forgot the answers of my security questions!!' And the apple support contact wont open???

    I'm not sure what you mean by the 'apple support contact wont open' (?). If you mean the 'contact iTunes Store support' link on the page that you posted from I've just tried it and it seems to wok ok for me, though I haven't gone as far as to actually contact them.
    You can contact either iTunes Support or Apple to get the questions reset.
    e.g. you can try contacting iTunes Support : http://www.apple.com/support/itunes/contact/ - click on Contact iTunes Store Support on the right-hand side of the page, then Account Management , and then 'Forgotten Apple ID security questions'
    or try ringing Apple in your country and ask to talk to the Accounts Security Team : http://support.apple.com/kb/HE57
    When they've been reset you can then use the steps on the page that you posted from to add a rescue email address for potential future use, or if it's available in your country you could change to 2-step verification : http://support.apple.com/kb/HT5570

  • Connecting DVR to Airport Extreme for remote viewing of my home 16 camera system. I have tried for 2 days and still stuck. I have secured a dyndns account and have had no luck for 2 days. A detailed list for an amateur would be much appreciated.

    I have been trying for 2 days to connect my home camera dvr to the internet through my Airport Extreme. I have read several previous posts on this topic and have not been able to get this completed. I secured a Dyndns account and registered a host domain. I am not clear on which ip address to use and really which is which. Seems like the ip address for the router is different from the ip address that showed up when I secured my dyndns host name. I used the one that was listed on the signup that staed " your ip address is". I have read up on port forwarding and watched UTube and still no luck. Can someone walk me through a steo by step process on how to get this completed? I want to be able to watch my cameras from my iphone, ipad, macbook pro and the internet. I do have a manual that came with the DVR but it seems everything is setup for Windows and a different router, seems like the AE router had different settings. I can usually figure these things out eventually but I am really stuck this time. Any help at all would be greatly appreciated. Thank you in advance for any help you can offer.

    Have you had any luck? I am currently attempting to do the same thing and running into similar issues.

  • I have no clue as to what my security question answers are and since this is my first purchase from my mac book it is asking for these. What do i do?

    I have no clue as to what my security question answers are and since this is my first purchase from my mac book it is asking for these. What do i do?

    You won't be able to change your rescue email address until you can answer 2 of your questions, you will need to contact iTunes Support / Apple to get the questions reset.
    Contacting Apple about account security : http://support.apple.com/kb/HT5699
    When they've been reset you can then use the steps half-way down this page to update your rescue email address for potential future use : http://support.apple.com/kb/HT5312

Maybe you are looking for

  • Viewing animated gifs in preview

    Anyway to view animated gifs in preview, or is there just some "play" or "animate" button i'm just not seeing?

  • Envy 15 - No audio able to be heard, despite volume mixer showing activity.

    I have a HP ENVY 15 Notebook PC (LW897AV), running Windows 7 Home Premium 64-bit Service Pack 1.  It is only a little over a year old as I got it in June 2012, so is still under warranty.  Obviously I'd rather not send it back in if I don't have to. 

  • Ipad Air WIFI problem with router

    I keep losing my WIFI when downloading apps or on too long.  From what I've been reading, it's a router problem.  People have suggested changing my router settings, but I don't know to what.  I have a D-Link DIR-615 draft 802.11N router that I've had

  • Image links creates border?

    When I attach links to images I get a border around entire image. I've checked and there is no border being applied. Is there a way to eliminate the border when you have an image being used as a link?

  • Anyone use this function in the spreadsheet?

    Hi Folks, I've used the equivalent of the BITLSHIFT function in programming but never in the spreadsheet, can anyone tell me an application of this in the spreadsheet.  This function is new in 2013. TIA, Shane If this answer solves your problem, plea