PingAuthorize Server Documentation Index
Configuration Reference Home

Trust Store Backend

Note: this component has a complexity level of "expert", which means that objects of this type are not expected to be created or altered. Please contact support for assistance if you believe that you have a need to create or modify this type of object.

The Trust Store Backend provides an LDAP view of a file-based trust store. It is used by the administrative cryptographic framework.

Parent Component
Relations from This Component
Properties
dsconfig Usage

Parent Component

The Trust Store Backend component inherits from the Backend

Relations from This Component

The following components have a direct aggregation relation from Trust Store Backends:

Properties

The properties supported by this managed object are as follows:


General Configuration Basic Properties: Advanced Properties:
↓ description ↓ backend-id
↓ enabled ↓ base-dn
↓ writability-mode ↓ set-degraded-alert-when-disabled
↓ return-unavailable-when-disabled
↓ backup-file-permissions
Trust Store Configuration Basic Properties: Advanced Properties:
↓ trust-store-pin ↓ trust-store-file
↓ trust-store-pin-file ↓ trust-store-type
↓ trust-store-pin-passphrase-provider

Basic Properties

description

Property Group
General Configuration
Description
A description for this Backend
Default Value
None
Allowed Values
A string
Multi-Valued
No
Required
No
Admin Action Required
None. Modification requires no further action

enabled

Property Group
General Configuration
Description
Indicates whether the backend is enabled in the server. If a backend is not enabled, then its contents are not accessible when processing operations.
Default Value
None
Allowed Values
true
false
Multi-Valued
No
Required
Yes
Admin Action Required
None. Modification requires no further action

writability-mode

Property Group
General Configuration
Description
Specifies the behavior that the backend should use when processing write operations.
Default Value
enabled
Allowed Values
enabled - Allows write operations to be performed in that backend (if the requested operation is valid, the user has permission to perform the operation, the backend supports that type of write operation, and the global writability-mode property is also enabled).

disabled - Causes all write attempts to fail.

internal-only - Causes external write attempts to fail but allows writes by replication and internal operations.
Multi-Valued
No
Required
Yes
Admin Action Required
None. Modification requires no further action

trust-store-pin

Property Group
Trust Store Configuration
Description
Specifies the clear-text PIN needed to access the Trust Store Backend.
Default Value
None
Allowed Values
A string
Multi-Valued
No
Required
No
Admin Action Required
None. Changes to this property will take effect the next time that the Trust Store Backend is accessed.

trust-store-pin-file

Property Group
Trust Store Configuration
Description
Specifies the path to the text file whose only contents should be a single line containing the clear-text PIN needed to access the Trust Store Backend.
Default Value
None
Allowed Values
A filesystem path
Multi-Valued
No
Required
No
Admin Action Required
None. Changes to this property will take effect the next time that the Trust Store Backend is accessed.

trust-store-pin-passphrase-provider

Property Group
Trust Store Configuration
Description
The passphrase provider to use to obtain the clear-text PIN needed to access the Trust Store Backend.
Default Value
None
Allowed Values
The DN of any Passphrase Provider.
Multi-Valued
No
Required
No
Admin Action Required
None. Modification requires no further action


Advanced Properties

backend-id (Advanced Property, Read-Only)

Property Group
General Configuration
Description
Specifies a name to identify the associated backend. The name must be unique among all backends in the server. The backend ID may not be altered after the backend is created in the server.
Default Value
ads-truststore
Allowed Values
A string
Multi-Valued
No
Required
Yes
Admin Action Required
None. Modification requires no further action

base-dn (Advanced Property, Read-Only)

Property Group
General Configuration
Description
Specifies the base DN(s) for the data that the backend handles. A single backend may be responsible for one or more base DNs. Note that no two backends may have the same base DN although one backend may have a base DN that is below a base DN provided by another backend (similar to the use of sub-suffixes in the Sun Java System Directory Server). If any of the base DNs is subordinate to a base DN for another backend, then all base DNs for that backend must be subordinate to that same base DN.
Default Value
cn=ads-truststore
Allowed Values
A valid DN.
Multi-Valued
Yes
Required
Yes
Admin Action Required
No administrative action is required by default although some action may be required on a per-backend basis before the new base DN may be used. Although it is currently supported, the use of multiple base DNs per backend is not recommended and this capability may be removed in the future. If you are considering the use of multiple base DNs in a backend, you should first contact Ping Identity support to discuss this configuration

set-degraded-alert-when-disabled (Advanced Property)

Property Group
General Configuration
Description
Determines whether the PingAuthorize Server enters a DEGRADED state (and sends a corresponding alert) when this Backend is disabled.
Default Value
true
Allowed Values
true
false
Multi-Valued
No
Required
No
Admin Action Required
None. Modification requires no further action

return-unavailable-when-disabled (Advanced Property)

Property Group
General Configuration
Description
Determines whether any LDAP operation that would use this Backend is to return UNAVAILABLE when this Backend is disabled.
Default Value
true
Allowed Values
true
false
Multi-Valued
No
Required
No
Admin Action Required
None. Modification requires no further action

backup-file-permissions (Advanced Property)

Property Group
General Configuration
Description
Specifies the permissions that should be applied to files and directories created by a backup of the backend. They should be expressed as three-digit octal values, which is the traditional representation for UNIX file permissions. The three digits represent the permissions that are available for the file or directory's owner, group members, and other users (in that order), and each digit is the octal representation of the read, write, and execute bits. Execute permissions are only applied to directories. If the underlying platform does not allow the full level of granularity specified in the permissions, then an attempt will be made to set them as closely as possible to the provided permissions, erring on the side of security. Due to Java platform limitations, it may not be possible to set group member permissions independently of other user permissions, even on UNIX.
Default Value
700
Allowed Values
Any octal value between 700 and 777 (the owner must always have read, write, and execute permissions).

Example values
Value Synopsis
700 Grant the owner read, write and execute permissions. Deny all other users permissions.
750 Grant the owner read, write and execute permissions. Grant the group read and execute permissions. Deny all other users permissions.

Multi-Valued
No
Required
No
Admin Action Required
None. Modification requires no further action

trust-store-file (Advanced Property)

Property Group
Trust Store Configuration
Description
Specifies the path to the file that stores the trust information. It may be an absolute path, or a path that is relative to the PingAuthorize Server instance root.
Default Value
config/ads-truststore
Allowed Values
A filesystem path
Multi-Valued
No
Required
Yes
Admin Action Required
None. Modification requires no further action

trust-store-type (Advanced Property)

Property Group
Trust Store Configuration
Description
Specifies the format for the data in the key store file. Valid values should always include 'JKS' and 'PKCS12', but different implementations may allow other values as well.
Default Value
The JVM default value is used.
Allowed Values
A string
Multi-Valued
No
Required
No
Admin Action Required
None. Changes to this property take effect the next time that the key manager is accessed.


dsconfig Usage

To list the configured Backends:

dsconfig list-backends
     [--property {propertyName}] ...

To view the configuration for an existing Backend:

dsconfig get-backend-prop
     --backend-name {name}
     [--tab-delimited]
     [--script-friendly]
     [--property {propertyName}] ...

To update the configuration for an existing Backend:

dsconfig set-backend-prop
     --backend-name {name}
     (--set|--add|--remove) {propertyName}:{propertyValue}
     [(--set|--add|--remove) {propertyName}:{propertyValue}] ...