Skip to content

Commit

Permalink
Merge pull request #6253 from syedsalman3753/pla-1.2.0.1
Browse files Browse the repository at this point in the history
[DSD-4578] Updated kernel-default.properties for PKCS12
  • Loading branch information
syedsalman3753 authored May 24, 2024
2 parents ba84e4c + 114cdb7 commit 8adb313
Show file tree
Hide file tree
Showing 2 changed files with 777 additions and 5 deletions.
10 changes: 5 additions & 5 deletions kernel-default.properties
Original file line number Diff line number Diff line change
Expand Up @@ -73,11 +73,11 @@ spring.servlet.multipart.max-file-size=5MB

## Keymanager service
#Type of keystore, Supported Types: PKCS11, PKCS12, Offline, JCE
mosip.kernel.keymanager.hsm.keystore-type=PKCS11
mosip.kernel.keymanager.hsm.keystore-type=PKCS12
# For PKCS11 provide Path of config file.
# For PKCS12 keystore type provide the p12/pfx file path. P12 file will be created internally so provide only file path & file name.
# For Offline & JCE property can be left blank, specified value will be ignored.
mosip.kernel.keymanager.hsm.config-path=/config/softhsm-application.conf
mosip.kernel.keymanager.hsm.config-path=/home/mosip/config/keys.p12
# Passkey of keystore for PKCS11, PKCS12
# For Offline & JCE proer can be left blank. JCE password use other JCE specific properties.
mosip.kernel.keymanager.hsm.keystore-pass=${softhsm.kernel.security.pin}
Expand Down Expand Up @@ -345,11 +345,11 @@ mosip.kernel.partner.allowed.domains=AUTH,DEVICE,FTM,MISP
mosip.kernel.keymanager.autogen.appids.list=ROOT,KERNEL:SIGN,PRE_REGISTRATION,REGISTRATION,REGISTRATION_PROCESSOR,ID_REPO,KERNEL:IDENTITY_CACHE,RESIDENT,PMS,ADMIN_SERVICES,DIGITAL_CARD,COMPLIANCE_TOOLKIT

## Random keys required for ZK encrypt.
zkcrypto.random.key.generate.count=10000
zkcrypto.random.key.generate.count=0



mosip.kernel.keymanager.autogen.basekeys.list=RESIDENT:mpartner-default-resident,COMPLIANCE_TOOLKIT:COMP-FIR
mosip.kernel.keymanager.autogen.basekeys.list=

# Keymanager service keystore cache properties
mosip.kernel.keymanager.keystore.keyreference.enable.cache=false
Expand Down Expand Up @@ -433,7 +433,7 @@ scheduling.job.cron=0 0 2 * * ?
#To fetch user details based on user id and user name in zone API's
zone.user.details.url=${mosip.kernel.authmanager.url}/v1/authmanager/userdetails

auth.server.admin.allowed.audience=mosip-toolkit-android-client,mosip-toolkit-client,mosip-regproc-client,mosip-prereg-client,mosip-admin-client,mosip-crereq-client,mosip-creser-client,mosip-datsha-client,mosip-ida-client,mosip-resident-client,mosip-reg-client,mpartner-default-print,mosip-idrepo-client,mpartner-default-auth,mosip-syncdata-client,mosip-masterdata-client,mosip-idrepo-client,mosip-pms-client,mosip-hotlist-client,mobileid_newlogic,opencrvs-partner,mosip-deployment-client,mpartner-default-digitalcard,mpartner-default-mobile,mosip-signup-client
auth.server.admin.allowed.audience=mosip-toolkit-android-client,mosip-toolkit-client,mosip-regproc-client,mosip-prereg-client,mosip-admin-client,mosip-crereq-client,mosip-creser-client,mosip-datsha-client,mosip-ida-client,mosip-resident-client,mosip-reg-client,mpartner-default-print,mosip-idrepo-client,mpartner-default-auth,mosip-syncdata-client,mosip-masterdata-client,mosip-idrepo-client,mosip-pms-client,mosip-hotlist-client,mobileid_newlogic,opencrvs-partner,mosip-deployment-client,mpartner-default-digitalcard,mpartner-default-mobile,mosip-signup-client,mosip-migration-client
mosip.iam.adapter.appid=admin
mosip.iam.adapter.clientid=mosip-admin-client
mosip.iam.adapter.clientsecret=${mosip.admin.client.secret}
Expand Down
Loading

0 comments on commit 8adb313

Please sign in to comment.