Enabling Encryption Between Primavera Gateway and P6 Adapter

To ensure all requests and responses between Primavera Gateway and P6 Adapter are encrypted:

  1. Create a Keystore file:
    1. Create a folder, for example, C:\keystore.
    2. Create a keystrore with the private key. For example, by using the Java keytool genkey command. From the command line, execute:

      keytool -genkey -alias <alias_name> -keyalg RSA -sigalg SHA1withRSA -keypass <keyPassword> -storepass <storePassword> -keystore <keystore file location>

      Where:

      <alias> is the key alias

      <keyPassword> is the password of the private key

      <storePassword> is the password of the keystore

      For example:

      keytool -genkey -alias myAlias -keyalg RSA -sigalg SHA1withRSA -keypass myPassword -storepass myPassword -keystore c:\keystore\keystore.jks

    3. Enter information for each of the following questions:
      • What is your first and last name?

        Enter the Gateway host name.

      • What is the name of your organization?
      • What is the name of your city or locality?
      • What is the name of your State or Province?
      • What is the two-letter country code for this unit? For example, US.
      • Is CN=<Gateway host name>, OU=<organization unit name>, O=<organization name>, L=<location>, ST=<state code>, C=<country code> correct? Enter Y or N.

        Note: If P6Adapter is deployed on other than a Gateway machine, then copy the keystore folder with keystore.jks to the P6Adapter machine.

  2. In the Gateway user interface, select the Configuration tab and enter deployment information for P6.
  3. In P6 EPPM administration application, enter the keystore information that was entered in the Keystore file. The values must be identical.
  4. In the P6 EPPM administration application, modify the message protection node setting as follows:
    • Require Timestamp: True
    • Require Digital Signature for Incoming Messages: True
    • Require Encryption for Incoming Messages: True
    • KeyStore Type: JKS
    • File Location: c:\keystore\keystore.jks
    • KeyStore Password: <password for the keystore file provided in keytool command>
    • Private Key Alias: <alias name provided in keytool command>
    • Private Key Password: <private key password for the keystore file provided in the keytool command>
    • Encrypt Response: True
  5. After encryption is set, restart the P6 adapter domain in WebLogic.

Related Topics

Configuring the P6 Deployment Target



Legal Notices
Copyright © 2013, 2015, Oracle and/or its affiliates. All rights reserved.

Last Published Wednesday, March 25, 2015