Skip to main content


         This documentation site is for previous versions. Visit our new documentation site for current releases.      
 

This content has been archived and is no longer being updated.

Links may not function; however, this content may be relevant to outdated versions of the product.

Creating Java keystores and truststores for Cassandra encryption

Updated on March 11, 2021

This content applies only to On-premises and Client-managed cloud environments

Enable internal and external Cassandra encryption by creating Java keystores and truststores along with SSL certificates.

  1. Create the keystore.shared file by running the following command: keytool -genkey -keyalg RSA -alias shared -validity 36500 -keystore keystore.shared -storepass cassandra -keypass cassandra -dname "CN=None, OU=None, O=None, L=None, C=None" where cassandra is the password the certificate.
  2. Export the SSL certificate from the keystore.shared file to the shared.cer file by running the following command: keytool -export -alias shared -file shared.cer -keystore keystore.shared -storepass cassandra where cassandra is the password the certificate.
  3. Create the truststore.shared file and import the SSL certificate to that file by running the following command: keytool -importcert -v -trustcacerts -noprompt -alias shared -file shared.cer -keystore truststore.shared -storepass cassandra where cassandra is the password the certificate.
  • Previous topic Prconfig properties for Cassandra cluster encryption
  • Next topic Configuring a Cassandra cluster for external encryption

Have a question? Get answers now.

Visit the Support Center to ask questions, engage in discussions, share ideas, and help others.

Did you find this content helpful?

Want to help us improve this content?

We'd prefer it if you saw us at our best.

Pega.com is not optimized for Internet Explorer. For the optimal experience, please use:

Close Deprecation Notice
Contact us