Close popover

Table of Contents

Configuring a HashiCorp Vault keystore

Version:

Configure a keystoreby referencing an encryption key that is stored in a HashiCorp Vault.

You must Creating a keystore for application data encryption data instance in Pega Platform with Keystore location equal to HashiCorp Vault before you can configure the keystore.
  1. If you have not yet defined your cryptographic key in HashiCorp Vault, log in to your HashiCorp Vault account and create an encryption key. The key should be accessible with the AppRole authentication method. For details, see your HashiCorp Vault documentation and the Pega Community article Configuring a HashiCorp Vault keystore.

  2. Open a keystore from the navigation panel by clicking Records Security Keystore and selecting a HashiCorp Vault keystore from the instance list.

  3. In the AppRole Role ID field, enter the Role ID for accessing Vault with the AppRole authentication method.

  4. In the AppRole Secret ID field, enter the Secret ID for accessing Vault with the AppRole authentication method.

  5. In the Authentication service endpoint field, enter the endpoint (URL) for accessing Vault with the AppRole authentication method.

  6. In the Encryption service endpoint field, enter the endpoint (URL) for encryption that uses your Vault encryption key.

  7. In the Decryption service endpoint field, enter the endpoint (URL) for decryption that uses your Vault encryption key.

  8. In the Customer data key rotation in days field, enter the number of days after which the customer data key (CDK) rotates.

    The recommended (default) value is 90 days. You can set the rotation to any time between 30 and 365 days.
  9. Click Test connectivity to verify that all fields are filled out correctly and that Pega Platform can connect to Key Vault and find your encryption key.

  10. Click Save.

  • Keystores

    A keystore is a file that contains keys and certificates that you use for encryption, authentication, and serving content over HTTPS. In Pega Platform, you create a keystore data instance that points to a keystore file.

  • Creating a keystore for application data encryption

    Create a keystore instance for your keystore file, which contains the keys and certificates that are used, for example, to support Web Services Security and outbound email security.

Suggest Edit

Have a question? Get answers now.

Visit the Collaboration Center to ask questions, engage in discussions, share ideas, and help others.