KeyMaster configuration
These DataSource configuration items allow a DataSource application to work with KeyMaster.
Use these configuration items to set up Liberator, Transformer and C-based Integration Adapters so they can work with KeyMaster. KeyMaster is used to authenticate user logins to Liberator via a single sign-on facility. It can also be used to authenticate monitoring connections to Liberator, Transformer and C-based Integration Adapters.
KeyMaster can’t be used in Java-based DataSource applications, so these configuration items don’t apply to them. |
add-sigkey
add-sigkey
specifies the properties of a signature key.
Use in: C
Syntax:
add-sigkey hashing-algorithm [integer/string] key-id [string] keyfile [string] timeout [float] end-sigkey
- hashing-algorithm
-
Type: integer/string | Default:
0
The algorithm to use for validating the digital signature in user credentials tokens provided by KeyMaster.
The hashing algorithms that DataSource applications can use are:
-
md5
or0
: MD5 algorithm -
sha256
or1
: SHA256withRSA algorithm -
sha384
or2
: SHA384 algorithm -
sha512
or3
: SHA512 algorithm -
sha1
or4
: SHA1 algorithm -
ripemd160
or5
: RIPEMD160 algorithm
Pick the setting that corresponds to the algorithm used by your KeyMaster Signature Generator.
-
- key-id
-
Type: string | Default: null
A name identifying the signature key.
If you’re setting up KeyMaster for Liberator, and the Liberator is using the XMLauth authentication module, the
key-id
must correspond to asigkey-id
attribute in the XMLauth users.xml configuration file.(For more about XMLauth, see Liberator user authentication and permissioning.)
- keyfile
-
Type: string | Default: null
The filename and path of the DER (binary) format public key file.
The directory path can contain the parameter
%r
, which is replaced at run time by the root directory under which this DataSource application runs. - timeout
-
Type: float | Default:
0.0
The length of time in seconds for which a user credentials token is valid.
This overrides the signature-validtime configuration item.
add-sigkey key-id testkey keyfile %r/etc/publickey.der hashing-algorithm sha256 timeout 300 end-sigkey
signature-hashsize
signature-hashsize
specifies the size in buckets of the hash table for storing signature keys.
Use this configuration item to tune the Liberator’s performance when authorizing users; set it to twice the number of user credentials tokens that are likely to be created within the configured time out period (as defined by the configuration item signature-validtime and the timeout option of add-sigkey).
Use in: C
Syntax: signature-hashsize <hash-table-size-in-buckets>
Type: integer
Default value: 8192
Values accepted:
Minimum: 1024
signature-validtime
signature-validtime
specifies the length of time in seconds for which a user credentials token is valid. This timeout applies to any user credentials token that doesn’t have a specific timeout configuration item defined for it in the timeout option of an add-sigkey item.
Use in: C
Syntax: signature-validtime <time-in-seconds>
Type: float
Default value: 600.0
(= 10
minutes)
See also: