> However, where/how do I install the certificates I'll be given for use?

The JDK keytool can be used to create the JKS artifacts you need.

On Tue, Jul 5, 2022 at 11:33 PM Russell Bateman <r...@windofkeltia.com> wrote:
>
> I appreciate the responses. I will try out the canonical
> /StandardSSLContextService/ first (since that's what I am using with
> Kafka), then imitate the other sample depending.
>
> However, where/how do I install the certificates I'll be given for use?
> I would expect something for certain representing the third-party
> service in a truststore and maybe another (a private key) in a keystore.
>
>
> On 7/5/22 16:30, Russell Bateman wrote:
> > From a custom processor, I intend to interface with a third-party
> > service (via simple HTTP client), however, I would need as I
> > understand it to
> >
> >     a) maintain a private key by which I can identify myself to that
> >     third-party service and
> >     b) maintain a trusted-store certificate by which I can guarantee
> >     the identity of the service.
> >
> > This is pretty far outside my own experience. I have been reading on
> > how this is achieved in Java, but in my mind a complication arises
> > from the fact that a custom NiFi processor lives within NiFi's JVM. My
> > question is therefore, how can I control the certificates and
> > authorities for my use in or associated with NiFi's JVM. Clearly, I
> > don't grok this well enough even to ask the question; I'm hoping
> > someone can see through what I'm asking and point me in a good
> > direction to study.
> >
> > I've written a pile of successful and useful custom NiFi processors to
> > cover proprietary needs, so custom-processor writing isn't a mystery.
> > Certificates, keys, trusts and security in general still is.
> >
> > Profuse thanks,
> >
> > Russ

Reply via email to