AES security
There are two ways to secure passwords in PDI: Kettle obfuscation or Advanced Encryption Standard (AES). Kettle obfuscation is applied by default, or you can use AES to increase security. The password security method you choose is applied to all passwords including those in database connections, transformation steps, and job entries.
To learn more about AES, see http://en.wikipedia.org/wiki/Advanced_Encryption_Standard.
Note: If you switch password security methods, all existing passwords will also use the new method.
Install the Java Cryptography Extension (JCE)
Back up the files in your
lib/security
folder for the instance of Java that your instance of Pentaho is using. The exact location of the folder depends on whether you are pointing to a standalone version of the JDK or JRE, or whether you are using the version of Java that is bundled with the Wizard.Wizard:
<pentaho installation directory>/java/lib/security
JDK:
<java jdk installation directory>/jre/lib/security
JRE:
<java jre installation directory>/lib security
Download the "Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files" from the Oracle website:
http://www.oracle.com/technetwork/java/javase/downloads/index.html Make sure that you download the version of the JCE that corresponds with your Java version. For example, if you are using Java 8, download JCE 8. See the JDBC drivers reference in the Try Pentaho Data Integration and Analytics document for the version of Java that Pentaho supports.
Stop the server.
Unzip the JCE files and copy the
local_policy.jar
andUS_export_policy.jar
files into thelib/security
folder.Restart the server.
Create the AES key file.
Note: Country restrictions may apply when using higher encryption strengths. To learn more about the JCE, see the Oracle site.
To use 192-bit or 256-bit encryption strengths with Java 8, you must install the Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy files. If you only want to use 128-bit encryption or you are using Java 11, proceed to Create an AES key file.
Create an AES key file
The key file is a text file that contains the encryption key.
Create a text file that contains a key phrase, such as !@ExampleKey#123.
Leading and trailing white spaces are ignored.
Save and close the file.
Note: Safeguard the key file. If the key file becomes corrupted or lost, passwords cannot be decrypted.
Specify AES variables in kettle.properties
Set AES-specific variables in the kettle.properties
file for Spoon, the Pentaho Server, and any clusters.
Open the
kettle.properties
file for Spoon. By default, thekettle.properties
file is in the user’s home directory.Add the following variables and values.
Variable
Description
Value
KETTLE_PASSWORD_ENCODER_PLUGIN
Required
Indicates the type of plugin used.
AES
KETTLE_AES_KEY_FILE
Required
Indicates the path to the key file.
Path to the key file. Relative paths are resolved against the Kettle working directory, NOT the location of the kettle.properties
file. Example: c:/securearea/keyfile.txt
KETTLE_AES_KETTLE_PASSWORD_HANDLING
(Optional)
Maintain backwards compatibility by setting this variable to Decode
. If this is not set, Kettle encoded passwords are not decoded.
DECODE
3. Save and close the `kettle.properties` file.
Repeat this process for other
kettle.properties
files on the Pentaho Server and cluster nodes.You might need to stop and restart Spoon, Pentaho Server, and the cluster nodes for the
kettle.properties
file to take effect.
Configure Pentaho for AES encryption
You must configure Tomcat for AES encryption.
Perform the following steps to configure Tomcat:
Navigate to the
server\pentaho-server\tomcat\webapps\pentaho\WEB-INF\classes
directory and open thekettle-password-encoder-plugins.xml
file with any text editor.Add or uncomment the following code:
<password-encoder-plugin id="AES"> <description>AES Password Encoder</description> <classname>org.pentaho.support.encryption.AESTwoWayPasswordEncoder</classname> <default-encoder>true</default-encoder> </password-encoder-plugin>
Save and close the file.
Tomcat is configured for AES encryption.
Navigate to the
design-tools\data-integration\classes
directory and open thekettle-password-encoder-plugins.xml
file with any text editor.Add or uncomment the following code:
<password-encoder-plugin id="AES"> <description>AES Password Encoder</description> <classname>org.pentaho.support.encryption.AESTwoWayPasswordEncoder</classname> <default-encoder>true</default-encoder> </password-encoder-plugin>
Save and close the file.
PDI client is configured for AES encryption.
Create encrypted AES password
Perform the following steps on the machine with the Pentaho Server to create an encrypted AES password.
From a command line, navigate to the
server/pentaho-server
directory.Run the following command according to your environment type and desired password:
Windows:
encr.bat -aes <password>
Linux:
encr.sh -aes <password>
An encrypted password is created and displays in the console window.
Verify correct application
After you have applied AES Password encryption, test to make sure it works properly:
Start Spoon.
Create a blank transformation.
Add a database connection that requires a password.
See the Install Pentaho Data Integration and Analytics document for instructions on defining a database connection.
Save, then close the transformation.
Use a text editor to open the transformation you just saved, then search for the name of the connection you created.
Examine the password.
If the password is preceded by the letters AES, the encryption was applied correctly.
Close the transformation.
Last updated
Was this helpful?