Encrypting the Shared Secret
Passwords exist in the ScanCentral Controller
Server that receives the Fortify Static Code Analyzer mobile build sessions and scan instructions from the ScanCentral SAST clients (or project packages with translation and scan instructions), routes the information to ScanCentral SAST sensors, and (optionally) uploads scan results (FPR files) to Fortify Software Security Center. and sensor configuration files as plain text. If you prefer to encrypt your passwords, you can.
You can use encrypted keys as values for:
worker_auth_token,smtp_auth_pass,ssc_scancentral_ctrl_secret,lim_license_pool_password,lim_proxy_password, andlim_proxy_userproperties in theconfig.propertiesfile on the Controllerworker_auth_tokenproperty in theworker.propertiesfile on a sensorclient_auth_tokenproperty in theclient.propertiesfile on a client
Requesting program or user in a client/server relationship. For example, the user of a web browser is effectively making client requests for pages from servers all over the web. The browser itself is a client in its relationship with the computer that is getting and returning the requested HTML file. The computer handling the request and sending back the HTML file is a server.
Encrypting the Shared Secret on the Controller
To encrypt a shared secret on the Controller:
-
Run one of the following:
- On a Windows system,
<controller_dir>/bin/pwtool.bat <pwtool_keys_file> - On a Linux system,
<controller_dir>/bin/pwtool <pwtool_keys_file>
- On a Windows system,
-
When prompted, type the password to encode, and then press Enter.
Note: For the sake of security, make sure that the pwtool key file you use to encrypt secrets for sensors is different from the pwtool key file you use to encrypt secrets on the Controller.
The pwtool generates a new key stored in the file on the path specified in step 1, or reuses an existing file on specified path.
-
Copy the new encrypted secret, and paste it as the value for one of the following properties in the
config.propertiesfile:worker_auth_tokensmtp_auth_passssc_scancentral_ctrl_secret-
client_auth_token
Tip: Fortify recommends that you assign separate, unique shared secrets for the
worker_auth_token,smtp_auth_pass, andssc_scancentral_ctrl_secretproperties. - Create two additional encrypted shared secrets (steps 1 and 2) and, in the
config.propertiesfile, paste these as values for the two properties to which you did not already assign an encrypted secret in step 3. -
Uncomment the following line (property) in the
config.propertiesfile:pwtool_keys_file=<pwtool_keys_file> - Save the
config.propertiesfile.
Encrypting the Shared Secret on a Sensor
To encrypt a shared secret on a sensor:
-
Run one of the following:
- On a Windows system,
<sca_install_dir>\bin\pwtool.bat <pwtool_keys_file> - On a Linux system,
<sca_install_dir>/bin/pwtool <pwtool_keys_file>
- On a Windows system,
-
When prompted, type the password to encode, and then press Enter.
The pwtool generates a new
pwtool.keysfile to<pwtool_keys_file>and prints a new encrypted secret to the console. -
Copy the encrypted secret, and paste it as the value for
worker_auth_tokenproperty in theworker.propertiesfile. -
Add the following line (property) to the
worker.propertiesfile:pwtool_keys_file=<pwtool_keys_file>
Encrypting the Shared Secret on a Client
To encrypt a shared secret on a client:
-
Run one of the following commands.
-
On a Windows system:
- For a client used as part of Fortify Static Code Analyzer and applications, run
<sca_install_dir>\bin\pwtool.bat <pwtool_keys_file> - For a standalone client
ScanCentral SAST client that runs outside of SCA and Apps., run <client_install_dir>\bin\pwtool.bat <pwtool_keys_file>
- For a client used as part of Fortify Static Code Analyzer and applications, run
-
On a Linux system:
- For a client used as part of Fortify Static Code Analyzer and applications, run
<sca_install_dir>/bin/pwtool <pwtool_keys_file> - For a standalone client, run
<client_install_dir>/bin/pwtool <pwtool_keys_file>
- For a client used as part of Fortify Static Code Analyzer and applications, run
-
-
When prompted, type the password to encode, and then press Enter.
The pwtool generates a new key in the file on the specified path, or reuses an existing file and prints the encrypted password.
-
Copy the new encrypted secret, and paste it as the value for the
client_auth_tokenproperty in theclient.propertiesfile. -
Add the following to the
client.propertiesfile:pwtool_keys_file=<pwtool_keys_file>
See Also