Overview
To keep the database username and password secure, PhixFlow is configured to use a keystore file. The database account credentials are encrypted and stored here, along with aliases.
...
Required? | Property | Value | Example |
---|---|---|---|
Required | keystoreType | The type of the keystore, either PKCS12 or JCEKS |
|
Required | keystoreFile | The path to the keystore. |
|
Either (recommended) | keystorePassEnvironmentVariable | The name of the environment variable. Use |
|
Or | keystorePass | The password for the keystore. Use |
|
Configuring Unencrypted Credentials
PhixFlow strongly recommends that you use the keystore to encrypt database user credentials, as described above.
However, if you must store unencrypted credentials:
- In
$TOMCAT/webapps/$WEBAPP/WEB-INF/classes
, copy phixflow-secret-test.xml to phixflow-secret.xml. - In phixflow-datasource.xml, enter the database user's:
- username
- and password.