Understanding Password Encryption in Template File

Sensitive data, like passwords, can be encrypted so that these properties are not exposed if you share the template file among multiple environments and multiple development or testing teams.

The following properties are currently identified as being sensitive data:

  • userpass

  • env.nodex_search_admin_password

  • env.default_local_node_pass

  • env.gateway_password

  • env.ib_appserver_domain_password

  • env.gateway_keystore_password

  • env.nodex_search_read_password

  • env.search_call_back_password

To encrypt sensitive data, run the PTEM_CONFIG Application Engine program with the property encrypt_password set to True in the template file. This will generate a new template file named <original template file name>_encrypted in the location of the original template file.

The encrypted template file can be used as input to run the PTEM_CONFIG Application Engine program by providing the property decrypt_password=true in the template file, which internally decrypts the sensitive properties for configuring the environment.