Encrypting configuration file properties
Configure properties in dse.yaml and cassandra.yaml to protect LDAP passwords, SSL truststore passwords, and configuration properties.
Configure DSE to use a local encryption key to decrypt properties in the configuration
file. Use passwords encrypted with the local key for the following properties:
-
dse.yaml LDAP values:
ldap_options.search_password ldap_options.truststore_password
Restriction: Use plain text for the KMIP keystore or truststore passwords. -
cassandra.yaml SSL values:
server_encryption_options.keystore_password server_encryption_options.truststore_password client_encryption_options.keystore_password client_encryption_options.truststore_password
cassandra.yaml
The location of the cassandra.yaml file depends on the type of installation:Package installations | /etc/dse/cassandra/cassandra.yaml |
Tarball installations | installation_location/resources/cassandra/conf/cassandra.yaml |
dse.yaml
The location of the dse.yaml file depends on the type of installation:Package installations | /etc/dse/dse.yaml |
Tarball installations | installation_location/resources/dse/conf/dse.yaml |
Prerequisites
Note: When using a local encryption key file, set the
location and ensure that the key
file is owned by the account running DSE.
Procedure
-
For each property, replace plain text passwords with encrypted passwords
returned by running the
command:
-
In dse.yaml, enable configuration file property
encryption:
- Update the dse.yaml and cassandra.yaml on all nodes in the cluster.
- Optional: Set up encryption for system resources, see Encrypting system resources.
- Perform a rolling restart.