1)
2) Create a certificate for use by the Doradus server and store it in a keystore file. You can use the keytool utility included with the JRE. An overview of the process to create a self-signed certificate is outline here:http://docs.oracle.com/javase/6/docs/technotes/guides/security/jsse/JSSERefGuide.html#CreateKeystore
3) Set the keystore parameter in the doradus.yaml file to the location of the keystore file, and set the keystorepassword parameter to the file’s password. Example:
4) If client authentication will be used, create a certificate for each client application and import them into a truststore file. (See the same article referenced above.) Set the truststore parameter in the doradus.yaml file to the location of the keystore file, and set the truststorepassword parameter to the file’s password. Example:
5) To require client authentication, set the clientauthentication parameter in the doradus.yaml file. This requires REST API connections to use mutual authentication. Example:
6) The cipher algorithms allowed by the REST API when TLS is enabled is controlled via the tls_cipher_suites parameter. The default list includes the algorithms recommended for FIPS compliance. The actual algorithms allowed by REST API is a subset of the listed algorithms and those actually available to the JVM in which Doradus is running. The cipher algorithm list can be tailored, for example, to only allow 256-bit symmetrical encryption. Example: