Product documentation Docs
    • English
    • Deutsch
    • 日本語
    • 한국어
    • Français
  • More Sites
    • Now Community
    • Developer Site
    • Knowledge Base
    • Product Information
    • ServiceNow.com
    • Training
    • Customer Success Center
    • ServiceNow Support Videos
  • Log in

Product documentation

  • Home
How search works:
  • Punctuation and capital letters are ignored
  • Special characters like underscores (_) are removed
  • Known synonyms are applied
  • The most relevant topics (based on weighting and matching to search terms) are listed first in search results
Topics are ranked in search results by how closely they match your search terms
  • A match on the entire phrase you typed
  • A match on part of the phrase you typed
  • A match on ALL of the terms in the phrase you typed
  • A match on ANY of the terms in the phrase you typed

Note: Matches in titles are always highly ranked.

  • Release version
    Table of Contents
    • Now Platform capabilities
Table of Contents
Choose your release version
    Home London Platform Capabilities Now Platform capabilities Edge Encryption Edge Encryption installation Install the Edge Encryption proxy server using the command line installer

    Install the Edge Encryption proxy server using the command line installer

    • Save as PDF Selected topic Topic & subtopics All topics in contents
    • Unsubscribe Log in to subscribe to topics and get notified when content changes.
    • Share this page

    Install the Edge Encryption proxy server using the command line installer

    Manually install multiple Edge Encryption proxy servers in your network.

    Before you begin

    Roles required: security_admin on your ServiceNow instance and local administrator on the host machine.

    If order preserving encryption types or encryption patterns are to be used, set up a MySQL database on a machine in your network if not already present.

    Note: If using Unbound Technology encryption keys with Edge Encryption, install the proxy server using the command line installer on the Unbound client machine. The Edge Encryption proxy server must run on the same machine as the Unbound technology client.

    About this task

    First, set up a single Edge Encryption proxy server. After your first proxy server is successfully running, add additional proxy servers for one instance to ensure an optimal environment. See Sizing your Edge Encryption environment to determine the number of additional proxy servers needed.
    • Install the Edge Encryption proxy server (command line installer)

      Install an Edge Encryption proxy on a 64-bit Windows or Linux computer.

    • Create and configure the RSA key pair for the digital signature

      Create an RSA key pair that the proxy server can use to create the digital signature for signing changes to the encryption properties and configuration.

    • Import and configure the certificate for secure SSL connection

      To use a secure SSL connection, import a server certificate and add it to the Java KeyStore.

    • Enable AES 256-bit encryption

      256-bit encryption is more secure than 128-bit encryption, and you can optionally configure AES 256-bit encryption on the Edge Encryption proxy server host. How you enable AES 256-bit encryption depends on the Java update installed on each proxy server host.

    • Set up a keystore and encryption keys

      Set up the keystore and encryption keys used by the Edge Encryption proxy server.

    • Configure encryption keys on the instance

      Edge Encryption provides the tools to manage encryption keys without taking the proxy offline.

    • Configure additional properties in the Edge Encryption properties file

      After installing the Edge Encryption proxy server in your network and setting up your keystore and keys, configure the additional Edge Encryption properties.

    • Configure a web proxy

      If your network uses a web proxy, you can set up the Edge Encryption proxy to use the web proxy.

    • Set the proxy server initial memory limit and upper bound memory limit

      Set the initial memory limit and upper bound memory limit to specify how much memory the proxy server can consume. Set these limits to avoid performance issues in your Edge Encryption implementation.

    • Start the Edge Encryption proxy

      After an Edge Encryption proxy is installed and configured, you can start the proxy from the command line.

    • Obfuscate passwords in the properties file

      You can obfuscate passwords in the edgeencryption.properties file to share the properties file without revealing clear text passwords.

    • Manually add an additional proxy

      After the first Edge Encryption proxy is properly configured and tested, you can set up additional proxies on a Linux or Windows machine. Installing multiple proxies on the same machine is not recommended.

    Tags:

    Feedback
    On this page

    Previous topic

    Next topic

    • Contact Us
    • Careers
    • Terms of Use
    • Privacy Statement
    • Sitemap
    • © ServiceNow. All rights reserved.

    Release version
    Choose your release version

      Install the Edge Encryption proxy server using the command line installer

      • Save as PDF Selected topic Topic & subtopics All topics in contents
      • Unsubscribe Log in to subscribe to topics and get notified when content changes.
      • Share this page

      Install the Edge Encryption proxy server using the command line installer

      Manually install multiple Edge Encryption proxy servers in your network.

      Before you begin

      Roles required: security_admin on your ServiceNow instance and local administrator on the host machine.

      If order preserving encryption types or encryption patterns are to be used, set up a MySQL database on a machine in your network if not already present.

      Note: If using Unbound Technology encryption keys with Edge Encryption, install the proxy server using the command line installer on the Unbound client machine. The Edge Encryption proxy server must run on the same machine as the Unbound technology client.

      About this task

      First, set up a single Edge Encryption proxy server. After your first proxy server is successfully running, add additional proxy servers for one instance to ensure an optimal environment. See Sizing your Edge Encryption environment to determine the number of additional proxy servers needed.
      • Install the Edge Encryption proxy server (command line installer)

        Install an Edge Encryption proxy on a 64-bit Windows or Linux computer.

      • Create and configure the RSA key pair for the digital signature

        Create an RSA key pair that the proxy server can use to create the digital signature for signing changes to the encryption properties and configuration.

      • Import and configure the certificate for secure SSL connection

        To use a secure SSL connection, import a server certificate and add it to the Java KeyStore.

      • Enable AES 256-bit encryption

        256-bit encryption is more secure than 128-bit encryption, and you can optionally configure AES 256-bit encryption on the Edge Encryption proxy server host. How you enable AES 256-bit encryption depends on the Java update installed on each proxy server host.

      • Set up a keystore and encryption keys

        Set up the keystore and encryption keys used by the Edge Encryption proxy server.

      • Configure encryption keys on the instance

        Edge Encryption provides the tools to manage encryption keys without taking the proxy offline.

      • Configure additional properties in the Edge Encryption properties file

        After installing the Edge Encryption proxy server in your network and setting up your keystore and keys, configure the additional Edge Encryption properties.

      • Configure a web proxy

        If your network uses a web proxy, you can set up the Edge Encryption proxy to use the web proxy.

      • Set the proxy server initial memory limit and upper bound memory limit

        Set the initial memory limit and upper bound memory limit to specify how much memory the proxy server can consume. Set these limits to avoid performance issues in your Edge Encryption implementation.

      • Start the Edge Encryption proxy

        After an Edge Encryption proxy is installed and configured, you can start the proxy from the command line.

      • Obfuscate passwords in the properties file

        You can obfuscate passwords in the edgeencryption.properties file to share the properties file without revealing clear text passwords.

      • Manually add an additional proxy

        After the first Edge Encryption proxy is properly configured and tested, you can set up additional proxies on a Linux or Windows machine. Installing multiple proxies on the same machine is not recommended.

      Tags:

      Feedback

          Share this page

          Got it! Feel free to add a comment
          To share your product suggestions, visit the Idea Portal.
          Please let us know how to improve this content

          Check any that apply

          To share your product suggestions, visit the Idea Portal.
          Confirm

          We were unable to find "Coaching" in Jakarta. Would you like to search instead?

          No Yes
          • Contact Us
          • Careers
          • Terms of Use
          • Privacy Statement
          • Sitemap
          • © ServiceNow. All rights reserved.

          Subscribe Subscribed Unsubscribe Last updated: Tags: January February March April May June July August September October November December No Results Found Versions Search preferences successfully updated My release version successfully updated My release version successfully deleted An error has occurred. Please try again later. You have been unsubscribed from all topics. You are now subscribed to and will receive notifications if any changes are made to this page. You have been unsubscribed from this content Thank you for your feedback. Form temporarily unavailable. Please try again or contact  docfeedback@servicenow.com  to submit your comments. The topic you requested does not exist in the release. You were redirected to a related topic instead. The available release versions for this topic are listed There is no specific version for this documentation. Explore products Click to go to the page. Release notes and upgrades Click to open the dropdown menu. Delete Remove No selected version Reset This field is required You are already subscribed to this topic Attach screenshot The file you uploaded exceeds the allowed file size of 20MB. Please try again with a smaller file. Please complete the reCAPTCHA step to attach a screenshot
          Log in to personalize your search results and subscribe to topics
          No, thanks Login