Set up a keystore and encryption keys
- UpdatedJul 10, 2025
- 2 minutes to read
- Xanadu
- Edge Encryption
Set up the keystore and encryption keys used by the Edge Encryption proxy server.
Before you begin
Role required: security_admin
Procedure
-
Carefully determine the appropriate type of keystore to use based on your
organization's needs.
Supported keystore Description File store Keys are stored in a file in a file system accessed by the Edge Encryption proxy server. Because encryption keys stored in a file are not encrypted, it is your responsibility to protect these files.
Java KeyStore A Java KeyStore: - Stores keys in a Java JCEKS KeyStore.
- Is password protected and more secure than storing keys in a file in the file system.
- Can store multiple keys. A key alias represents each key, making it easier to manage multiple keys.
The Edge Encryption proxy ships with the Java JCEKS KeyStore file named keystore.jceks in the keystore directory. This keystore file contains the ServiceNow public key used to validate encryption rules signed by ServiceNow.
Enterprise Key Management (EKM) SafeNet KeySecure Keys are stored and retrieved with SafeNet KeySecure key management.
You must secure a license with Gemalto, download the libraries, and install the SafeNet KeySecure keystore on a host machine in your network before configuring the keystore on the Edge Encryption proxy server.
Unbound Technology
The base64-encoded wrapped encryption key is stored as text file on the Edge Encryption proxy server. The Unbound Technology implementation (previously Dyadic Security) maintains control of the wrapping key.
The Edge Encryption proxy server must run on the same machine as the Unbound technology client.
Note: If using a keystore other than the base system Java JCEKS KeyStore, you must import the ServiceNow public key into your keystore. The public key alias is servicenow. - Set up the keystore and encryption keys in your local network.