AuditEncryptionCommands command group for the AdminTask object

You can use the Jython scripting language to configure the security auditing system with the wsadmin tool. Use the commands and parameters in the AuditEncryptionCommands group to configure the security audit system to encrypt audit records.

createAuditEncryptionConfig

The createAuditEncryptionConfig command creates the encryption model used to encrypt the audit records.

You can import the certificate from an existing key file name containing that certificate or automatically generate a certificate.

The user must have the auditor administrative role to run this command.

Target object

None.

Required parameters

-enableAuditEncryption
Specifies whether to encrypt audit records. This parameter modifies your audit policy configuration. (Boolean, required)
-certAlias
Specifies the alias name that identifies the generated or imported certificate. (String, required)
-encryptionKeyStoreRef
Specifies the reference ID of the keystore to import the certificate to. (String, required)

Optional parameters

-autogenCert
Specifies whether to automatically generate the certificate used to encrypt the audit records. You must specify either this parameter or the -importCert parameter, but you cannot specify both. (Boolean, optional)
-importCert
Specifies whether to import an existing certificate to encrypt the audit records. You must specify either this parameter or the -autogenCert parameter, but you cannot specify both. (Boolean, optional)
-certKeyFileName
Specifies the unique name of the key file for the certificate to import. (String, optional)
-certKeyFilePath
Specifies the key file location for the certificate to import. (String, optional)
-certKeyFileType
Specifies the key file type for the certificate to import. (String, optional)
-certKeyFilePassword
Specifies the key file password for the certificate to import. (String, optional)
-certAliasToImport
Specifies the alias of the certificate to import. (String, optional)

Return value

The command returns the shortened form of the reference ID of the created encryption keystore if the system successfully creates the audit encryption configuration, as the following example output displays:
KeyStore_1173199825578

Batch mode example usage

  • Using Jython string:
    AdminTask.createAuditEncryptionConfig('-enableAuditEncryption true -certAlias 
    auditCertificate -autogenCert true -encryptionKeyStoreRef auditKeyStore') 
  • Using Jython list:
    AdminTask.createAuditEncryptionConfig(['-enableAuditEncryption', 'true', '-certAlias', 
    'auditCertificate', '-autogenCert', 'true', '-encryptionKeyStoreRef', 'auditKeyStore']) 
    

Interactive mode example usage

  • Using Jython string:
    AdminTask.createAuditEncryptionConfig('-interactive')

createAuditSelfSignedCertificate

The createAuditSelfSignedCertificate command creates a self-signed certificate. Use this command internally to automatically generate a certificate for encryption and signing or to import that certificate into the keystore.

The user must have the auditor administrative role to run this command.

Target object

None.

Required parameters

-keyStoreName
Specifies the unique name of the keystore where the system imports the self-signed certificate to. (String, optional)
-certificateAlias
Specifies a unique alias name for the certificate. (String, required)
-certificateSize
Specifies the size that the private key uses for the personal certificate. The default value is 1024. (Integer, required)
-certificateCommonName
Specifies the common name portion of the distinguished name. (String, required)

Optional parameters

-certificateOrganization
Specifies the organizational part of the distinguished name. (String, optional)
-keyStoreScope
Specifies the scope of the keystore that the system imports the self-signed certificate to. (String, optional)
-certificateVersion
Specifies the version of the personal certificate. (String, optional)
-certificateOrganizationalUnit
Specifies the organization unit part of the distinguished name. (String, optional)
-certificateLocality
Specifies the locality portion of the distinguished name. (String, optional)
-certificateState
Specifies the state portion of the distinguished name. (String, optional)
-certificateZip
Specifies the zip code portion of the distinguished name. (String, optional)
-certificateCountry
Specifies the country portion of the distinguished name. The default value is US. (String, optional)
-certificateValidDays
Specifies the length of time, in days, which the certificate is valid. The default value is 365 days. (Integer, optional)

Return value

The command returns a value of true if the system successfully creates the self-signed certificate.

Batch mode example usage

  • Using Jython string:
    AdminTask.createAuditSelfSignedCertificate('-keyStoreName AuditDefaultKeyStore -keyStoreScope 
    (cell):Node04Cell -certificateAlias myNew -certificateCommonName cn=oet -certificateOrganization mycompany')
  • Using Jython list:
    AdminTask.createAuditSelfSignedCertificate(['-keyStoreName', 'AuditDefaultKeyStore', '-keyStoreScope', 
    '(cell):Node04Cell', '-certificateAlias', 'myNew', '-certificateCommonName', 'cn=oet', 
    '-certificateOrganization', 'mycompany'])

Interactive mode example usage

  • Using Jython:
    AdminTask.createAuditSelfSignedCertificate('-interactive')

deleteAuditCertificate

The deleteAuditCertificate command deletes a self-signed certificate from an audit keystore.

The user must have the auditor administrative role to run this command.

Target object

None.

Required parameters

-keyStoreName
Specifies the unique name of the keystore from which the system deletes the self-signed certificate. (String, required)
-certificateAlias
Specifies a unique alias name for the certificate to delete. (String, required)

Optional parameters

-keyStoreScope
Specifies a unique alias name for the certificate. (String, optional)

Return value

The command returns a value of true if the system successfully deletes the audit certificate.

Batch mode example usage

  • Using Jython string:
    AdminTask.deleteAuditCertificate('-keyStoreName myKeystore -certificateAlias oldCertificate')
  • Using Jython list:
    AdminTask.deleteAuditCertificate(['-keyStoreName', 'myKeystore', '-certificateAlias', 'oldCertificate'])

Interactive mode example usage

  • Using Jython:
    AdminTask.deleteAuditCertificate('-interactive')

deleteAuditEncryptionConfig

The deleteAuditEncryptionConfig command deletes the encryption model used to encrypt the audit records. The command does not remove keystore files or the certificates.

The user must have the auditor administrative role to run this command.

Target object

None.

Return value

The command returns a value of true if the system successfully deletes the audit encryption configuration.

Batch mode example usage

  • Using Jython string:
    AdminTask.deleteAuditEncryptionConfig()
  • Using Jython list:
    AdminTask.deleteAuditEncryptionConfig()

Interactive mode example usage

  • Using Jython:
    AdminTask.deleteAuditEncryptionConfig('-interactive')

disableAuditEncryption

The disableAuditEncryption command disables the encryption of audit records.

The user must have the auditor administrative role to run this command.

Target object

None.

Return value

The command returns a value of true if the system successfully disables audit record encryption.

Batch mode example usage

  • Using Jython string:
    AdminTask.disableAuditEncryption()
  • Using Jython list:
    AdminTask.disableAuditEncryption()

Interactive mode example usage

  • Using Jython string:
    AdminTask.disableAuditEncryption('-interactive')

enableAuditEncryption

The enableAuditEncryption command enables the encryption of audit records.

The user must have the auditor administrative role to run this command.

Target object

None.

Return value

The command returns a value of true if the system successfully enables audit record encyption.

Batch mode example usage

  • Using Jython string:
    AdminTask.enableAuditEncryption()
  • Using Jython list:
    AdminTask.enableAuditEncryption()

Interactive mode example usage

  • Using Jython:
    AdminTask.enableAuditEncryption()

exportAuditCertificate

The exportAuditCertificate command exports a self-signed certificate from a keystore. To use this command, you must adhere to the following user role and privilege guidelines:
  • You must have audit privileges to export the certificate from an audit keystore.
  • You must have the auditor and administrator roles to export the certificate to a security keystore.

Target object

None.

Required parameters

-keyStoreName
Specifies the unique name of the keystore. (String, required)
-keyStorePassword
Specifies the password that the system uses to access the keystore specified with the -keyStoreName parameter. (String, required)
-keyFilePath
Specifies the key store path name that contains the certificate to export. (String, required)
-keyFilePassword
Specifies the password of the keystore that contains the certificate to export. (String, required)
-keyFileType
Specifies the type of the keystore. (String, required)
-certificateAlias
Specifies the alias of the certificate to export from the keystore. (String, required)

Optional parameters

-keyStoreScope
Specifies the scope name of the keystore. (String, optional)
-aliasInKeyStore
Specifies a new unique name to identify the exported certificate. (String, optional)

Return value

The command returns a value of true if the system successfully exports the audit certificate.

Batch mode example usage

  • Using Jython string:
    AdminTask.exportAuditCertificate('-keyStoreName AuditDefaultKeyStore -keyStoreScope 
    (cell):Node04Cell -keyFilePath c:/wasinstall/appserver/profiles/AppSrv01/config/cells/Node04Cell/nodes/Node04/trust.p12 
    -keyFilePassword myPwd -keyFileType PKCS12 -certificateAlias root')
  • Using Jython list:
    AdminTask.exportAuditCertificate(['-keyStoreName', 'AuditDefaultKeyStore', '-keyStoreScope', 
    '(cell):Node04Cell', '-keyFilePath', 'c:/wasinstall/appserver/profiles/AppSrv01/config/cells/Node04Cell/nodes/Node04/trust.p12', 
    '-keyFilePassword', 'myPwd', '-keyFileType', 'PKCS12', '-certificateAlias', 'root'])

Interactive mode example usage

  • Using Jython:
    AdminTask.exportAuditCertificate('-interactive')

exportAuditCertToManagedKS

The exportAuditCertToManagedKS command exports a self-signed certificate from an audit keystore to a managed audit keystore.

The user must have the auditor administrative role to run this command.

Target object

None.

Required parameters

-keyStoreName
Specifies the unique name of the managed keystore. (String, required)
-keyStorePassword
Specifies the password of the managed keystore that contains the certificate to export. (String, required)
-toKeyStoreName
Specifies the unique name of the managed keystore that contains the certificate to export. (String, required)
-certificateAlias
Specifies a unique name to identify the exported certificate. (String, required)

Optional parameters

-keyStoreScope
Specifies the scope name of the keystore. (String, optional)
-toKeyStoreScope
Specifies the scope of the managed keystore that contains the certificate to export. (String, optional)
-aliasInKeyStore
Specifies the new unique name to identify the exported certificate. If you do not specify a value for this parameter, the system sets the unique name to the value specified for the -certificateAlias parameter. (String, optional)

Return value

The command returns a value of true if the system successfully exports the audit certificate.

Batch mode example usage

  • Using Jython string:
    AdminTask.exportAuditCertToManagedKS('-keyStoreName  auditEncryptionKeyStore -keyStorePassword myPwd 
    -toKeyStoreName  AuditTrustStore -toKeyStoreScope (cell):my03Cell -certificateAlias newauditcert 
    -aliasInKeyStore newauditcert1')
  • Using Jython list:
    AdminTask.exportAuditCertToManagedKS(['-keyStoreName', 'auditEncryptionKeyStore', '-keyStorePassword', 'myPwd', 
    '-toKeyStoreName', 'AuditTrustStore', '-toKeyStoreScope', '(cell):my03Cell', '-certificateAlias', 'newauditcert', 
    '-aliasInKeyStore', 'newauditcert1'])

Interactive mode example usage

  • Using Jython:
    AdminTask.exportAuditCertToManagedKS('-interactive')

getAuditCertificate

The getAuditCertificate command retrieves the attributes for an audit self-signed certificate in an audit keystore.

The user must have the monitor administrative role to run this command.

Target object

None.

Required parameters

-keyStoreName
Specifies the unique name of the managed keystore of interest. (String, required)
-certificateAlias
Specifies a unique name to identify the exported certificate of interest. (String, required)

Optional parameters

-keyStoreScope
Specifies the scope name of the keystore of interest. (String, optional)

Return value

The command returns a list of attributes associated with the audit certificate.

Batch mode example usage

  • Using Jython string:
    AdminTask.getAuditCertificate('-keyStoreName auditEncryptionKeyStore -certificateAlias 
    newauditcert')
  • Using Jython list:
    AdminTask.getAuditCertificate(['-keyStoreName', 'auditEncryptionKeyStore', '-certificateAlias', 
    'newauditcert'])

Interactive mode example usage

  • Using Jython:
    AdminTask.getAuditCertificate('-interactive')

getAuditEncryptionConfig

The getAuditEncryptionConfig command retrieves the encryption model that the system uses to encrypt the audit records.

The user must have the monitor administrative role to run this command.

Target object

None.

Return value

The command returns a list of attributes associated with the encryption model, as the following example output displays:
{{certRef Certificate_1184698729015}
{keystoreRef KeyStore_1173199825578}
{keyStore AuditDefaultKeyStore(cells/CHEYENNENode04Cell|audit.xml#KeyStore_1173199825578)}
{enabled true}
{alias mycertalias}
{_Websphere_Config_Data_Version {}}
{_Websphere_Config_Data_Id cells/CHEYENNENode04Cell|audit.xml#Certificate_1184698729015}
{_Websphere_Config_Data_Type Certificate}}

Batch mode example usage

  • Using Jython string:
    AdminTask.getAuditEncryptionConfig()
  • Using Jython list:
    AdminTask.getAuditEncryptionConfig()

Interactive mode example usage

  • Using Jython:
    AdminTask.getAuditEncryptionConfig('-interactive')

getEncryptionKeyStore

The getEncryptionKeyStore command retrieves the attributes for the keystore that contains the certificate that the system uses to encrypt the audit records.

The user must have the monitor administrative role to run this command.

Target object

None.

Return value

The command returns a list of attributes for the keystore of interest, as the following example displays:
{{location ${CONFIG_ROOT}/audittrust.p12}
{password *****}
{_Websphere_Config_Data_Id cells/CHEYENNENode04Cell|audit.xml#KeyStore_1173199825578}
{_Websphere_Config_Data_Version {}}
{useForAcceleration false}
{slot 0}
{type PKCS12}
{additionalKeyStoreAttrs {}}
{fileBased true}
{_Websphere_Config_Data_Type KeyStore}
{customProviderClass {}}
{hostList {}}
{keystoreRef KeyStore_1173199825578}
{createStashFileForCMS false}
{description {keyStore description}}
{managementScope (cells/CHEYENNENode04Cell|audit.xml#ManagementScope_1173199825608)}
{readOnly false}
{initializeAtStartup true}
{usage {}}
{provider IBMJCE}
{name AuditDefaultKeyStore}}

Batch mode example usage

  • Using Jython string:
    AdminTask.getEncryptionKeyStore()
  • Using Jython list:
    AdminTask.getEncryptionKeyStore()

Interactive mode example usage

  • Using Jython:
    AdminTask.getEncryptionKeyStore('-interactive')

importAuditCertFromManagedKS

The importAuditCertFromManagedKS command imports a self-signed certificate into a keystore from a managed audit keystore. Use this command internally to automatically generate a certificate for encryption or signing and to import a certificate into the keystore.

The user must have the auditor administrative role to run this command.

Target object

None.

Required parameters

-keyStoreName
Specifies the unique name of the managed keystore. (String, required)
-fromKeyStoreName
Specifies the unique name of the managed keystore that contains the certificate to import. (String, required)
-fromKeyStorePassword
Specifies the password of the managed keystore that contains the certificate to import. (String, required)
-certificateAliasFromKeyFile
Specifies the alias of the certificate to import from the managed keystore file. (String, required)

Optional parameters

-keyStoreScope
Specifies the scope name of the keystore. (String, optional)
-fromKeyStoreScope
Specifies the scope of the managed keystore that contains the certificate to import. (String, optional)
-certificateAlias
Specifies a unique name to identify the imported certificate. (String, optional)

Return value

The command returns a value of true if the system successfully imports the audit certificate.

Batch mode example usage

  • Using Jython string:
    AdminTask.importAuditCertFromManagedKS('-keyStoreName AuditDefaultKeyStore -keyStoreScope 
    (cell):myNode03Cell -fromKeyStoreName AuditSecondDefaultKeyStore -fromKeyStoreScope 
    (cell):myNode03Cell -fromKeyStorePassword myPwd
    -certificateAliasFromKeyFile root -certificateAlias myimportcert')
  • Using Jython list:
    AdminTask.importAuditCertFromManagedKS(['-keyStoreName', 'AuditDefaultKeyStore', '-keyStoreScope', 
    '(cell):Node04Cell', '-fromKeyStoreName', 'AuditSecondDefaultKeyStore', '-fromKeyStoreScope', 
    '(cell):myNode03Cell', '-fromKeyStorePassword', 'myPwd', '-certificateAliasFromKeyFile', 
    'root', '-certificateAlias', 'myimportcert'])

Interactive mode example usage

  • Using Jython:
    AdminTask.importAuditCertFromManagedKS('-interactive')

importAuditCertificate

The importAuditCertificate command imports a self-signed certificate into a keystore. Use this command internally to automatically generate a certificate for encryption or signing and to import a certificate into the keystore. To use this command, you must adhere to the following user role and privilege guidelines:
  • You must have audit privileges to import the certificate to an audit keystore.
  • You must have the auditor and administrator roles to import the certificate to a security keystore.

Target object

None.

Required parameters

-keyStoreName
Specifies the unique name of the keystore. (String, required)
-keyFilePath
Specifies the key store path name that contains the certificate to import. (String, required)
-keyFilePassword
Specifies the password of the keystore that contains the certificate to import. (String, required)
-keyFileType
Specifies the type of the keystore. (String, required)
-certificateAliasFromKeyFile
Specifies the alias of the certificate to import from the keystore file. (String, required)

Optional parameters

-keyStoreScope
Specifies the scope name of the keystore. (String, optional)
-certificateAlias
Specifies a unique name to identify the imported certificate. (String, optional)

Return value

The command returns a value of true if the system successfully imports the audit certificate.

Batch mode example usage

  • Using Jython string:
    AdminTask.importAuditCertificate('-keyStoreName AuditDefaultKeyStore -keyStoreScope 
    (cell):Node04Cell -keyFilePath c:/wasinstall/appserver/profiles/AppSrv01/config/cells/Node04Cell/nodes/Node04/trust.p12 
    -keyFilePassword myPwd -keyFileType PKCS12 -certificateAliasFromKeyFile root -certificateAlias myimportcert')
  • Using Jython list:
    AdminTask.importAuditCertificate(['-keyStoreName', 'AuditDefaultKeyStore', '-keyStoreScope', '(cell):Node04Cell', 
    '-keyFilePath', 'c:/wasinstall/appserver/profiles/AppSrv01/config/cells/Node04Cell/nodes/Node04/trust.p12', 
    '-keyFilePassword', 'myPwd', '-keyFileType', 'PKCS12', '-certificateAliasFromKeyFile', 'root', 
    '-certificateAlias', 'myimportcert'])

Interactive mode example usage

  • Using Jython:
    AdminTask.importAuditCertificate('-interactive')

importEncryptionCertificate

The importEncryptionCertificate command imports the self-signed certificate that the system uses to encrypt audit data from the encryption keystore into a managed keystore in security.xml.

The user must have the auditor administrative role to run this command.

Target object

None.

Required parameters

-keyStoreName
Specifies the unique name of the keystore. (String, required)
-keyFilePath
Specifies the key store path name that contains the certificate to import. (String, required)
-keyFilePassword
Specifies the password of the keystore that contains the certificate to import. (String, required)
-keyFileType
Specifies the type of the keystore. (String, required)
-certificateAliasFromKeyFile
Specifies the alias of the certificate to import from the keystore file. (String, required)

Optional parameters

-keyStoreScope
Specifies the scope name of the keystore. (String, optional)
-certificateAlias
Specifies a unique name to identify the imported certificate. (String, optional)

Return value

The command returns a value of true if the system successfully imports the encryption certificate.

Batch mode example usage

  • Using Jython string:
    AdminTask.importEncryptionCertificate('-keyStoreName DefaultKeyStore -keyStoreScope (cell):Node04Cell 
    -keyFilePath c:/wasinstall/appserver/profiles/AppSrv01/config/cells/Node04Cell/nodes/Node04/trust.p12 
    -keyFilePassword myPwd -keyFileType PKCS12 -certificateAliasFromKeyFile root -certificateAlias myimportcert')
  • Using Jython list:
    AdminTask.importEncryptionCertificate(['-keyStoreName', 'DefaultKeyStore', '-keyStoreScope', '(cell):Node04Cell', 
    '-keyFilePath', 'c:/wasinstall/appserver/profiles/AppSrv01/config/cells/Node04Cell/nodes/Node04/trust.p12', 
    '-keyFilePassword', 'myPwd', '-keyFileType', 'PKCS12', '-certificateAliasFromKeyFile', 'root', 
    '-certificateAlias', 'myimportcert'])

Interactive mode example usage

  • Using Jython:
    AdminTask.importEncryptionCertificate('-interactive')

isAuditEncryptionEnabled

The isAuditEncryptionEnabled command determines if audit record encryption is enabled.

The user must have the monitor administrative role to run this command.

Target object

None.

Return value

The command returns a value of true if audit record encryption is enabled.

Batch mode example usage

  • Using Jython string:
    AdminTask.isAuditEncryptionEnabled()
  • Using Jython list:
    AdminTask.isAuditEncryptionEnabled()

Interactive mode example usage

  • Using Jython:
    AdminTask.isAuditEncryptionEnabled('-interactive')

listAuditEncryptionKeyStores

The listAuditEncryptionKeyStores command retrieves the attributes for each configured encryption keystore from the audit.xml file. The command returns attributes for active and inactive keystores.

The user must have the monitor administrative role to run this command.

Target object

None.

Return value

The command returns a list of attributes for each configured keystore, as the following example output displays:
{{location ${CONFIG_ROOT}/audittrust.p12}
{password *****}
{_Websphere_Config_Data_Id cells/CHEYENNENode04Cell|audit.xml#KeyStore_1173199825578}
{useForAcceleration false}
{slot 0}
{type PKCS12}
{additionalKeyStoreAttrs {}}
{fileBased true}
{_Websphere_Config_Data_Type KeyStore}
{customProviderClass {}}
{hostList {}}
{keystoreRef KeyStore_1173199825578}
{createStashFileForCMS false}
{description {keyStore description}}
{readOnly false}
{initializeAtStartup true}
{managementScope (cells/CHEYENNENode04Cell|audit.xml#ManagementScope_1173199825608)}
{usage {}}
{provider IBMJCE}
{name AuditDefaultKeyStore}}

Batch mode example usage

  • Using Jython string:
    AdminTask.listAuditEncryptionKeyStores()
  • Using Jython list:
    AdminTask.listAuditEncryptionKeyStores()

Interactive mode example usage

  • Using Jython:
    AdminTask.listAuditEncryptionKeyStores('-interactive')

listCertAliases

The listCertAliases command retrieves a list of the personal certificates in the keystore, as specified by the keystore name and scope of interest.

The user must have the monitor administrative role to run this command.

Target object

None.

Required parameters

-keyStoreName
Specifies the unique name of the keystore. (String, required)

Optional parameters

-keyStoreScope
Specifies the scope of the keystore. The default value is the cell scope. (String, optional)

Return value

The command returns a list of certificate aliases for the personal certificates that are configured for the keystore, as the following sample output displays:
mycertalias

Batch mode example usage

  • Using Jython string:
    AdminTask.listCertAliases('-keyStoreName AuditDefaultKeyStore -keyStoreScope (cell):Node04Cell')
  • Using Jython list:
    AdminTask.listCertAliases(['-keyStoreName AuditDefaultKeyStore -keyStoreScope (cell):Node04Cell'])

Interactive mode example usage

  • Using Jython:
    AdminTask.listCertAliases('-interactive')

modifyAuditEncryptionConfig

The modifyAuditEncryptionConfig command modifies the encryption model that the system uses to encrypt the audit records. Specify values for the -enableAuditEncryption, -certAlias, and encryptionKeyStoreRef parameters to use an existing keystore. Do not specify the -importCert or -autogenCert parameters if you use an existing keystore.

The user must have the auditor administrative role to run this command.

Target object

None.

Required parameters

None

Optional parameters

-enableAuditEncryption
Specifies whether to encrypt audit records. This parameter modifies your audit policy configuration. (Boolean, optional)
-autogenCert
Specifies whether to automatically generate the certificate used to encrypt the audit records. You must specify either this parameter or the -importCert parameter, but you cannot specify both. (Boolean, optional)
-importCert
Specifies whether to import an existing certificate to encrypt the audit records. You must specify either this parameter or the -autogenCert parameter, but you cannot specify both. (Boolean, optional)
-certKeyFileName
Specifies the unique name of the key file for the certificate to import. (String, optional)
-certKeyFilePath
Specifies the key file location for the certificate to import. (String, optional)
-certKeyFileType
Specifies the key file type for the certificate to import. (String, optional)
-certKeyFilePassword
Specifies the key file password for the certificate to import. (String, optional)
-certAliasToImport
Specifies the alias of the certificate to import. (String, optional)
-certAlias
Specifies the alias name that identifies the generated or imported certificate. (String, optional)
-encryptionKeyStoreRef
Specifies the reference ID of the keystore to import the certificate to. (String, optional)

Return value

The command returns a value of true if the system successfully updates the configuration.

Batch mode example usage

  • Using Jython string:
    AdminTask.modifyAuditEncryptionConfig('-enableAuditEncryption true -certAlias mycertalias 
    -encryptionKeyStoreRef KeyStore_1173199825578')
  • Using Jython list:
    AdminTask.modifyAuditEncryptionConfig(['-enableAuditEncryption', 'true', '-certAlias', 'mycertalias', 
    '-encryptionKeyStoreRef', 'KeyStore_1173199825578'])

Interactive mode example usage

  • Using Jython:
    AdminTask.modifyAuditEncryptionConfig('-interactive')

renewAuditCertificate

The renewAuditCertificate command renews a self signed certificate in an audit keystore.

The user must have the auditor administrative role to run this command.

Target object

None.

-keyStoreName
Specifies the unique name of the managed keystore of interest. (String, required)
-certificateAlias
Specifies a unique name to identify the exported certificate to renew. (String, required)

Optional parameters

-keyStoreScope
Specifies the scope name of the keystore of interest. (String, optional)

Return value

The command returns a value of true if the system successfully updates the configuration.

Batch mode example usage

  • Using Jython string:
    AdminTask.renewAuditCertificate('-keyStoreName auditEncryptionKeyStore 
    -certificateAlias newauditcert')
  • Using Jython list:
    AdminTask.renewAuditCertificate(['-keyStoreName', 'auditEncryptionKeyStore', 
    '-certificateAlias', 'newauditcert'])

Interactive mode example usage

  • Using Jython:
    AdminTask.renewAuditCertificate('-interactive')