Overview
This topic explains how Cisco IoT FND OVA stores cryptographic keys and certificates in a keystore for secure device authentication and data encryption. This content outlines default keystore locations, passwords, and key management best practices.
The Cisco IoT FND OVA includes keys and certificates stored in a keystore. Keys are cryptographic components used for encrypting and decrypting data, while certificates are digital documents that verify the authenticity of a device or entity within the network.
The following table lists the default values for the keys and certificates in different environments:
| Environment |
Keystore Location |
Keystore Name |
Default Password |
|---|---|---|---|
| Cisco IoT FND OVA Linux Host |
|
|
N/A |
| Cisco IoT FND container |
|
|
|
When you restart the Cisco IoT FND container, the values of
/opt/cgms/server/cgms/conf/cgms_keystorefile in Cisco IoT FND container are overwritten by/opt/fnd/data/cgms_keystorefile. If/opt/fnd/data/cgms_keystorefile is not present in the host, then the/opt/fnd/data/cgms_keystore.selfsignedfile is used.
When you install Cisco IoT FND OVA for the first time, each certificate/key entry is referenced by an alias name in the keystore. The default aliases are:
-
cisco_sudi (cisco root CA certificate with 2029 expiry)
-
jmarconi (cisco certificate)
-
cgms (self signed certificate that is used by Cisco IoT FND when communicating with devices it has to manage)
The cgms certificate in the /opt/cgms/server/cgms/conf/cgms_keystore file on the Cisco IoT FND container and the /opt/fnd/data/cgms_keystore.selfsigned file on the Linux host initially contain a self-signed certificate from Cisco IoT FND. To create a custom cgms_keystore at /opt/fnd/data on the Linux host, you can either copy the existing cgms_keystore.selfsigned file or build it from scratch. The /opt/fnd/data/cgms_keystore file takes precedence if both files are present.
Ensure NTP is synchronized across the issuing Certificate Authority (CA) server, Cisco IoT FND, TPS, and FAR/HER, as it's crucial for Public Key Infrastructure.
Change the hostname or IP address of the Cisco IoT FND host before issuing the certificate and building the cgms_keystore.
The SAN field in the Cisco IoT FND certificate must include the hostname. If it includes the IP address, reissue the certificate if the hostname or IP changes.
The following table lists the default certificates and keys in the cgms_keystore:
| Certificate/Key |
Description |
|---|---|
| Issuing CA Certificate |
The certificate of the organization's issuing CA server, which can be a root or intermediate CA. If intermediate, import both root and intermediate CA certificates into the keystore. |
| Cisco IoT FND Device Certificate |
Issued for Cisco IoT FND by the organization's issuing CA server. |
| Cisco SUDI with 2029 Expiry |
The Cisco manufacturer certificate for Cisco IoT FND, issued by Cisco, expiring in 2029. |
| Cisco SUDI with 2099 Expiry |
The Cisco manufacturer certificate for Cisco IoT FND, issued by Cisco, expiring in 2099. |