Configure STS client key management using the AdminServer STSKey plugin
- Last Updated: January 26, 2026
- 3 minute read
- OpenEdge
- Version 12.8
- Documentation
Configure STS client key management using the AdminServer STSKey plugin
In OpenEdge 12.3, an optional STSKey plugin was added to the OpenEdge AdminServer. This plugin gives the OpenEdge AdminServer the ability to maintain the STS client key on an OpenEdge installation.
The configuration for the STSKey plugin is defined in the AdminServerPlugins.properties file, which is located in the $DLC/properties directory. Accompanying the STSKey plugin for the AdminServer is a supporting stskeyplugin.properties file (also in $DLC/properties), which is where administrators define connection properties for the STS client key generation.
The STSKey plugin manages the STS client key of the OpenEdge Authentication Gateway client's OpenEdge installation using the stskeyutil utility and its ability to use the OpenEdge Authentication Gateway Key Distribution service. The STSKey plugin includes additional functionality over the stskeyutil utility, including specifying the frequency of when the plugin checks the Key Distribution service to see whether a new STS server key was installed on the OpenEdge Authentication Gateway server, and supporting encoded passwords for STS client key generation.
- Ensure the Key Distribution application is deployed on your
OpenEdge Authentication Gateway server that is configured with an STS server
key, for example:
proenv>oeauthserver/bin/tcman deploy %DLC%/servers/pasoe/extras/keydist.warFor more information about using an STS server key, see STS server key configuration.
- On the OpenEdge Authentication Gateway client's OpenEdge
installation, stop the AdminServer:
proenv>proadsv -stop - Edit the $DLC/properties/stskeyplugin.properties file on the client
machine to specify the OpenEdge Authentication Gateway server as the
keydistURL. For more information about the additional supported properties, see STSKey plugin for the AdminServer. - Start the AdminServer on the OpenEdge client
machine:
The AdminServer uses the Key Distribution service to periodically check the OpenEdge Authentication Gateway server for an STS server key, and if the STS server key changed, then it generates an encoded STS client key into the directory specified by theproenv>proadsv -startkeystorepathfield in the stskeyplugin.properties file. Then the AdminServer updates the client OpenEdge installation's STS client key. The default location is$DLC/keys/encoded-client-key.ecp). - Verify the connection to the OpenEdge Authentication Gateway
server using the
stsclientutilcommand, for example:proenv>stsclientutil -nohostverify -url https://hostname:port -cmd authenticate -user test -password testFor more information about the
stsclientutilcommand, see STS client utility (stsclientutil) in OpenEdge Getting Started: OpenEdge Authentication Gateway Guide.
STS client key management logs for the AdminServer
The client-side logging from the AdminServer is shown in the $WRK/admserv.log file.
|
|
Logging verbosity is set using the verbose property in the stskeyplugin.properties file. For more information, see STSKey plugin for the
AdminServer.
Advanced logging for the STSKey plugin can also be configured using the AdminServer Log Console in OpenEdge Management.
Updating the STS server key and STS client keys
If the stskeyutil generates a new STS server key (using, for example, the
stskeyutil create utility in OpenEdge Getting Started: OpenEdge Authentication Gateway
Guide, with the -overwrite option) for
the OpenEdge Authentication Gateway server, the OpenEdge client machines' STSKey
plugins check the OpenEdge Authentication Gateway server to see if a new STS server
key was installed (the frequency of these checks is determined by the pinginterval setting). If the OpenEdge Authentication
Gateway server has a new STS server key, and if the onlyifmodified option is set to 1 on the client machines, then the
STSKey plugin updates the STS client key on the client machines.
You can verify the STS server key update by looking at the hostname.access.{date}.log file for the OpenEdge Authentication Gateway server, and checking the timestamp to see that a new STS server key was generated and sent by the Key Distribution application to the client machines.