Deploy Vaultless Tokenization on HTTPS Server
To support HTTPS for transport layer, perform the following steps:
Create a KeyStore attested with Certificate Authority (CA) or self-signed.
For self-signed KeyStore using Java, use the following command:
keytool -genkey -alias tomcat -keyalg RSA -keystore <keystore_name>.keystore
Edit the server.xml file under the
CATALINA_HOME/conf
folder. Add/uncomment the following changes in the connector port.#For Tomcat 8 and 9 <Connector port="8443" protocol="org.apache.coyote.http11.Http11NioProtocol"maxThreads="150" SSLEnabled="true" scheme="https" secure="true" keystoreFile="<keystore_path>" keystorePass="changeit" clientAuth="false" sslProtocol="TLS" /> #For Tomcat 10 and 11 <Connector port="8443" protocol="org.apache.coyote.http11.Http11NioProtocol"maxThreads="150" SSLEnabled="true"><SSLHostConfig><Certificate certificateKeystoreFile="keystore_path" certificateKeystorePassword="keystore_pass" type="RSA"/></SSLHostConfig></Connector>
Here, keystoreFile is the path of keystore file generate in step 1 and keystorePass is the password used during the keystore generation.
Restart the Tomcat server.
Check through browser for HTTPS: https://localhost:8443.