{"id":8823,"date":"2016-11-04T16:45:16","date_gmt":"2016-11-04T15:45:16","guid":{"rendered":"https:\/\/www.dbi-services.com\/blog\/documentum-story-migrate-repository-cryptography-from-crypto-key-to-the-crypto-keystore\/"},"modified":"2016-11-04T16:45:16","modified_gmt":"2016-11-04T15:45:16","slug":"documentum-story-migrate-repository-cryptography-from-crypto-key-to-the-crypto-keystore","status":"publish","type":"post","link":"https:\/\/www.dbi-services.com\/blog\/documentum-story-migrate-repository-cryptography-from-crypto-key-to-the-crypto-keystore\/","title":{"rendered":"Documentum story &#8211; Migrate repository cryptography from crypto key to the crypto keystore"},"content":{"rendered":"<p>In this blog post I will explain the migration of the crypto key (aek.key) to the crypto keystore (lockbox) for an upgraded repository. In fact, during customer activities, I has been involved in the migration of a repository hosted on a content server 6.7 SP2 to a new infrastructure. A content server 7.2 P05 was on the new infrastructure where the lockbox was already used by other repositories. The pre-requisite to achieve this migration is to have an already configured repository using the lockbox which will help to re-encrypt the password of the database owner stored later in the dbpasswd.txt file. The repository for which we wanted to migrate the crypto key was properly upgraded to the content server 7.2 P05 using the Content Server Configuration Program keeping the existing aek.key from the old system. Our goal was to align the cryptography mechanism to use the lockbox.<\/p>\n<p>Please note that the above instructions cannot be used if\u00a0the file store is\u00a0encrypted with the Trusted Content Services.<\/p>\n<p>We will also recommend removing LDAP objects and re-create them later so the password can be properly re-encrypted and DER et PEM file re-created under $DOCUMENTUM\/dba\/secure\/ldapdb.<\/p>\n<p>First of all we need to check which encryption algorithm is currently used by retrieving the r_crypto_mode from the docbase config<\/p>\n<pre class=\"brush: sql; gutter: true; first-line: 1\">1&gt; select r_crypto_mode from dm_docbase_config\n2&gt; GO\nr_crypto_mode\n----------------------------------------------------------------\n3DES_RSA1024_SHA256\n(1 row affected)<\/pre>\n<p>Before shutting down the repository we will retrieve a list of all users that are configured with an inline password. We will have to reset their password as the encryption mechanism will be changed.<\/p>\n<p>Query to retrieve inline password users:<\/p>\n<pre class=\"brush: sql; gutter: true; first-line: 1\">select user_login_name from dm_user where user_source = 'inline password';<\/pre>\n<p>We can now shutdown the repository:<\/p>\n<pre class=\"brush: bash; gutter: true; first-line: 1\">$DOCUMENTUM\/dba\/dm_shutdown_repo1<\/pre>\n<p>It\u2019s a best practice to backup the aek.key and the lockbox files located under the $DOCUMENTUM\/dba\/secure folder:<\/p>\n<pre class=\"brush: bash; gutter: true; first-line: 1\">cd $DOCUMENTUM\/dba\ntar -czvf secure-bck-MigAek-$(date +%Y%m%d).tgz secure<\/pre>\n<p>It&#8217;s also a good practice to backup all files that will be updated by this procedure:<\/p>\n<pre class=\"brush: bash; gutter: true; first-line: 1\">cd $DOCUMENTUM\/dba\/config\/repo1\ncp server.ini server.ini.bck-MigAek-$(date +%Y%m%d)\ncp dbpasswd.txt dbpasswd.txt.bck-MigAek-$(date +%Y%m%d)<\/pre>\n<p>We will now connect to the Database schema to remove all encryption values. During the next startup of the repository, encryption values will be properly regenerated automatically.<\/p>\n<pre class=\"brush: sql; gutter: true; first-line: 1\">sqlplus repo1\/passwd@db1<\/pre>\n<p>Once connected you can issue the following SQL instructions :<\/p>\n<pre class=\"brush: sql; gutter: true; first-line: 1\">update dm_docbase_config_s set i_crypto_key = ' ', i_ticket_crypto_key = ' ';\n\ndelete from dmi_vstamp_s where i_application = 'dm_docbase_config_crypto_key_init';\ndelete from dmi_vstamp_s where i_application = 'dm_docbase_config_ticket_crypto_key_init';\n\ndelete dm_sysobject_s where r_object_id = (select r_object_id from dm_public_key_certificate_s where key_type = 1);\ndelete dm_sysobject_r where r_object_id = (select r_object_id from dm_public_key_certificate_s where key_type = 1);\ndelete dm_public_key_certificate_s where key_type = 1;\n\ndelete dm_sysobject_s where r_object_id = (select r_object_id from dm_cryptographic_key_s where key_type = 1);\ndelete dm_sysobject_r where r_object_id = (select r_object_id from dm_cryptographic_key_s where key_type = 1);\ndelete dm_cryptographic_key_s where key_type = 1;\ncommit;<\/pre>\n<p>The repository initialization file can now be updated to move from the\u00a0crypto key (aek.key) to the the crypto keystore (lockbox):<\/p>\n<pre class=\"brush: bash; gutter: true; first-line: 1\">vi $DOCUMENTUM\/dba\/config\/repo1\/server.ini<\/pre>\n<p>Inside this file, you should comment the following lines:<\/p>\n<pre class=\"brush: bash; gutter: true; first-line: 1\">crypto_keystore=Local\ncrypto_mode=3DES_RSA1024_SHA256\ncrypto_keyname=aek.key<\/pre>\n<p>Then uncomment\/add the following lines:<\/p>\n<pre class=\"brush: bash; gutter: true; first-line: 1\">crypto_mode = AES256_RSA1024_SHA256\ncrypto_keystore = Local\ncrypto_lockbox = lockbox.lb\ncrypto_keyname = CSaek<\/pre>\n<p>Please make sure that the <strong>crypto_mode<\/strong> in the first section is the same as the one retrieved before stopping the repository. The crypto_mode of the second section (new one) can contain the value that you want. The strongest mode available is &#8220;AES256_RSA1024_SHA256&#8221; so that&#8217;s probably the value that you will want to set. In our case, we faced an issue because of the old repository and we had to keep the same crypto_mode as the original which was &#8220;3DES_RSA1024_SHA256&#8221;. Therefore at the end, our server.ini file contained the following:<\/p>\n<pre class=\"brush: bash; gutter: true; first-line: 1\">crypto_mode = 3DES_RSA1024_SHA256\ncrypto_keystore = Local\ncrypto_lockbox = lockbox.lb\ncrypto_keyname = CSaek<\/pre>\n<p>Once this is done, we now need to encrypt the database owner of the repository repo1. But how can we do this since the repository isn&#8217;t started? Simple: we need an already available repository on this content server (it\u2019s a prerequisite actually) which is already configured to use the lockbox. We used the global registry for that purpose:<\/p>\n<pre class=\"brush: bash; gutter: true; first-line: 1\">&gt; iapi gr_dbi\n\nPlease enter a user (dmadmin):\nPlease enter password for dmadmin:\n\n\nEMC Documentum iapi - Interactive API interface\n(c) Copyright EMC Corp., 1992 - 2015\nAll rights reserved.\nClient Library Release 7.2.0050.0084\n\n\nConnecting to Server using docbase gr_dbi\n[DM_SESSION_I_SESSION_START]info: \"Session 010f583d80095f8a started for user dmadmin.\"\n\n\nConnected to Documentum Server running Release 7.2.0050.0214 Linux64.Oracle\nSession id is s0\nAPI&gt; initcrypto,c\n...\nOK\nAPI&gt; encrypttext,c,xxxx\n...\nDM_ENCR_TEXT_V2=AAAAEJpJA5bVkJGghYFqrik3kxJ0gaWIRNvhVmZA586sBuFx7NqKnbKSpdUYf\/BvJgn10OQpoZXL1T7Y2L+RmwZRUPkWqsv139zbU7u2vw7UYKX3<\/pre>\n<p>We can now set the encrypted password to the dbpasswd.txt as follow:<\/p>\n<pre class=\"brush: bash; gutter: true; first-line: 1\">vi \/app\/dctm\/server\/dba\/config\/repo1\/dbpasswd.txt<\/pre>\n<p>Add the following content inside this file:<\/p>\n<pre class=\"brush: bash; gutter: true; first-line: 1\">DM_ENCR_TEXT_V2=AAAAEPAcQcFYDlYJ26cqrQ17oC0yXek7E+1g83e069TNkYXjwoRd5zXpZmCm4NdrNYAJDLJ4iEKEzrzFlAuGUWw25KXs\/98L0AI7VJx2DLUZNkjX<\/pre>\n<p>When this has been done, the repository is now ready to start:<\/p>\n<pre class=\"brush: bash; gutter: true; first-line: 1\">$DOCUMENTUM\/dba\/dm_start_repo1<\/pre>\n<p>Check the log files and validate that the repository has been properly started. Something similar should be displayed:<\/p>\n<pre class=\"brush: bash; gutter: true; first-line: 1; highlight: [1,28]\">2016-09-05T09:11:28.907641 21003[21003] 0000000000000000 [DM_SERVER_I_START_SERVER]info: \"Docbase repo1 opened\"\n\n2016-09-05T09:11:28.907790 21003[21003] 0000000000000000 [DM_SERVER_I_SERVER]info: \"Setting exception handlers to catch all interrupts\"\n\n2016-09-05T09:11:28.907820 21003[21003] 0000000000000000 [DM_SERVER_I_START]info: \"Starting server using service name: repo1\"\n\n2016-09-05T09:11:29.402450 21003[21003] 0000000000000000 [DM_SERVER_I_LAUNCH_MTHDSVR]info: \"Launching Method Server succeeded.\"\n\n2016-09-05T09:11:29.420505 21003[21003] 0000000000000000 [DM_SERVER_I_LISTENING]info: \"The server is listening on network address (Service Name: repo1, Host Name: content_server_01 :V4 IP)\"\n\n2016-09-05T09:11:29.420579 21003[21003] 0000000000000000 [DM_SERVER_I_IPV6_DISABLED]info: \"The server can not listen on IPv6 address because the operating system does not support IPv6\"\n\n2016-09-05T09:11:29.426518 21003[21003] 0000000000000000 [DM_SERVER_I_LISTENING]info: \"The server is listening on network address (Service Name: repo1_s, Host Name: content_server_01:V4 IP)\"\n\n2016-09-05T09:11:29.429969 21003[21003] 0000000000000000 [DM_SERVER_I_IPV6_DISABLED]info: \"The server can not listen on IPv6 address because the operating system does not support IPv6\"\n\n2016-09-05T09:11:31.162134 21003[21003] 0000000000000000 [DM_WORKFLOW_I_AGENT_START]info: \"Workflow agent master (pid : 21060, session 010095b980000007) is started sucessfully.\"\nIsProcessAlive: Process ID 0 is not &gt; 0\n2016-09-05T09:11:31.163095 21003[21003] 0000000000000000 [DM_WORKFLOW_I_AGENT_START]info: \"Workflow agent worker (pid : 21061, session 010095b98000000a) is started sucessfully.\"\nIsProcessAlive: Process ID 0 is not &gt; 0\n2016-09-05T09:11:32.165584 21003[21003] 0000000000000000 [DM_WORKFLOW_I_AGENT_START]info: \"Workflow agent worker (pid : 21074, session 010095b98000000b) is started sucessfully.\"\nIsProcessAlive: Process ID 0 is not &gt; 0\n2016-09-05T09:11:33.167476 21003[21003] 0000000000000000 [DM_WORKFLOW_I_AGENT_START]info: \"Workflow agent worker (pid : 21087, session 010095b98000000c) is started sucessfully.\"\n2016-09-05T09:11:34.167673 21003[21003] 0000000000000000 [DM_SERVER_I_START]info: \"Sending Initial Docbroker check-point \"\n\n2016-09-05T09:11:34.188560 21003[21003] 0000000000000000 [DM_MQ_I_DAEMON_START]info: \"Message queue daemon (pid : 21105, session 010095b980000456) is started sucessfully.\"\n2016-09-05T09:11:34.488373 21102[21102] 010095b980000003 [DM_DOCBROKER_I_PROJECTING]info: \"Sending information to Docbroker located on host (content_server_01) with port (1490). Information: (Config(repo1), Proximity(1), Status(Open), Dormancy Status(Active)).\"\nMon Sep 05 09:12:28 2016 [INFORMATION] [AGENTEXEC 21546] Detected during program initialization: Version: 7.2.0050.0214 Linux64\nMon Sep 05 09:12:32 2016 [INFORMATION] [AGENTEXEC 21546] Detected during program initialization: Agent Exec connected to server repo1: [DM_SESSION_I_SESSION_START]info: \"Session 010095b980502d02 started for user dmadmin.\"<\/pre>\n<p>&nbsp;<\/p>\n<p>The migration of the encryption key to the encryption keystore is nearly completed. It remains 2 tasks which are the password reset of the internal Documentum users such as the dm_bof_registry, dmc_wdk_preferences_owner and the dmc_wdk_presets_owner users and the password reset of the application specific users (the list created just before stopping the repository) but this will not be described in this blog.<\/p>\n<p>As said before, if the LDAP configuration is required, it is better to remove the LDAP objects before the migration and recreate them now that the repository is running properly using the new encryption mechanisms.<\/p>\n<p>All the steps and information to migrate the encryption mechanisms to the lockbox have been provided and I hope that it can be useful for you.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this blog post I will explain the migration of the crypto key (aek.key) to the crypto keystore (lockbox) for an upgraded repository. In fact, during customer activities, I has been involved in the migration of a repository hosted on a content server 6.7 SP2 to a new infrastructure. A content server 7.2 P05 was [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[525],"tags":[914,915,129,916],"type_dbi":[],"class_list":["post-8823","post","type-post","status-publish","format-standard","hentry","category-enterprise-content-management","tag-aek","tag-crypto","tag-documentum","tag-lockbox"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Documentum story - Migrate repository cryptography from crypto key to the crypto keystore - dbi Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dbi-services.com\/blog\/documentum-story-migrate-repository-cryptography-from-crypto-key-to-the-crypto-keystore\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Documentum story - Migrate repository cryptography from crypto key to the crypto keystore\" \/>\n<meta property=\"og:description\" content=\"In this blog post I will explain the migration of the crypto key (aek.key) to the crypto keystore (lockbox) for an upgraded repository. In fact, during customer activities, I has been involved in the migration of a repository hosted on a content server 6.7 SP2 to a new infrastructure. A content server 7.2 P05 was [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dbi-services.com\/blog\/documentum-story-migrate-repository-cryptography-from-crypto-key-to-the-crypto-keystore\/\" \/>\n<meta property=\"og:site_name\" content=\"dbi Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-04T15:45:16+00:00\" \/>\n<meta name=\"author\" content=\"Arnaud Berbier\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Arnaud Berbier\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/documentum-story-migrate-repository-cryptography-from-crypto-key-to-the-crypto-keystore\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/documentum-story-migrate-repository-cryptography-from-crypto-key-to-the-crypto-keystore\/\"},\"author\":{\"name\":\"Arnaud Berbier\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/c71a46720faf18cf28611499df2dea2f\"},\"headline\":\"Documentum story &#8211; Migrate repository cryptography from crypto key to the crypto keystore\",\"datePublished\":\"2016-11-04T15:45:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/documentum-story-migrate-repository-cryptography-from-crypto-key-to-the-crypto-keystore\/\"},\"wordCount\":728,\"commentCount\":0,\"keywords\":[\"Aek\",\"Crypto\",\"Documentum\",\"Lockbox\"],\"articleSection\":[\"Enterprise content management\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.dbi-services.com\/blog\/documentum-story-migrate-repository-cryptography-from-crypto-key-to-the-crypto-keystore\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/documentum-story-migrate-repository-cryptography-from-crypto-key-to-the-crypto-keystore\/\",\"url\":\"https:\/\/www.dbi-services.com\/blog\/documentum-story-migrate-repository-cryptography-from-crypto-key-to-the-crypto-keystore\/\",\"name\":\"Documentum story - Migrate repository cryptography from crypto key to the crypto keystore - dbi Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#website\"},\"datePublished\":\"2016-11-04T15:45:16+00:00\",\"author\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/c71a46720faf18cf28611499df2dea2f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/documentum-story-migrate-repository-cryptography-from-crypto-key-to-the-crypto-keystore\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.dbi-services.com\/blog\/documentum-story-migrate-repository-cryptography-from-crypto-key-to-the-crypto-keystore\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/documentum-story-migrate-repository-cryptography-from-crypto-key-to-the-crypto-keystore\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.dbi-services.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Documentum story &#8211; Migrate repository cryptography from crypto key to the crypto keystore\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#website\",\"url\":\"https:\/\/www.dbi-services.com\/blog\/\",\"name\":\"dbi Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.dbi-services.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/c71a46720faf18cf28611499df2dea2f\",\"name\":\"Arnaud Berbier\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9c34f01cf55fcb9e46d5ffd439039b55176dc188e050aba15da81ccccad08bd9?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9c34f01cf55fcb9e46d5ffd439039b55176dc188e050aba15da81ccccad08bd9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9c34f01cf55fcb9e46d5ffd439039b55176dc188e050aba15da81ccccad08bd9?s=96&d=mm&r=g\",\"caption\":\"Arnaud Berbier\"},\"description\":\"Arnaud Berbier has more than three years of experience in Oracle application development. He is specialized in PL\/SQL and APEX 4 development and masters the programming of requests in SQL language. He has a solid expertise in the analysis of business requirements and architectures based on Oracle technologies. He is Oracle Application Express 4 Developer Certified Expert, Oracle Certified Associate (OCA) WebLogic 11g System Administrator, OCA Java, and ITIL Foundation V3 certified. Arnaud Berbier holds a Bachelor of Science in Information System Management from the University of Applied Sciences Western Switzerland (HES-SO ARC) in Neuch\u00e2tel. His branch-related experience covers Public Sector, Financial Services \/ Banking, etc.\",\"url\":\"https:\/\/www.dbi-services.com\/blog\/author\/arnaud-berbier\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Documentum story - Migrate repository cryptography from crypto key to the crypto keystore - dbi Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dbi-services.com\/blog\/documentum-story-migrate-repository-cryptography-from-crypto-key-to-the-crypto-keystore\/","og_locale":"en_US","og_type":"article","og_title":"Documentum story - Migrate repository cryptography from crypto key to the crypto keystore","og_description":"In this blog post I will explain the migration of the crypto key (aek.key) to the crypto keystore (lockbox) for an upgraded repository. In fact, during customer activities, I has been involved in the migration of a repository hosted on a content server 6.7 SP2 to a new infrastructure. A content server 7.2 P05 was [&hellip;]","og_url":"https:\/\/www.dbi-services.com\/blog\/documentum-story-migrate-repository-cryptography-from-crypto-key-to-the-crypto-keystore\/","og_site_name":"dbi Blog","article_published_time":"2016-11-04T15:45:16+00:00","author":"Arnaud Berbier","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Arnaud Berbier","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dbi-services.com\/blog\/documentum-story-migrate-repository-cryptography-from-crypto-key-to-the-crypto-keystore\/#article","isPartOf":{"@id":"https:\/\/www.dbi-services.com\/blog\/documentum-story-migrate-repository-cryptography-from-crypto-key-to-the-crypto-keystore\/"},"author":{"name":"Arnaud Berbier","@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/c71a46720faf18cf28611499df2dea2f"},"headline":"Documentum story &#8211; Migrate repository cryptography from crypto key to the crypto keystore","datePublished":"2016-11-04T15:45:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dbi-services.com\/blog\/documentum-story-migrate-repository-cryptography-from-crypto-key-to-the-crypto-keystore\/"},"wordCount":728,"commentCount":0,"keywords":["Aek","Crypto","Documentum","Lockbox"],"articleSection":["Enterprise content management"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.dbi-services.com\/blog\/documentum-story-migrate-repository-cryptography-from-crypto-key-to-the-crypto-keystore\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.dbi-services.com\/blog\/documentum-story-migrate-repository-cryptography-from-crypto-key-to-the-crypto-keystore\/","url":"https:\/\/www.dbi-services.com\/blog\/documentum-story-migrate-repository-cryptography-from-crypto-key-to-the-crypto-keystore\/","name":"Documentum story - Migrate repository cryptography from crypto key to the crypto keystore - dbi Blog","isPartOf":{"@id":"https:\/\/www.dbi-services.com\/blog\/#website"},"datePublished":"2016-11-04T15:45:16+00:00","author":{"@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/c71a46720faf18cf28611499df2dea2f"},"breadcrumb":{"@id":"https:\/\/www.dbi-services.com\/blog\/documentum-story-migrate-repository-cryptography-from-crypto-key-to-the-crypto-keystore\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dbi-services.com\/blog\/documentum-story-migrate-repository-cryptography-from-crypto-key-to-the-crypto-keystore\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.dbi-services.com\/blog\/documentum-story-migrate-repository-cryptography-from-crypto-key-to-the-crypto-keystore\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.dbi-services.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Documentum story &#8211; Migrate repository cryptography from crypto key to the crypto keystore"}]},{"@type":"WebSite","@id":"https:\/\/www.dbi-services.com\/blog\/#website","url":"https:\/\/www.dbi-services.com\/blog\/","name":"dbi Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dbi-services.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/c71a46720faf18cf28611499df2dea2f","name":"Arnaud Berbier","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9c34f01cf55fcb9e46d5ffd439039b55176dc188e050aba15da81ccccad08bd9?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9c34f01cf55fcb9e46d5ffd439039b55176dc188e050aba15da81ccccad08bd9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9c34f01cf55fcb9e46d5ffd439039b55176dc188e050aba15da81ccccad08bd9?s=96&d=mm&r=g","caption":"Arnaud Berbier"},"description":"Arnaud Berbier has more than three years of experience in Oracle application development. He is specialized in PL\/SQL and APEX 4 development and masters the programming of requests in SQL language. He has a solid expertise in the analysis of business requirements and architectures based on Oracle technologies. He is Oracle Application Express 4 Developer Certified Expert, Oracle Certified Associate (OCA) WebLogic 11g System Administrator, OCA Java, and ITIL Foundation V3 certified. Arnaud Berbier holds a Bachelor of Science in Information System Management from the University of Applied Sciences Western Switzerland (HES-SO ARC) in Neuch\u00e2tel. His branch-related experience covers Public Sector, Financial Services \/ Banking, etc.","url":"https:\/\/www.dbi-services.com\/blog\/author\/arnaud-berbier\/"}]}},"_links":{"self":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts\/8823","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/comments?post=8823"}],"version-history":[{"count":0,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts\/8823\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/media?parent=8823"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/categories?post=8823"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/tags?post=8823"},{"taxonomy":"type","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/type_dbi?post=8823"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}