Key Store Providers
This document describes how ANKA Secure manages cryptographic keys, including: - BouncyCastle (BKS) Keystore usage - Dynamic Key Providers (e.g., environment, HSM) - Alternate Providers (AWS KMS, Azure Vault) for future flexibility - Key Management Endpoints referencing the keystore
1. Overview
ANKA Secure supports multiple ways of storing and managing keys:
- Local Keystore (BouncyCastle) using
.bks
files - AWS KMS (dummy example in the code, can be extended for real usage)
- Other Cloud Providers (Azure Key Vault, HSM, etc.) planned for future integration
This modular approach is powered by interfaces like KeyStoreProvider
, allowing you to switch storage mechanisms without changing core application code.
2. BouncyCastle (BKS) Keystore
By default, the application uses a local BouncyCastle (BKS) keystore. This keystore:
- Stores keys and certificates in a file (e.g., config/keys/keystore.bks
).
- Is password-protected, with the password itself (or an encrypted version) retrieved at runtime via the dynamic key.
2.1 How It Works
1.Configuration:
keystore:
type: ${KEYSTORE_TYPE:BKS}
filename: ${KEYSTORE_FILENAME:config/keys/keystore.bks}
password:
encrypted: ${KEYSTORE_PASSWORD_ENCRYPTED:AXvX5YS5m3ng2kwbKA7sYQ==}
salt: ${KEYSTORE_SALT:6edkdkesCiy7Y+RqypHUrg==}
iv: ${KEYSTORE_IV:3qSdEK/py4fn7TeURPQUrw==}
keystore.type
:BKS
(file-based using BouncyCastle).keystore.filename
: Path to the.bks
file.keystore.password.encrypted
,salt
, andiv
: Used to decrypt the actual keystore password at runtime.
2.Loading the Keystore
BcKeyStoreProvider
checks if thekeystoreFilename
file exists.- If yes, it loads the BKS file using the decrypted password.
- If no, it creates a new keystore from scratch and saves it immediately.
3.Accessing & Modifying Entries
- The
KeyStoreProvider
interface defines methods likegetEntry
,setEntry
,containsAlias
, etc. -
BcKeyStoreProvider
implements these methods by calling the underlying BouncyCastleKeyStore
. -
After adding or removing entries,
BcKeyStoreProvider
saves changes back to the.bks
file.
4.Persisting Changes
- After adding or removing entries,
BcKeyStoreProvider
saves changes back to the.bks
file.
2.2 SecureCoreConfig
: Reading Keystore Settings from application.yaml
Beyond just having these properties in application.yaml
, SecureCoreConfig
(shown below) is the central configuration class that reads those properties, decrypts the keystore password, and initializes the appropriate KeyStoreProvider
.
Key Steps:
-
Property Injection Property Injection:
@Value("${keystore.filename}") private String keystoreFilename; @Value("${keystore.password.encrypted}") private String encryptedPassword; @Value("${keystore.salt}") private String saltBase64; @Value("${keystore.iv}") private String ivBase64; @Value("${keystore.type:BKS}") private String keystoreType;
- These fields pull in the YAML values (e.g.,
keystore.filename
,keystore.password.encrypted
, etc.). - Defaults are specified where needed (e.g.,
BKS
if none is provided).
- These fields pull in the YAML values (e.g.,
-
Decrypting the Keystore Password
SecureCoreConfig
uses aDynamicKeyProvider
to retrieve the dynamic password at runtime (e.g., from an environment variable).- It then calls
KeyEncryptionUtil.deriveKey(...)
and decrypts the Base64-encoded password. - Result: A plaintext keystore password is available for loading the
.bks
file.
-
Selecting the Provider
if ("AWSKMS".equalsIgnoreCase(providerType)) { return new AwsKmsKeyStoreProvider(); } else { return new BcKeyStoreProvider(keystoreFilename, keystorePassword); }
- If the YAML says
"AWSKMS"
, we instantiate an AWS provider (dummy in current code). - Otherwise (default), use
BcKeyStoreProvider
to manage a BouncyCastle.bks
file.
- If the YAML says
-
Bean Creation
- Methods like
@Bean public KeyStoreProvider keyStoreProvider()
produce the Spring-managed bean. - Other beans (
SymmetricEncryptionService
,KeyManagementService
, etc.) receive theKeyStoreProvider
to load and store keys as needed.
- Methods like
Why Is This Important?
- It bridges the gap between your YAML config and the actual
KeyStoreProvider
logic. - Every time you start ANKA Secure, it reads these properties, decrypts the password if necessary, and instantiates the correct provider.
- If you change
keystore.type
to"AWSKMS"
,SecureCoreConfig
automatically sets up theAwsKmsKeyStoreProvider
instead ofBcKeyStoreProvider
.
3. Dynamic Key Provider
In addition to the keystore's own password, you can have an encrypted keystore password in YAML, which is decrypted at runtime using a dynamic key. The dynamic key itself can come from different sources:
provider
: Determines the source of the key used to decrypt the actual keystore password.env
→EnvironmentDynamicKeyProvider
(reads from an environment variable)hsm
→HsmDynamicKeyProvider
(a stub for now, can integrate with an HSM)
env
: The name of the system property or environment variable (e.g.,DYNAMIC_KEY_PASSWORD
).
By doing this:
- Keystore Password is stored encrypted in
application.yaml
. - Dynamic Key is retrieved from an environment variable or HSM at startup.
- The application decrypts
keystore.password.encrypted
using this dynamic key to get the final BKS password. - The BouncyCastle keystore is then unlocked.
3.1 Generating an Encrypted Keystore Password
To secure your keystore password, ANKA Secure provides a standalone utility class called
co.ankatech.secure.api.util.GenerateEncryptedKey.java
This utility demonstrates
how to produce the salt, IV, and encrypted keystore password you place into
application.yaml
. At runtime, the dynamic password (from an environment variable or HSM)
decrypts it.
Steps to Use:
-
Run:
java co.ankatech.secure.api.util.GenerateEncryptedKey
-
Copy the Outputs
- Base64-encoded Salt
- Base64-encoded IV
- Encrypted keystore password (Base64)
-
Paste
into the YAML:
4.Dynamic Password
- Provide the "real" password at runtime via an environment variable, e.g., DYNAMIC_KEY_PASSWORD
.
5.Decryption at Startup
- The application derives a key from DYNAMIC_KEY_PASSWORD
+ salt, uses the IV, and decrypts the keystore password behind the scenes.
Security Note: The fixed keystore password in
GenerateEncryptedKey
should not remain hardcoded for production. Instead, replace it with your actual keystore password only in a local or secure environment, then store the generatedencrypted
,salt
, andiv
in your configuration.
4. Alternate Providers
4.1 AWS KMS
A dummy provider, AwsKmsKeyStoreProvider
, showcases how you can integrate with AWS KMS. In a real-world scenario, the methods would:
- Call AWS KMS APIs to retrieve keys, sign/encrypt data, or manage aliases.
- Possibly store a reference to the key in KMS, rather than retrieving raw key material.
When keystore.type
is set to AWSKMS
:
- The application instantiates
AwsKmsKeyStoreProvider
instead ofBcKeyStoreProvider
. - All calls to the
KeyStoreProvider
interface methods either:- Perform real KMS operations (if fully implemented), or
- Throw
UnsupportedOperationException
(in the dummy version).
4.2 Azure Vault / Others
You can add more provider classes (e.g., AzureKeyVaultProvider
) that implement KeyStoreProvider
. By switching the keystore.type
, you can direct the application to:
- Use a local BKS file,
- Use AWS KMS,
- Use Azure Key Vault,\ ... or any other secure store.
5. Key Management Endpoints
Key Management Endpoints in the ANKA Secure API (e.g., /api/key-management/**
) rely on a KeyStoreProvider
to:
- Import keys/certificates,
- Generate new keys,
- Retrieve and export keys,
- Delete or rotate keys.
Because the endpoints call the KeyStoreProvider
interface, they remain agnostic to whether the keys are in a local .bks
file, AWS KMS, or another provider.
Example Flow
- Client calls
POST /api/key-management/asymmetric
to generate an asymmetric key pair. - Service Layer checks the configured
keystore.type
:- If BKS, it delegates to
BcKeyStoreProvider
→ stores the key pair in the local.bks
file. - If AWSKMS, it would call the KMS provider → real or stub logic in
AwsKmsKeyStoreProvider
.
- If BKS, it delegates to
- Response indicates success or any error.
6. Switching to a Different Keystore
- Update
application.yaml
(or environment variables):
This instructs the application to use the AWS KMS provider instead of the local BKS keystore.
-
Implement the provider if it's not a dummy example (e.g.,
AzureKeyVaultProvider
,HsmDynamicKeyProvider
). -
Redeploy the application with new settings. The
KeyStoreProvider
injection ensures your existing logic (e.g., Key Management Endpoints) continues to work without code changes outside the provider.
7. Future Extensibility
- Cloud HSM: If you have a hardware security module (HSM) on-premise or in a cloud environment, you could implement a
HsmKeyStoreProvider
. - Additional Dynamic Keys: For advanced scenarios (e.g., short-lived ephemeral keys), you could expand
dynamic.key.provider
to fetch from a remote vault or KMS rotation logic. - Multi-Provider Setup: If certain keys live in BKS and others in KMS, you might expand your configuration to route calls dynamically based on alias or usage type.
8. Summary
ANKA Secure's key management is modular and extensible:
- By default, a BouncyCastle keystore (
.bks
file) is used, but you can switch to AWS KMS or future providers with minimal changes. - The dynamic key approach allows the application to decrypt keystore passwords at runtime, enhancing security and flexibility.
- Key Management Endpoints remain provider-agnostic, calling
KeyStoreProvider
methods that handle storing and retrieving cryptographic material.
This design ensures that as your infrastructure evolves---e.g., migrating from a local keystore to a cloud service---ANKA Secure can adapt quickly without requiring a full rewrite of your cryptographic logic.
9. References
- Encryption & Digital Signatures
- BouncyCastle: https://www.bouncycastle.org/
- Spring Boot Configuration: Official Docs