Protecting the Execution Authentication KeyStore
Communication between the Insight Server and its Execution Workers is secured with JWT-based authentication and a public/private key pair generated at server installation. This is referred to as Execution Authentication.
insight-execution-keystore
, the certificate is also exported to
insight-execution-jwt.cert
for convenience when copying to the execution workers. The Insight Server installer creates the
insight-execution-keystore
and its private key with the default Java KeyStore password of
changeit.
Protecting the Execution Authentication KeyStore on Windows
- Generate a new execution KeyStore and certificate, protected by a securely random password. Perform the following steps:
- Configure the Insight Server with the new securely random password. Edit
application.properties
and configure the server with the KeyStore password used above. This should be supplied as an encrypted value, see Encrypting Sensitive Information in Configuration Files.insight.server.execution.authentication.key-store-password=ENC(encrypted securely-random-password)
- Restart the server.
- Copy the new execution authentication certificate
insight-execution-jwt.cert
(created in step 1 of this Windows procedure) from the server to the workers, replacing the worker's existing certificate.Copy the file from:
To this location:%PROGRAMDATA%\Fico\XpressInsight\Server\config\insight-execution-jwt.cert
%PROGRAMDATA%\Fico\XpressInsight\Worker\config\insight-execution-jwt.cert
Note: This may potentially be on a separate host. - Remove the old KeyStore and certificate files from the server created in step 1 of this Windows procedure.
-
insight-execution-keystore.old
-
insight-execution-cert.old
-
Protecting the Execution Authentication KeyStore on Linux
- Generate a new execution KeyStore and certificate, protected by a securely random password. Perform the steps below:
- Configure the Insight Server with the new securely random password. Edit
application.properties
and configure the server with the KeyStore password used above. This should be supplied as an encrypted value, see Encrypting Sensitive Information in Configuration Files.insight.server.execution.authentication.key-store-password=ENC(encrypted securely-random-password)
- Restart the server.
- Copy the new execution authentication certificate
insight-execution-jwt.cert
(created in step 1 of this Linux procedure) from the server to the workers, replacing the worker's existing certificate.Copy the file from:
To this location:/etc/fico-xpress-insight-server/insight-execution-jwt.cert
/etc/fico-xpress-insight-worker/insight-execution-jwt.cert
Note: This may potentially be on a separate host. - Remove the old KeyStore and certificate files from the server created in step 1 of this Linux procedure.
-
insight-execution-keystore.old
-
insight-execution-cert.old
-
© 2001-2025 Fair Isaac Corporation. All rights reserved. This documentation is the property of Fair Isaac Corporation (“FICO”). Receipt or possession of this documentation does not convey rights to disclose, reproduce, make derivative works, use, or allow others to use it except solely for internal evaluation purposes to determine whether to purchase a license to the software described in this documentation, or as otherwise set forth in a written software license agreement between you and FICO (or a FICO affiliate). Use of this documentation and the software described in it must conform strictly to the foregoing permitted uses, and no other use is permitted.