You are processing encrypted files using SFTP channel. You see that the messages are failing with the exception below:
Symptom
PGP Encryption Module: Could not process message, Internal PGP Error (org.bouncycastle.openpgp.PGPException: Exception creating cipher)Cause: Illegal key size
MP: exception caught with message Could not process message, Internal PGP Error (org.bouncycastle.openpgp.PGPException: Exception creating cipher) Exception caught by adapter framework: Could not process message, Internal PGP Error (org.bouncycastle.openpgp.PGPException: Exception creating cipher) Transmitting the message to endpoint <local> using connection SFTP_http://sap.com/xi/XI/SFTP failed, due to: com.sap.engine.interfaces.messaging.api.exception.MessagingException: java.lang.Exception: Could not process message, Internal PGP Error (org.bouncycastle.openpgp.PGPException: Exception creating cipher)
We need to setup this PGP in our SAP PI 730 system. What is difference between Generating Key Pairs and Generate ASCII Armored Keys from GPG Keys? Do we need to login to server where we have installed on PI and generate key with Gpg4win? What if we have HA PI 730 system, Do we need to generate on both the nodes of HA system? Jan 13, 2012 Generating SSH Keys for SFTP Adapters - Type 2. Skip to end of metadata. Created by Anonymous. Use OpenSSL to generate PEM Key. Generate PEM Key using OpenSSL. This will be inbound interface - Bank SFTP server - PI - SAP - ECC. Can PI Team create the keys and share the public key with Bank SFTP server or is that something. Jun 06, 2012 Generating SSH Keys for SFTP Adapters - Type 1. Page: Generating SSH Keys for SFTP Adapters - Type 2. Page: Importing OFTP Test Keys into NWA Key Storage. Page: Generating OFTP Test Keys with Extended Key Usage. PGP, EDI etc. Page: Learning Series Sample Content-B2B Add On. Page: Generating ASCII Armored PGP Key Pairs.
If you go to http://<host>:<port>/BC//VerifyJCE in order to check the JCE Policy, you will see the following configuration:
8 bit ok 16 bit ok 32 bit ok 64 bit ok 128 bit ok 256 bit null 512 bit null 1024 bit null 2048 bit null 4096 bit null Read more.. Environment
Product
SAP NetWeaver all versions ; SAP Process Integration all versions ; SAP Process Integration, business-to-business add-on all versions ; SAP Process Integration, secure connectivity add-on all versions
Keywords
Process Integration 7.0, PI 7.0, PI 7.01, PI 7.02, Process Integration 7.10, PI 7.10, Process Integration 7.11, PI 7.11, Process Integration 7.30, PI 7.30, Process Integration 7.31, PI 7.31, Process Orchestration 7.40, PI 7.40, PO 7.40, Process Orchestration 7.50, PI 7.50, PO 7.50, NetWeaver, XI, local_policy.jar, US_export_policy, PIB2BPGP, PIB2BSFTP, Ilegal Key Size, SFTP, PGP, Internal PGP Error, Jurisdiction Policies, Exception decrypting key, JCE, PGPException, Exception creating cipher , KBA , BC-XI-CON-SFT , Secure File Transfer Protocol Adapter , Problem
About this pageThis is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.
Skip to end of metadataGo to start of metadata
Applies to:
Cod mw3 cd key generator reviews. SAP Netweaver PI based SFTP Adapters
Summary
The following sections briefly describe the steps to create SSH key pairs which can be used as an alternative for password based authentication. It also includes steps to verify key based authentication and import the keys in NWA key storage. It mainly foucses on creating PKCS12 Keys from OpenSSH Keys.
Author(s):
Sivasubramaniam Arunachalam
Company: SAP Labs
Created on: 30-Dec-2011 Author(s) Bio Sivasubramaniam Arunachalam is a senior developer at SAP Labs (Technology Innovation Platform). He is currently occupied with PI 7.31 development/maintenace activities. Since Sivasubramaniam joined SAP Labs in July 2010, he has developed new features in several adapters/areas including File, JDBC, IDoc, SOAP/XI, HTTP, JPR, B2B(RNIF 1.1/2.0, CIDX & PIDX) Adapters, XML Validation and Mapping Runtime. Currently, he is the component responsible for File, JDBC, B2B Adapters and XML Validation and takes care of all new development, enhancement and maintenance activities. Table of Contents Tools Required
Keys to be Generated
Use PuTTY Key Generator to Create SSH Public/Private Keys
Use Open SSL to Create X.509 and P12 Certificates
Import the Private Key into NWA Key Store
Pgp FreewareConfigure the Public Key in SSH Server
Sap Pi Pgp Key Generation DownloadVerify the Key Pairs with PuTTY
Comments are closed.
|
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
November 2020
Categories |