Ogledujete si pomoč za različico :

Configuring the DocAssurance service

The DocAssurance service requires RSA and BouncyCastle libraries. These libraries are installed along with the AEM Forms. Before configuring the DocAssurance service, Install and configure the AEM Forms package.


Before installing the AEM Forms add-on package, ensure that the installation path of the AEM Quickstart does not contain any spaces.

Out of the box, the DocAssurance service is not available for use. To use the DocAssurance service, bootdelegate the RSA and BouncyCastle libraries installed along with AEM Forms package. Perform the following steps to bootdelegate the libraries:   

  1. Stop the AEM Forms server.

  2. Open the sling.properties at [AEM installation]\crx-quickstart\conf\ for editing.


    If you use [AEM_root]\crx-quickstart\bin\start.bat to start AEM, then edit the sling.properties at [AEM_root]\crx-quickstart\

  3. Add the following properties to the sling.properties file

  4. Save and close the file. Restart the AEM Forms server.

Set up certificates for Reader extensions

The DocAssurance service can apply usage rights to PDF documents. To apply usage rights to PDF documents, setup certificates for Reader Extensions. Perform the following steps to setup certificates:

  1. Log in to AEM Author instance as an administrator.

  2. Go to Tools > Operations > Security > Users.  

  3. Click the name field of the user account. The Edit User Settings page opens.  

  4. On the AEM Author instance, certificates reside in a KeyStore. If you have not created a KeyStore earlier, click Create KeyStore and set a new password for the KeyStore.  If the server already contains a KeyStore, skip this step.

  5. On the Edit User Settings page, click Manage KeyStore.

  6. On KeyStore Management dialog, expand the Add Private Key from Key Store file option and provide an alias. The alias is used to perform the Reader Extensions operation.

  7. To upload the certificate file, click Select Key Store File and upload a <filename>.pfx file. 

  8. Add the Key Store Password, Private Key Password, and Private Key Alias that is associated with the certificate to the respective fields. Click Submit.


    To determine the Private Key Alias of a certificate, you can use the Java keytool command: keytool -list -v -keystore [keystore-file] -storetype pkcs12


    In the Key Store Password and Private Key Password fields, specify the password provided with the certificate file.  


On moving to production environment, replace your evaluation credentials with production credentials. Ensure that you delete your old Reader Extensions credentials,  before updating an expired or evaluations credential.

Enabling AES-256 for Encryption Service

To use AES 256 encryption for PDF files, obtain and install the Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy files. Replace the local_policy.jar and US_export_policy.jar files in the jre/lib/security folder. For example, if you are using Sun JDK, copy the downloaded files to the [JAVA_HOME]/jre/lib/security folder.

Configuring the Assembler services

The assembler service depends on the Reader Extensions service, Signature service, Forms service, and Output service. Perform the following steps to verify that the required services are up and running:

  1. Login to URL http://[server]:[port]>/system/console/bundles as an administrator.

  2. Search the following service and ensure that the services are up and running:

    Service Name Bundle Name
    Signatures Service adobe-aemfd-signatures
    Reader Extensions Service com.adobe.aemfd.adobe-aemfd-readerextensions
    Forms Service com.adobe.livecycle.adobe-lc-forms-bedrock-connector
    Output Service com.adobe.livecycle.adobe-lc-forms-bedrock-connector