The Ziti SDK for JVM enables Java and other developers to easily and securely connect their applications to backend services over Ziti networks.
Contents
The recommended way to use the OpenZiti SDK for Java in your project is to add the dependency using your favorite build tool. Our artifacts are hosted on Maven Central, so add repo(if needed) and dependency to your project. Make sure to use latest version from the top of this page.
<project>
....
<repositories>
....
<repository>
<snapshots>
<enabled>false</enabled>
</snapshots>
<id>central</id>
<name>Maven Central</name>
<url>https://repo.maven.apache.org/maven2/</url>
</repository>
</repositories>
....
<dependencies>
...
<dependency>
<groupId>org.openziti</groupId>
<artifactId>ziti</artifactId>
<version>[0,)</version>
</dependency>
</dependencies>
....
</project>
repositories {
...
mavenCentral()
}
...
dependencies {
...
implementation 'org.openziti:ziti:+' // TODO fix version
}
Once you check out the project from GitHub, you can build it using gradle:
./gradlew build # install into your local maven cache ./gradlew :ziti:install
- allows to develop applications that connect to services on NetFoundry Ziti Service mesh
- strong identity support
- transparent use -- in seamless mode connections to network resources are intercepted and routed over Ziti network for any Ziti service that identity has access to
- written in Kotlin with Java-friendly API
- read more in our docs
See background here
Java SDK provides a way to enroll and generate identity file.
The default identity format for Java SDK is Java KeyStore stored as .p12/.pfx
files,
however it can use identity JSON files generated by ziti-enroller
as well.
Enrolling creates two(or more) entries in Java KeyStore:
- private key entry
- client SSL private key/certificate identifying the application instance. this entry is stored with
ziti://<controller_addr>/<id>
alias (pkcs#12 - friendly name) - rootCA
- root CA certificates used to validate Ziti controller and routers
Note:
This allows enrolling and storing multiple identity keys and certificates in a single key store (pkcs#12 file). However, typically an application instance would only have a single enrollment or identity
Please use these community resources for getting help. We use GitHub issues for tracking bugs and feature requests and have limited bandwidth to address them.
- Read the docs
- Join our Developer Community
- Participate in discussion on Discourse