# Configure AAF
-aaf_locate_url=https://aafist.test.att.com:8095
-aaf_url=https://aafist.test.att.com:8095/locate/com.att.aaf.service:2.0
+aaf_locate_url=https://aaf.onap.org:8095
+aaf_url=https://aaf.onap.org:8095/locate/
#aaf_url=https://DME2RESOLVE/service=com.att.authz.AuthorizationService/version=2.0/envContext=TEST/routeOffer=BAU_SE
#if you are running aaf service from a docker image you have to use aaf service IP and port number
-aaf_id=m00468@portal.ecomp.att.com
+aaf_id=sdc@onap
#Encrypt the password using AAF Jar
aaf_password= enc:uI_J4jBL4YUcIZZa5uZKj3QMUC63hbS8TmDn5PSp5nO
# Sample CADI Properties, from CADI 1.4.2
-hostname=ecomp.att.com
+hostname=onapportal
csp_domain=PROD
# Add Absolute path to Keyfile
-cadi_keyfile=/opt/app/jetty/base/be/etc/keyfile
+cadi_keyfile=/var/lib/jetty/opt/be/etc/keyfile
# This is required to accept Certificate Authentication from Certman certificates.
# Default TrustStore - REQUIRED for changing PROTOCOL Defaults for DME2
# Read https://wiki.web.att.com/pages/viewpage.action?pageId=574623569#URGENT:SolvingSSL2-3/TLSv1removalissues-Up-to-dateTruststore
# Add Absolute path to truststore2018.jks
-cadi_truststore=/opt/app/jetty/base/be/etc/cadi_truststore.jks
+cadi_truststore=/var/lib/jetty/base/be/etc/cadi_truststore.jks
# Note: This is the ONLY password that doesn't have to be encrypted. All Java's TrustStores are this passcode by default, because they are public certs
cadi_truststore_password=changeit
cadi_longitude=-96.800451
aaf_root_ns=com.att.aaf
-aaf_api_version=2.0
\ No newline at end of file
+aaf_api_version=2.0