Fix Agent and CM Issues
[aaf/authz.git] / cadi / aaf / src / main / java / org / onap / aaf / cadi / configure / Agent.java
index 83204d1..74f0916 100644 (file)
@@ -7,9 +7,9 @@
  * Licensed under the Apache License, Version 2.0 (the "License");
  * you may not use this file except in compliance with the License.
  * You may obtain a copy of the License at
- * 
+ *
  *      http://www.apache.org/licenses/LICENSE-2.0
- * 
+ *
  * Unless required by applicable law or agreed to in writing, software
  * distributed under the License is distributed on an "AS IS" BASIS,
  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
@@ -25,7 +25,6 @@ import java.io.File;
 import java.io.FileInputStream;
 import java.io.FileOutputStream;
 import java.io.IOException;
-import java.io.PrintStream;
 import java.net.ConnectException;
 import java.net.HttpURLConnection;
 import java.net.InetAddress;
@@ -35,8 +34,8 @@ import java.security.KeyPair;
 import java.security.KeyStore;
 import java.security.cert.X509Certificate;
 import java.util.ArrayDeque;
+import java.util.ArrayList;
 import java.util.Arrays;
-import java.util.Date;
 import java.util.Deque;
 import java.util.GregorianCalendar;
 import java.util.HashMap;
@@ -45,14 +44,14 @@ import java.util.List;
 import java.util.Map;
 import java.util.Map.Entry;
 import java.util.Properties;
-import java.util.TreeMap;
 
+import org.onap.aaf.cadi.Access;
 import org.onap.aaf.cadi.CadiException;
 import org.onap.aaf.cadi.CmdLine;
 import org.onap.aaf.cadi.LocatorException;
 import org.onap.aaf.cadi.PropAccess;
 import org.onap.aaf.cadi.Symm;
-import org.onap.aaf.cadi.aaf.Defaults;
+import org.onap.aaf.cadi.aaf.TestConnectivity;
 import org.onap.aaf.cadi.aaf.client.ErrMessage;
 import org.onap.aaf.cadi.aaf.v2_0.AAFCon;
 import org.onap.aaf.cadi.aaf.v2_0.AAFConHttp;
@@ -60,6 +59,7 @@ import org.onap.aaf.cadi.client.Future;
 import org.onap.aaf.cadi.client.Rcli;
 import org.onap.aaf.cadi.client.Retryable;
 import org.onap.aaf.cadi.config.Config;
+import org.onap.aaf.cadi.config.RegistrationPropHolder;
 import org.onap.aaf.cadi.config.SecurityInfoC;
 import org.onap.aaf.cadi.http.HBasicAuthSS;
 import org.onap.aaf.cadi.locator.SingleEndpointLocator;
@@ -86,17 +86,18 @@ import locate.v1_1.Configuration;
 import locate.v1_1.Configuration.Props;
 
 public class Agent {
+    private static final String AGENT_LOAD_URLS = "Agent:loadURLs";
     private static final String HASHES = "################################################################";
     private static final String PRINT = "print";
     private static final String FILE = "file";
     public static final String PKCS12 = "pkcs12";
     public static final String JKS = "jks";
     private static final String SCRIPT="script";
-    
+
     private static final String CM_VER = "1.0";
     public static final int PASS_SIZE = 24;
     private static int TIMEOUT;
-    
+
     private static RosettaDF<CertificateRequest> reqDF;
     private static RosettaDF<CertInfo> certDF;
     private static RosettaDF<Artifacts> artifactsDF;
@@ -105,129 +106,200 @@ public class Agent {
     private static ErrMessage errMsg;
     private static Map<String,PlaceArtifact> placeArtifact;
     private static RosettaEnv env;
-    
+
     private static boolean doExit;
     private static AAFCon<?> aafcon;
 
+    private static List<String> CRED_TAGS = Arrays.asList(new String[] {
+            Config.CADI_KEYFILE,
+            Config.AAF_APPID, Config.AAF_APPPASS,
+            Config.CADI_KEYSTORE, Config.CADI_KEYSTORE_PASSWORD, Config.CADI_KEY_PASSWORD,
+            Config.CADI_TRUSTSTORE,Config.CADI_TRUSTSTORE_PASSWORD,
+            Config.CADI_ALIAS, Config.CADI_X509_ISSUERS
+            });
+    private static List<String> LOC_TAGS = Arrays.asList(new String[] {
+            Config.CADI_LATITUDE, Config.CADI_LONGITUDE
+            });
+    // Note: This is set by loadURLs. Use that function as singleton, not directly.
+    private static Map<String,String> aaf_urls = null;
+    private static boolean configNoPasswd = false;
+
+
     public static void main(String[] args) {
         int exitCode = 0;
         doExit = true;
-        if(args.length>0 && "cadi".equals(args[0])) {
+        if (args.length>0 && "cadi".equals(args[0])) {
             String[] newArgs = new String[args.length-1];
             System.arraycopy(args, 1, newArgs, 0, newArgs.length);
-            if(newArgs.length==0) {
+            if (newArgs.length==0) {
                 System.out.println(HASHES);
                 System.out.println("Note: Cadi CmdLine is a separate component.  When running with\n\t"
                         + "Agent, always preface with \"cadi\",\n\tex: cadi keygen [<keyfile>]");
                 System.out.println(HASHES);
             }
             CmdLine.main(newArgs);
+        } else if(args.length>0 && "connectivity".equals(args[0])) {
+            String[] newArgs = new String[args.length-1];
+            System.arraycopy(args, 1, newArgs, 0, newArgs.length);
+            if(newArgs.length>0 && newArgs[0].indexOf('@')>=0) {
+                newArgs[0]=FQI.reverseDomain(newArgs[0])+".props";
+            }
+            TestConnectivity.main(newArgs);
         } else {
             try {
                 AAFSSO aafsso=null;
-                PropAccess access;
-                
-                if(args.length>1 && args[0].equals("validate") ) {
-                    int idx = args[1].indexOf('=');
-                    aafsso = null;
-                    access = new PropAccess(
-                                (idx<0?Config.CADI_PROP_FILES:args[1].substring(0, idx))+
-                                '='+
-                                (idx<0?args[1]:args[1].substring(idx+1)));
-                } else {
-                    aafsso= new AAFSSO(args, new AAFSSO.ProcessArgs() {
-                        @Override
-                        public Properties process(String[] args, Properties props) {
-                            if(args.length>1) {
-                                if (!args[0].equals("keypairgen")) {
-                                    props.put("aaf_id", args[1]);
-                                }    
+                PropAccess access=null;
+
+                String hasEtc = null;
+                for(String a : args) {
+                    if(a.startsWith(Config.CADI_PROP_FILES)) {
+                        access = new PropAccess(args);
+                        break;
+                    } else if(a.startsWith(Config.CADI_ETCDIR)) {
+                        int idx = a.indexOf('=');
+                        if(idx>=0 && idx<a.length()) {
+                            hasEtc = a.substring(idx+1);
+                        }
+                    } else if(a.equals("--nopasswd")) {
+                        configNoPasswd=true;
+                    }
+                }
+
+                if(access==null) {
+                    if(args.length>1 && args[1].contains("@")) {
+                        String domain = FQI.reverseDomain(args[1]);
+                        if(domain!=null) {
+                            if(hasEtc==null) {
+                                hasEtc = ".";
+                            }
+                            File etc = new File(hasEtc);
+                            if(etc.exists()) {
+                                File nsprops = new File(etc,domain+".props");
+                                if(nsprops.exists()) {
+                                    access = new PropAccess(new String[] {Config.CADI_PROP_FILES+'='+nsprops.getAbsolutePath()});
+                                }
                             }
-                            return props;
                         }
-                    });
-                    access = aafsso.access();
+                    }
+                }
+
+                if(access==null) {
+                    for(Entry<Object, Object> es : System.getProperties().entrySet()) {
+                        if(Config.CADI_PROP_FILES.equals(es.getKey())) {
+                            access = new PropAccess();
+                        }
+                    }
+                }
+
+                // When using Config file, check if Cred Exists, and if not, work with Deployer.
+                if(access!=null && !"config".equals(args[0]) && access.getProperty(Config.AAF_APPPASS)==null && access.getProperty(Config.CADI_ALIAS)==null) {
+                    // not enough credentials to use Props.  Use AAFSSO
+                    access = null;
                 }
-                    
-                if(aafsso!=null && aafsso.loginOnly()) {
+
+                if(access==null) {
+                    if (args.length>1 && args[0].equals("validate") ) {
+                        int idx = args[1].indexOf('=');
+                        aafsso = null;
+                        access = new PropAccess(
+                                    (idx<0?Config.CADI_PROP_FILES:args[1].substring(0, idx))+
+                                    '='+
+                                    (idx<0?args[1]:args[1].substring(idx+1)));
+                    } else {
+                        aafsso= new AAFSSO(args, new AAFSSO.ProcessArgs() {
+                            @Override
+                            public Properties process(String[] args, Properties props) {
+                                if (args.length>1) {
+                                    if (!args[0].equals("keypairgen")) {
+                                        props.put(Config.AAF_APPID, args[1]);
+                                    }
+                                }
+                                return props;
+                            }
+                        });
+                        access = aafsso.access();
+                    }
+                }
+
+                if (aafsso!=null && aafsso.loginOnly()) {
                     aafsso.setLogDefault();
                     aafsso.writeFiles();
                     System.out.println("AAF SSO information created in ~/.aaf");
                 } else {
                     env = new RosettaEnv(access.getProperties());
                     Deque<String> cmds = new ArrayDeque<String>();
-                    for(String p : args) {
-                        if("-noexit".equalsIgnoreCase(p)) {
+                    for (String p : args) {
+                        int eq;
+                        if ("-noexit".equalsIgnoreCase(p)) {
                             doExit = false;
-                        } else if(p.indexOf('=') < 0) {
+                        } else if ((eq=p.indexOf('=')) < 0) {
                             cmds.add(p);
+                        } else {
+                            access.setProperty(p.substring(0,eq), p.substring(eq+1));
                         }
                     }
-                    
-                    if(cmds.size()==0) {
-                        if(aafsso!=null) {
+
+                    if (cmds.size()==0) {
+                        if (aafsso!=null) {
                             aafsso.setLogDefault();
                         }
                         // NOTE: CHANGE IN CMDS should be reflected in AAFSSO constructor, to get FQI->aaf-id or not
                         System.out.println("Usage: java -jar <cadi-aaf-*-full.jar> cmd [<tag=value>]*");
-                        System.out.println("   create     <FQI> [<machine>]");
-                        System.out.println("   read       <FQI> [<machine>]");
-                        System.out.println("   update     <FQI> [<machine>]");
-                        System.out.println("   delete     <FQI> [<machine>]");
-                        System.out.println("   copy       <FQI> <machine> <newmachine>[,<newmachine>]*");
-                        System.out.println("   place      <FQI> [<machine>]");
-                        System.out.println("   showpass   <FQI> [<machine>]");
-                        System.out.println("   check      <FQI> [<machine>]");
-                        System.out.println("   keypairgen <FQI>");
-                        System.out.println("   config     <FQI>");
-                        System.out.println("   validate   <NS>.props>");
+                        System.out.println("   create       <FQI> [<machine>]");
+                        System.out.println("   read         <FQI> [<machine>]");
+                        System.out.println("   update       <FQI> [<machine>]");
+                        System.out.println("   delete       <FQI> [<machine>]");
+                        System.out.println("   copy         <FQI> <machine> <newmachine>[,<newmachine>]*");
+                        System.out.println("   place        <FQI> [<machine>[,<san>]*");
+                        System.out.println("   showpass     <FQI> [<machine>]");
+                        System.out.println("   check        <FQI> [<machine>]");
+                        System.out.println("   keypairgen   <FQI>");
+                        System.out.println("   config       <FQI> [--nopasswd]");
+                        System.out.println("   validate     <NS>.props>");
+                        System.out.println("   connectivity <NS>.props>");
                         System.out.println("   --- Additional Tool Access ---");
                         System.out.println("     ** Type with no params for Tool Help");
                         System.out.println("     ** If using with Agent, preface with \"cadi\"");
                         System.out.println("   cadi <cadi tool params, see -?>");
-                        
+
                         if (doExit) {
                             System.exit(1);
                         }
                     }
-                    
+
                     TIMEOUT = Integer.parseInt(env.getProperty(Config.AAF_CONN_TIMEOUT, "5000"));
-                
+
                     reqDF = env.newDataFactory(CertificateRequest.class);
                     artifactsDF = env.newDataFactory(Artifacts.class);
                     certDF = env.newDataFactory(CertInfo.class);
                     configDF = env.newDataFactory(Configuration.class);
                     permDF = env.newDataFactory(Perms.class);
                     errMsg = new ErrMessage(env);
-        
+
                     placeArtifact = new HashMap<>();
                     placeArtifact.put(JKS, new PlaceArtifactInKeystore(JKS));
                     placeArtifact.put(PKCS12, new PlaceArtifactInKeystore(PKCS12));
                     placeArtifact.put(FILE, new PlaceArtifactInFiles());
                     placeArtifact.put(PRINT, new PlaceArtifactOnStream(System.out));
                     placeArtifact.put(SCRIPT, new PlaceArtifactScripts());
-                    
+
                     Trans trans = env.newTrans();
                     String token;
-                    if((token=access.getProperty("oauth_token"))!=null) {
+                    if ((token=access.getProperty("oauth_token"))!=null) {
                         trans.setProperty("oauth_token", token);
                     }
                     try {
-                        if(aafsso!=null) {
+                        if (aafsso!=null) {
                         // show Std out again
                             aafsso.setLogDefault();
                             aafsso.setStdErrDefault();
-                            
-                            // if CM_URL can be obtained, add to sso.props, if written
-                            String cm_url = getProperty(access,env,false, Config.CM_URL,Config.CM_URL+": ");
-                            if(cm_url!=null) {
-                                aafsso.addProp(Config.CM_URL, cm_url);
-                            }
+
+                            /*urls=*/loadURLs(access);
                             aafsso.writeFiles();
                         }
-    
-                        
-    
+
+
+
                         String cmd = cmds.removeFirst();
                         switch(cmd) {
                             case "place":
@@ -255,13 +327,7 @@ public class Agent {
                                 keypairGen(trans, access, cmds);
                                 break;
                             case "config":
-                                if(access.getProperty(Config.CADI_PROP_FILES)!=null) {
-                                    // Get Properties from initialization Prop Files
-                                    config(trans,access,null,cmds);
-                                } else {
-                                    // Get Properties from existing AAF Instance
-                                    config(trans,access,aafcon(access),cmds);
-                                }
+                                config(trans,access,args,cmds);
                                 break;
                             case "validate":
                                 validate(access);
@@ -280,11 +346,11 @@ public class Agent {
                     } finally {
                         StringBuilder sb = new StringBuilder();
                         trans.auditTrail(4, sb, Trans.REMOTE);
-                        if(sb.length()>0) {
+                        if (sb.length()>0) {
                             trans.info().log("Trans Info\n",sb);
                         }
                     }
-                    if(aafsso!=null) {
+                    if (aafsso!=null) {
                         aafsso.close();
                     }
                 }
@@ -292,31 +358,87 @@ public class Agent {
                 e.printStackTrace();
             }
         }
-        if(exitCode != 0 && doExit) {
+        if (exitCode != 0 && doExit) {
             System.exit(exitCode);
         }
     }
 
-    private static synchronized AAFCon<?> aafcon(PropAccess access) throws APIException, CadiException, LocatorException {
-        if(aafcon==null) {
-            aafcon = new AAFConHttp(access,Config.CM_URL);
+    public synchronized static Map<String,String> loadURLs(Access access) throws UnknownHostException, CadiException {
+        if(aaf_urls==null) {
+            Map<String,String> rv = new HashMap<>();
+            RegistrationPropHolder rph = new RegistrationPropHolder(access, 0);
+            String dot_le = access.getProperty(Config.AAF_LOCATOR_CONTAINER,null);
+            dot_le=dot_le==null?"":'.'+dot_le;
+            String version = access.getProperty(Config.AAF_API_VERSION,Config.AAF_DEFAULT_API_VERSION);
+            for(String u : new String[] {"locate","aaf","oauth","cm","gui","fs","hello","token","introspect"}) {
+                String tag;
+                String append=null;
+                switch(u) {
+                    case "aaf":   tag = Config.AAF_URL; break;
+                    case "locate":tag = Config.AAF_LOCATE_URL; break;
+                    case "oauth": tag = Config.AAF_URL_OAUTH; break;
+                    case "token": tag = Config.AAF_OAUTH2_TOKEN_URL; append="/token"; break;
+                    case "introspect": tag = Config.AAF_OAUTH2_INTROSPECT_URL; append="/introspect"; break;
+                    case "cm":    tag = Config.AAF_URL_CM; break;
+                    case "gui":   tag = Config.AAF_URL_GUI; break;
+                    case "fs":    tag = Config.AAF_URL_FS; break;
+                    case "hello": tag = Config.AAF_URL_HELLO; break;
+                    default:
+                        tag = "aaf_url_" + u;
+                }
+                String value;
+                if((value=access.getProperty(tag,null))==null) {
+                    String proto = "fs".equals(u)?"http://":"https://";
+                    String lhost;
+                    if("locate".equals(u)) {
+                        lhost=rph.default_fqdn;
+                    } else {
+                        lhost=Config.AAF_LOCATE_URL_TAG;
+                    }
+                    value = rph.replacements(AGENT_LOAD_URLS,
+                            proto + lhost + "/%CNS.%AAF_NS." + ("aaf".equals(u)?"service":u) + ':' + version,
+                            null,dot_le);
+                    if(append!=null) {
+                        value+=append;
+                    }
+                } else {
+                    value = rph.replacements(AGENT_LOAD_URLS, value,null,dot_le);
+                }
+                rv.put(tag, value);
+            };
+            aaf_urls = rv;
+        }
+        return aaf_urls;
+    }
+
+    public static void fillMissing(PropAccess access, Map<String, String> map) {
+        for(Entry<String, String> es : map.entrySet()) {
+            if(access.getProperty(es.getKey())==null) {
+                access.setProperty(es.getKey(),es.getValue());
+            }
+        }
+    }
+
+    private static synchronized AAFCon<?> aafcon(Access access) throws APIException, CadiException, LocatorException {
+        if (aafcon==null) {
+            aafcon = new AAFConHttp(access,Config.AAF_URL_CM);
         }
         return aafcon;
     }
 
     private static String getProperty(PropAccess pa, Env env, boolean secure, String tag, String prompt, Object ... def) {
         String value;
-        if((value=pa.getProperty(tag))==null) {
-            if(secure) {
+        if ((value=pa.getProperty(tag))==null) {
+            if (secure) {
                 value = new String(AAFSSO.cons.readPassword(prompt, def));
             } else {
                 value = AAFSSO.cons.readLine(prompt,def).trim();
             }
-            if(value!=null) {
-                if(value.length()>0) {
+            if (value!=null) {
+                if (value.length()>0) {
                     pa.setProperty(tag,value);
                     env.setProperty(tag,value);
-                } else if(def.length==1) {
+                } else if (def.length==1) {
                     value=def[0].toString();
                     pa.setProperty(tag,value);
                     env.setProperty(tag,value);
@@ -327,15 +449,18 @@ public class Agent {
     }
 
     private static String fqi(Deque<String> cmds) {
-        if(cmds.size()<1) {
+        if (cmds.size()<1) {
             String alias = env.getProperty(Config.CADI_ALIAS);
+            if(alias==null) {
+                alias = env.getProperty(Config.AAF_APPID);
+            }
             return alias!=null?alias:AAFSSO.cons.readLine("AppID: ");
         }
-        return cmds.removeFirst();    
+        return cmds.removeFirst();
     }
 
     private static String machine(Deque<String> cmds) throws UnknownHostException {
-        if(cmds.size()>0) {
+        if (cmds.size()>0) {
             return cmds.removeFirst();
         } else {
             String mach = env.getProperty(Config.HOSTNAME);
@@ -345,7 +470,7 @@ public class Agent {
 
     private static String[] machines(Deque<String> cmds)  {
         String machines;
-        if(cmds.size()>0) {
+        if (cmds.size()>0) {
             machines = cmds.removeFirst();
         } else {
             machines = AAFSSO.cons.readLine("Machines (sep by ','): ");
@@ -363,13 +488,13 @@ public class Agent {
         arti.setMechid(mechID!=null?mechID:AAFSSO.cons.readLine("AppID: "));
         arti.setMachine(machine!=null?machine:AAFSSO.cons.readLine("Machine (%s): ",InetAddress.getLocalHost().getHostName()));
         arti.setCa(AAFSSO.cons.readLine("CA: (%s): ","aaf"));
-        
+
         String resp = AAFSSO.cons.readLine("Types [file,pkcs12,jks,script] (%s): ", PKCS12);
-        for(String s : Split.splitTrim(',', resp)) {
+        for (String s : Split.splitTrim(',', resp)) {
             arti.getType().add(s);
         }
         // Always do Script
-        if(!resp.contains(SCRIPT)) {
+        if (!resp.contains(SCRIPT)) {
             arti.getType().add(SCRIPT);
         }
 
@@ -380,11 +505,11 @@ public class Agent {
         arti.setOsUser(AAFSSO.cons.readLine("OS User (%s): ", System.getProperty("user.name")));
         arti.setRenewDays(Integer.parseInt(AAFSSO.cons.readLine("Renewal Days (%s):", "30")));
         arti.setNotification(toNotification(AAFSSO.cons.readLine("Notification (mailto owner):", "")));
-        
+
         TimeTaken tt = trans.start("Create Artifact", Env.REMOTE);
         try {
             Future<Artifacts> future = aafcon.client(CM_VER).create("/cert/artifacts", artifactsDF, artifacts);
-            if(future.get(TIMEOUT)) {
+            if (future.get(TIMEOUT)) {
                 trans.info().printf("Call to AAF Certman successful %s, %s",arti.getMechid(), arti.getMachine());
             } else {
                 trans.error().printf("Call to AAF Certman failed, %s",
@@ -396,16 +521,16 @@ public class Agent {
     }
 
     private static String toNotification(String notification) {
-        if(notification==null) {
+        if (notification==null) {
             notification="";
-        } else if(notification.length()>0) {
-            if(notification.indexOf(':')<0) {
+        } else if (notification.length()>0) {
+            if (notification.indexOf(':')<0) {
                 notification = "mailto:" + notification;
             }
         }
         return notification;
     }
-    
+
 
     private static void readArtifact(Trans trans, AAFCon<?> aafcon, Deque<String> cmds) throws Exception {
         String mechID = fqi(cmds);
@@ -415,30 +540,30 @@ public class Agent {
         try {
             Future<Artifacts> future = aafcon.client(CM_VER)
                     .read("/cert/artifacts/"+mechID+'/'+machine, artifactsDF,"Authorization","Bearer " + trans.getProperty("oauth_token"));
-    
-            if(future.get(TIMEOUT)) {
+
+            if (future.get(TIMEOUT)) {
                 boolean printed = false;
-                for(Artifact a : future.value.getArtifact()) {
-                    AAFSSO.cons.printf("AppID:          %s\n",a.getMechid()); 
-                    AAFSSO.cons.printf("  Sponsor:       %s\n",a.getSponsor()); 
-                    AAFSSO.cons.printf("Machine:         %s\n",a.getMachine()); 
-                    AAFSSO.cons.printf("CA:              %s\n",a.getCa()); 
+                for (Artifact a : future.value.getArtifact()) {
+                    AAFSSO.cons.printf("AppID:          %s\n",a.getMechid());
+                    AAFSSO.cons.printf("  Sponsor:       %s\n",a.getSponsor());
+                    AAFSSO.cons.printf("Machine:         %s\n",a.getMachine());
+                    AAFSSO.cons.printf("CA:              %s\n",a.getCa());
                     StringBuilder sb = new StringBuilder();
                     boolean first = true;
-                    for(String t : a.getType()) {
-                        if(first) {first=false;}
+                    for (String t : a.getType()) {
+                        if (first) {first=false;}
                         else{sb.append(',');}
                         sb.append(t);
                     }
                     AAFSSO.cons.printf("Types:           %s\n",sb);
-                    AAFSSO.cons.printf("Namespace:       %s\n",a.getNs()); 
+                    AAFSSO.cons.printf("Namespace:       %s\n",a.getNs());
                     AAFSSO.cons.printf("Directory:       %s\n",a.getDir());
                     AAFSSO.cons.printf("O/S User:        %s\n",a.getOsUser());
                     AAFSSO.cons.printf("Renew Days:      %d\n",a.getRenewDays());
                     AAFSSO.cons.printf("Notification     %s\n",a.getNotification());
                     printed = true;
                 }
-                if(!printed) {
+                if (!printed) {
                     AAFSSO.cons.printf("Artifact for %s %s does not exist\n", mechID, machine);
                 }
             } else {
@@ -448,36 +573,36 @@ public class Agent {
             tt.done();
         }
     }
-    
+
     private static void copyArtifact(Trans trans, AAFCon<?> aafcon, Deque<String> cmds) throws Exception {
         String mechID = fqi(cmds);
         String machine = machine(cmds);
         String[] newmachs = machines(cmds);
-        if(machine==null || newmachs == null) {
+        if (machine==null || newmachs == null) {
             trans.error().log("No machines listed to copy to");
         } else {
             TimeTaken tt = trans.start("Copy Artifact", Env.REMOTE);
             try {
                 Future<Artifacts> future = aafcon.client(CM_VER)
                         .read("/cert/artifacts/"+mechID+'/'+machine, artifactsDF);
-            
-                if(future.get(TIMEOUT)) {
+
+                if (future.get(TIMEOUT)) {
                     boolean printed = false;
-                    for(Artifact a : future.value.getArtifact()) {
-                        for(String m : newmachs) {
+                    for (Artifact a : future.value.getArtifact()) {
+                        for (String m : newmachs) {
                             a.setMachine(m);
                             Future<Artifacts> fup = aafcon.client(CM_VER).update("/cert/artifacts", artifactsDF, future.value);
-                            if(fup.get(TIMEOUT)) {
+                            if (fup.get(TIMEOUT)) {
                                 trans.info().printf("Copy of %s %s successful to %s",mechID,machine,m);
                             } else {
                                 trans.error().printf("Call to AAF Certman failed, %s",
                                     errMsg.toMsg(fup));
                             }
-    
+
                             printed = true;
                         }
                     }
-                    if(!printed) {
+                    if (!printed) {
                         AAFSSO.cons.printf("Artifact for %s %s does not exist", mechID, machine);
                     }
                 } else {
@@ -497,31 +622,31 @@ public class Agent {
         try {
             Future<Artifacts> fread = aafcon.client(CM_VER)
                     .read("/cert/artifacts/"+mechID+'/'+machine, artifactsDF);
-    
-            if(fread.get(TIMEOUT)) {
+
+            if (fread.get(TIMEOUT)) {
                 Artifacts artifacts = new Artifacts();
-                for(Artifact a : fread.value.getArtifact()) {
+                for (Artifact a : fread.value.getArtifact()) {
                     Artifact arti = new Artifact();
                     artifacts.getArtifact().add(arti);
-                    
+
                     AAFSSO.cons.printf("For %s on %s\n", a.getMechid(),a.getMachine());
                     arti.setMechid(a.getMechid());
                     arti.setMachine(a.getMachine());
                     arti.setCa(AAFSSO.cons.readLine("CA: (%s): ",a.getCa()));
                     StringBuilder sb = new StringBuilder();
                     boolean first = true;
-                    for(String t : a.getType()) {
-                        if(first) {first=false;}
+                    for (String t : a.getType()) {
+                        if (first) {first=false;}
                         else{sb.append(',');}
                         sb.append(t);
                     }
-    
+
                     String resp = AAFSSO.cons.readLine("Types [file,jks,pkcs12] (%s): ", sb);
-                    for(String s : Split.splitTrim(',', resp)) {
+                    for (String s : Split.splitTrim(',', resp)) {
                         arti.getType().add(s);
                     }
                     // Always do Script
-                    if(!resp.contains(SCRIPT)) {
+                    if (!resp.contains(SCRIPT)) {
                         arti.getType().add(SCRIPT);
                     }
 
@@ -531,13 +656,13 @@ public class Agent {
                     arti.setOsUser(AAFSSO.cons.readLine("OS User (%s): ", a.getOsUser()));
                     arti.setRenewDays(Integer.parseInt(AAFSSO.cons.readLine("Renew Days (%s):", a.getRenewDays())));
                     arti.setNotification(toNotification(AAFSSO.cons.readLine("Notification (%s):", a.getNotification())));
-    
+
                 }
-                if(artifacts.getArtifact().size()==0) {
+                if (artifacts.getArtifact().size()==0) {
                     AAFSSO.cons.printf("Artifact for %s %s does not exist", mechID, machine);
                 } else {
                     Future<Artifacts> fup = aafcon.client(CM_VER).update("/cert/artifacts", artifactsDF, artifacts);
-                    if(fup.get(TIMEOUT)) {
+                    if (fup.get(TIMEOUT)) {
                         trans.info().printf("Call to AAF Certman successful %s, %s",mechID,machine);
                     } else {
                         trans.error().printf("Call to AAF Certman failed, %s",
@@ -552,17 +677,17 @@ public class Agent {
             tt.done();
         }
     }
-    
+
     private static void deleteArtifact(Trans trans, AAFCon<?> aafcon, Deque<String> cmds) throws Exception {
         String mechid = fqi(cmds);
         String machine = machine(cmds);
-        
+
         TimeTaken tt = trans.start("Delete Artifact", Env.REMOTE);
         try {
             Future<Void> future = aafcon.client(CM_VER)
                     .delete("/cert/artifacts/"+mechid+"/"+machine,"application/json" );
-    
-            if(future.get(TIMEOUT)) {
+
+            if (future.get(TIMEOUT)) {
                 trans.info().printf("Call to AAF Certman successful %s, %s",mechid,machine);
             } else {
                 trans.error().printf("Call to AAF Certman failed, %s %s, %s",
@@ -573,7 +698,7 @@ public class Agent {
         }
     }
 
-    
+
 
     private static boolean placeCerts(Trans trans, AAFCon<?> aafcon, Deque<String> cmds) throws Exception {
         boolean rv = false;
@@ -581,38 +706,42 @@ public class Agent {
         String machine = machine(cmds);
         String[] fqdns = Split.split(':', machine);
         String key;
-        if(fqdns.length>1) {
+        if (fqdns.length>1) {
             key = fqdns[0];
             machine = fqdns[1];
         } else {
             key = machine;
+            fqdns = machines(cmds);
         }
-        
+
         TimeTaken tt = trans.start("Place Artifact", Env.REMOTE);
         try {
             Future<Artifacts> acf = aafcon.client(CM_VER)
                     .read("/cert/artifacts/"+mechID+'/'+key, artifactsDF);
-            if(acf.get(TIMEOUT)) {
-                if(acf.value.getArtifact()==null || acf.value.getArtifact().isEmpty()) {
+            if (acf.get(TIMEOUT)) {
+                if (acf.value.getArtifact()==null || acf.value.getArtifact().isEmpty()) {
                     AAFSSO.cons.printf("===> There are no artifacts for %s on machine '%s'\n", mechID, key);
                 } else {
-                    for(Artifact a : acf.value.getArtifact()) {
+                    for (Artifact a : acf.value.getArtifact()) {
                         String osID = System.getProperty("user.name");
-                        if(a.getOsUser().equals(osID)) {
+                        if (a.getOsUser().equals(osID)) {
                             CertificateRequest cr = new CertificateRequest();
                             cr.setMechid(a.getMechid());
                             cr.setSponsor(a.getSponsor());
-                            for(int i=0;i<fqdns.length;++i) {
-                                cr.getFqdns().add(fqdns[i]);
+                            cr.getFqdns().add(machine);
+                            for (int i=0;i<fqdns.length;++i) {
+                               if(!machine.equals(fqdns[i])) {
+                                       cr.getFqdns().add(fqdns[i]);
+                               }
                             }
                             Future<String> f = aafcon.client(CM_VER)
                                     .updateRespondString("/cert/" + a.getCa()+"?withTrust",reqDF, cr);
-                            if(f.get(TIMEOUT)) {
+                            if (f.get(TIMEOUT)) {
                                 CertInfo capi = certDF.newData().in(TYPE.JSON).load(f.body()).asObject();
-                                for(String type : a.getType()) {
+                                for (String type : a.getType()) {
                                     PlaceArtifact pa = placeArtifact.get(type);
-                                    if(pa!=null) {
-                                        if(rv = pa.place(trans, capi, a,machine)) {
+                                    if (pa!=null) {
+                                        if (rv = pa.place(trans, capi, a,machine)) {
                                             notifyPlaced(a,rv);
                                         }
                                     }
@@ -626,6 +755,7 @@ public class Agent {
                         }
                     }
                 }
+                PropHolder.writeAll();
             } else {
                 trans.error().log(errMsg.toMsg(acf));
             }
@@ -634,7 +764,7 @@ public class Agent {
         }
         return rv;
     }
-    
+
     private static void notifyPlaced(Artifact a, boolean rv) {
     }
 
@@ -646,47 +776,50 @@ public class Agent {
         try {
             Future<Artifacts> acf = aafcon.client(CM_VER)
                     .read("/cert/artifacts/"+mechID+'/'+machine, artifactsDF);
-            if(acf.get(TIMEOUT)) {
+            if (acf.get(TIMEOUT)) {
                 // Have to wait for JDK 1.7 source...
                 //switch(artifact.getType()) {
-                if(acf.value.getArtifact()==null || acf.value.getArtifact().isEmpty()) {
+                if (acf.value.getArtifact()==null || acf.value.getArtifact().isEmpty()) {
                     AAFSSO.cons.printf("No Artifacts found for %s on %s ", mechID, machine);
                 } else {
                     String id = aafcon.defID();
                     boolean allowed;
-                    for(Artifact a : acf.value.getArtifact()) {
+                    for (Artifact a : acf.value.getArtifact()) {
                         allowed = id!=null && (id.equals(a.getSponsor()) ||
-                                (id.equals(a.getMechid()) 
+                                (id.equals(a.getMechid())
                                         && aafcon.securityInfo().defSS.getClass().isAssignableFrom(HBasicAuthSS.class)));
-                        if(!allowed) {
-                            Future<String> pf = aafcon.client(CM_VER).read("/cert/may/" + 
+                        if (!allowed) {
+                            Future<String> pf = aafcon.client(CM_VER).read("/cert/may/" +
                                     a.getNs()+"|certman|"+a.getCa()+"|showpass","*/*");
-                            if(pf.get(TIMEOUT)) {
+                            if (pf.get(TIMEOUT)) {
                                 allowed = true;
                             } else {
                                 trans.error().log(errMsg.toMsg(pf));
                             }
                         }
-                        if(allowed) {
+                        if (allowed) {
                             File dir = new File(a.getDir());
                             Properties props = new Properties();
                             FileInputStream fis = new FileInputStream(new File(dir,a.getNs()+".cred.props"));
                             try {
                                 props.load(fis);
-                                fis.close();
-                                fis = new FileInputStream(new File(dir,a.getNs()+".chal"));
-                                props.load(fis);
+                                File chalFile = new File(dir,a.getNs()+".chal");
+                                if(chalFile.exists()) {
+                                    fis.close();
+                                    fis = new FileInputStream(chalFile);
+                                    props.load(fis);
+                                }
                             } finally {
                                 fis.close();
                             }
-                            
+
                             File f = new File(dir,a.getNs()+".keyfile");
-                            if(f.exists()) {
-                                Symm symm = Symm.obtain(f);
-                                
-                                for(Iterator<Entry<Object,Object>> iter = props.entrySet().iterator(); iter.hasNext();) {
+                            if (f.exists()) {
+                                Symm symm = ArtifactDir.getSymm(f);
+
+                                for (Iterator<Entry<Object,Object>> iter = props.entrySet().iterator(); iter.hasNext();) {
                                     Entry<Object,Object> en = iter.next();
-                                    if(en.getValue().toString().startsWith("enc:")) {
+                                    if (en.getValue().toString().startsWith("enc:")) {
                                         System.out.printf("%s=%s\n", en.getKey(), symm.depass(en.getValue().toString()));
                                     }
                                 }
@@ -705,21 +838,21 @@ public class Agent {
         }
 
     }
-    
+
     private static void keypairGen(final Trans trans, final PropAccess access, final Deque<String> cmds) throws IOException {
         final String fqi = fqi(cmds);
         final String ns = FQI.reverseDomain(fqi);
         File dir = new File(access.getProperty(Config.CADI_ETCDIR,".")); // default to current Directory
         File f = new File(dir,ns+".key");
-        
-        if(f.exists()) {
+
+        if (f.exists()) {
             String line = AAFSSO.cons.readLine("%s exists. Overwrite? (y/n): ", f.getCanonicalPath());
-            if(!"Y".equalsIgnoreCase(line)) {
+            if (!"Y".equalsIgnoreCase(line)) {
                 System.out.println("Canceling...");
                 return;
             }
         }
-        
+
         KeyPair kp = Factory.generateKeyPair(trans);
         ArtifactDir.write(f, Chmod.to400, Factory.toString(trans, kp.getPrivate()));
         System.out.printf("Wrote %s\n", f.getCanonicalFile());
@@ -728,219 +861,178 @@ public class Agent {
         ArtifactDir.write(f, Chmod.to644, Factory.toString(trans, kp.getPublic()));
         System.out.printf("Wrote %s\n", f.getCanonicalFile());
     }
-    
-    private static void config(Trans trans, PropAccess pa, AAFCon<?> aafcon, Deque<String> cmds) throws Exception {
-        final String fqi = fqi(cmds);
-        final String rootFile = FQI.reverseDomain(fqi);
-        final File dir = new File(pa.getProperty(Config.CADI_ETCDIR, "."));
-        if(dir.exists()) {
-            System.out.println("Writing to " + dir.getCanonicalFile());
-        } else if(dir.mkdirs()) {
-            System.out.println("Created directory " + dir.getCanonicalFile());
-        } else {
-            System.err.println("Unable to create or write to " + dir.getCanonicalPath());
-            return;
-        }
-        
+
+    private static void config(Trans trans, PropAccess propAccess, String[] args, Deque<String> cmds) throws Exception {
         TimeTaken tt = trans.start("Get Configuration", Env.REMOTE);
         try {
-            boolean ok=false;
-            File fProps = File.createTempFile(rootFile, ".tmp",dir);
-            File fSecureTempProps = File.createTempFile(rootFile, ".cred.tmp",dir);
-            File fSecureProps = new File(dir,rootFile+".cred.props");
-            PrintStream psProps;
-
-            File fLocProps = new File(dir,rootFile + ".location.props");
-            if(!fLocProps.exists()) {
-                psProps = new PrintStream(new FileOutputStream(fLocProps));
-                try {
-                    psProps.println(HASHES);
-                    psProps.print("# Configuration File generated on ");
-                    psProps.println(new Date().toString());
-                    psProps.println(HASHES);
-                    for(String tag : LOC_TAGS) {
-                        psProps.print(tag);
-                        psProps.print('=');
-                        psProps.println(getProperty(pa, trans, false, tag, "%s: ",tag));
-                    }
-                } finally {
-                    psProps.close();
+            final String fqi = fqi(cmds);
+            Artifact arti = new Artifact();
+            arti.setDir(propAccess.getProperty(Config.CADI_ETCDIR, System.getProperty("user.dir")));
+            arti.setNs(FQI.reverseDomain(fqi));
+            PropHolder loc = PropHolder.get(arti, "location.props");
+            PropHolder cred = PropHolder.get(arti,"cred.props");
+            PropHolder app= PropHolder.get(arti,"props");
+            for(String c : args) {
+                int idx = c.indexOf('=');
+                if(idx>0) {
+                    app.add(c.substring(0,idx), c.substring(idx+1));
                 }
             }
+            app.add(Config.CADI_PROP_FILES, loc.getPath()+':'+cred.getPath());
 
-            psProps = new PrintStream(new FileOutputStream(fProps));
-            try {
-                PrintStream psCredProps = new PrintStream(new FileOutputStream(fSecureTempProps));
-                try {
-                    psCredProps.println(HASHES);
-                    psCredProps.print("# Configuration File generated on ");
-                    psCredProps.println(new Date().toString());
-                    psCredProps.println(HASHES);
-
-                    psProps.println(HASHES);
-                    psProps.print("# Configuration File generated on ");
-                    psProps.println(new Date().toString());
-                    psProps.println(HASHES);
-                    
-                    psProps.print(Config.CADI_PROP_FILES);
-                    psProps.print('=');
-                    psProps.print(fSecureProps.getCanonicalPath());
-                    psProps.print(File.pathSeparatorChar);
-                    psProps.println(fLocProps.getCanonicalPath());
-                    
-                    File fkf = new File(dir,rootFile+".keyfile");
-                    if(!fkf.exists()) {
-                        CmdLine.main(new String[] {"keygen",fkf.toString()});
+            for (String tag : LOC_TAGS) {
+                loc.add(tag, getProperty(propAccess, trans, false, tag, "%s: ",tag));
+            }
+
+            String keyfile = cred.getKeyPath();
+            if(keyfile!=null) {
+                File fkeyfile = new File(keyfile);
+                if(!fkeyfile.exists()) {
+                    ArtifactDir.write(fkeyfile,Chmod.to400,Symm.keygen());
+                }
+            }
+            cred.add(Config.CADI_KEYFILE, cred.getKeyPath());
+            final String ssoAppID = propAccess.getProperty(Config.AAF_APPID);
+            if(fqi!=null && fqi.equals(ssoAppID)) {
+                cred.addEnc(Config.AAF_APPPASS, propAccess, null);
+            // only Ask for Password when starting scratch
+            } else if(propAccess.getProperty(Config.CADI_PROP_FILES)==null) {
+                if(!configNoPasswd) {
+                    char[] pwd = AAFSSO.cons.readPassword("Password for %s (leave blank for NO password): ", fqi);
+                    if(pwd.length>0) {
+                        cred.addEnc(Config.AAF_APPPASS, new String(pwd));
                     }
-                    Symm filesymm = Symm.obtain(fkf);
-                    Map<String,String> normal = new TreeMap<>();
-                    Map<String,String> creds = new TreeMap<>();
-
-                    directedPut(pa, filesymm, normal,creds, Config.CADI_KEYFILE, fkf.getCanonicalPath());
-                    directedPut(pa, filesymm, normal,creds, Config.AAF_APPID,fqi);
-                    directedPut(pa, filesymm, normal,creds, Config.AAF_APPPASS,null);
-                    directedPut(pa, filesymm, normal,creds, Config.AAF_URL, Defaults.AAF_URL);
-                    
-
-                    String cts = pa.getProperty(Config.CADI_TRUSTSTORE);
-                    if(cts!=null) {
-                        File origTruststore = new File(cts);
-                        if(!origTruststore.exists()) {
-                            // Try same directory as cadi_prop_files
-                            String cpf = pa.getProperty(Config.CADI_PROP_FILES);
-                            if(cpf!=null) {
-                                for(String f : Split.split(File.pathSeparatorChar, cpf)) {
-                                    File fcpf = new File(f);
-                                    if(fcpf.exists()) {
-                                        int lastSep = cts.lastIndexOf(File.pathSeparator);
-                                        origTruststore = new File(fcpf.getParentFile(),lastSep>=0?cts.substring(lastSep):cts);
-                                        if(origTruststore.exists()) { 
-                                            break;
-                                        }
+                }
+            }
+
+            // load all properties that are already setup.
+            Map<String, String> aaf_urls = loadURLs(propAccess);
+            for(Entry<String, String> es : aaf_urls.entrySet()) {
+                app.add(es.getKey(), es.getValue());
+            }
+
+            app.add(Config.AAF_LOCATE_URL, Config.getAAFLocateUrl(propAccess));
+            app.add(Config.AAF_ENV,propAccess, "DEV");
+            String release = propAccess.getProperty(Config.AAF_DEPLOYED_VERSION);
+            if(release==null) {
+                release = System.getProperty(Config.AAF_DEPLOYED_VERSION,null);
+            }
+            if(release!=null) {
+                app.add(Config.AAF_DEPLOYED_VERSION, release);
+            }
+            for(Entry<Object, Object> aaf_loc_prop : propAccess.getProperties().entrySet()) {
+                String key = aaf_loc_prop.getKey().toString();
+                if(key.startsWith("aaf_locator")) {
+                    app.add(key, aaf_loc_prop.getValue().toString());
+                }
+            }
+
+            app.add(Config.AAF_APPID, fqi);
+
+            String cts = propAccess.getProperty(Config.CADI_TRUSTSTORE);
+            System.out.println("Passed in Truststore is " + cts);
+            if (cts!=null) {
+                File origTruststore = new File(cts);
+                File newTruststore = new File(app.getDir(),origTruststore.getName());
+                if(!newTruststore.exists()) {
+                    if (!origTruststore.exists()) {
+                        // Try same directory as cadi_prop_files
+                        String cpf = propAccess.getProperty(Config.CADI_PROP_FILES);
+                        if (cpf!=null) {
+                            for (String f : Split.split(File.pathSeparatorChar, cpf)) {
+                                File fcpf = new File(f);
+                                if (fcpf.exists()) {
+                                    int lastSep = cts.lastIndexOf(File.pathSeparator);
+                                    origTruststore = new File(fcpf.getParentFile(),lastSep>=0?cts.substring(lastSep):cts);
+                                    if (origTruststore.exists()) {
+                                        break;
                                     }
                                 }
-                                if(!origTruststore.exists()) {
-                                    throw new CadiException(cts + " does not exist");
-                                }
                             }
-                            
-                        }
-                        File newTruststore = new File(dir,origTruststore.getName());
-                        if(!newTruststore.exists()) {
-                            Files.copy(origTruststore.toPath(), newTruststore.toPath());
-                        }
-                        
-                        directedPut(pa, filesymm, normal,creds, Config.CADI_TRUSTSTORE,newTruststore.getCanonicalPath());
-                        directedPut(pa, filesymm, normal,creds, Config.CADI_TRUSTSTORE_PASSWORD,null);
-                    }
-                    
-                    if(aafcon!=null) { // get Properties from Remote AAF
-                        final String locator = getProperty(pa,aafcon.env,false,Config.AAF_LOCATE_URL,"AAF Locator URL: ");
-
-                        Future<Configuration> acf = aafcon.client(new SingleEndpointLocator(locator))
-                                .read("/configure/"+fqi+"/aaf", configDF);
-                        if(acf.get(TIMEOUT)) {
-                            for(Props props : acf.value.getProps()) {
-                                directedPut(pa, filesymm, normal,creds, props.getTag(),props.getValue());                    
+                            if (!origTruststore.exists()) {
+                                throw new CadiException(cts + " does not exist");
                             }
-                            ok = true;
-                        } else if(acf.code()==401){
-                            trans.error().log("Bad Password sent to AAF");
-                        } else {
-                            trans.error().log(errMsg.toMsg(acf));
                         }
-                    } else {
-                        String cpf = pa.getProperty(Config.CADI_PROP_FILES);
-                        if(cpf!=null){
-                            for(String f : Split.split(File.pathSeparatorChar, cpf)) {
-                                System.out.format("Reading %s\n",f);
-                                FileInputStream fis = new FileInputStream(f); 
-                                try {
-                                    Properties props = new Properties();
-                                    props.load(fis);
-                                    for(Entry<Object, Object> prop : props.entrySet()) {
-                                        directedPut(pa, filesymm, normal,creds, prop.getKey().toString(),prop.getValue().toString());
+
+                    }
+                    if (!newTruststore.exists() && origTruststore.exists()) {
+                        Files.copy(origTruststore.toPath(), newTruststore.toPath());
+                    }
+                }
+
+                System.out.println("New Truststore is " + newTruststore);
+                cred.add(Config.CADI_TRUSTSTORE, newTruststore.getCanonicalPath());
+                cred.add(Config.CADI_TRUSTSTORE_PASSWORD, "changeit" /* Java default */);
+
+                String cpf = propAccess.getProperty(Config.CADI_PROP_FILES);
+                if (cpf!=null){
+                    String[] propFiles = Split.splitTrim(File.pathSeparatorChar, cpf);
+                    for (int pfi = propFiles.length-1;pfi>=0;--pfi) {
+                        String f = propFiles[pfi];
+                        System.out.format("Reading %s\n",f);
+                        FileInputStream fis = new FileInputStream(f);
+                        try {
+                            Properties props = new Properties();
+                            props.load(fis);
+                            for (Entry<Object, Object> prop : props.entrySet()) {
+                                boolean lower = true;
+                                String key = prop.getKey().toString();
+                                if(LOC_TAGS.contains(key)) {
+                                    break;
+                                }
+                                for(int i=0;lower && i<key.length();++i) {
+                                    if(Character.isUpperCase(key.charAt(i))) {
+                                        lower = false;
+                                    }
+                                }
+                                if(lower) {
+                                    PropHolder ph = CRED_TAGS.contains(key)?cred:app;
+                                    if(key.endsWith("_password")) {
+                                        ph.addEnc(key, prop.getValue().toString());
+                                    } else {
+                                        ph.add(key, prop.getValue().toString());
                                     }
-                                } finally {
-                                    fis.close();
                                 }
                             }
+                        } finally {
+                            fis.close();
                         }
-                        ok = true;
                     }
-                    if(ok) {
-                        for(Entry<String, String> es : normal.entrySet()) {
-                            psProps.print(es.getKey());
-                            psProps.print('=');
-                            psProps.println(es.getValue());
-                        }
-                        
-                        for(Entry<String, String> es : creds.entrySet()) {
-                            psCredProps.print(es.getKey());
-                            psCredProps.print('=');
-                            psCredProps.println(es.getValue());
-                        }
-                        
-                        File newFile = new File(dir,rootFile+".props");
-                        if(newFile.exists()) {
-                            File backup = new File(dir,rootFile+".props.backup");
-                            newFile.renameTo(backup);
-                            System.out.println("Backed up to " + backup.getCanonicalPath());
-                        }
-                        fProps.renameTo(newFile);
-                        System.out.println("Created " + newFile.getCanonicalPath());
-                        fProps = newFile;
-                        
-                        if(fSecureProps.exists()) {
-                            File backup = new File(dir,fSecureProps.getName()+".backup");
-                            fSecureProps.renameTo(backup);
-                            System.out.println("Backed up to " + backup.getCanonicalPath());
+                } else {
+                    aafcon = aafcon(propAccess);
+                    if (aafcon!=null) { // get Properties from Remote AAF
+                        for (Props props : aafProps(trans,aafcon,getProperty(propAccess,aafcon.env,false,Config.AAF_LOCATE_URL,"AAF Locator URL: "),fqi)) {
+                            PropHolder ph = CRED_TAGS.contains(props.getTag())?cred:app;
+                            if(props.getTag().endsWith("_password")) {
+                                ph.addEnc(props.getTag(), props.getValue());
+                            } else {
+                                ph.add(props.getTag(), props.getValue());
+                            }
                         }
-                        fSecureTempProps.renameTo(fSecureProps);
-                        System.out.println("Created " + fSecureProps.getCanonicalPath());
-                        fProps = newFile;
-                    } else {
-                        fProps.delete();
-                        fSecureTempProps.delete();
+
                     }
-                } finally {
-                    psCredProps.close();
                 }
-            } finally {
-                psProps.close();
             }
+
+            PropHolder.writeAll();
         } finally {
             tt.done();
         }
     }
 
-    private static List<String> CRED_TAGS = Arrays.asList(new String[] {
-            Config.CADI_KEYFILE,
-            Config.AAF_APPID, Config.AAF_APPPASS,
-            Config.CADI_KEYSTORE, Config.CADI_KEYSTORE_PASSWORD, Config.CADI_KEY_PASSWORD,
-            Config.CADI_TRUSTSTORE,Config.CADI_TRUSTSTORE_PASSWORD,
-            Config.CADI_ALIAS, Config.CADI_X509_ISSUERS
-            });
-
-    private static List<String> LOC_TAGS = Arrays.asList(new String[] {Config.CADI_LATITUDE, Config.CADI_LONGITUDE});
-    
-    private static void directedPut(final PropAccess orig, final Symm symm, final Map<String,String> main, final Map<String,String> secured, final String tag, final String value) throws IOException {
-        if(!LOC_TAGS.contains(tag)) { // Location already covered
-            String val = value==null?orig.getProperty(tag):value;
-            if(tag.endsWith("_password")) {
-                if(val.length()>4) {
-                    if(val.startsWith("enc:")) {
-                        val = orig.decrypt(val, true);
-                    }
-                    val = "enc:" + symm.enpass(val);
-                }
-            }
-            if(CRED_TAGS.contains(tag)) {
-                secured.put(tag, val);
-            } else {
-                main.put(tag, val);
-            }
+    public static List<Props> aafProps(Trans trans, AAFCon<?> aafcon, String locator, String fqi) throws CadiException, APIException, LocatorException {
+        Future<Configuration> acf = aafcon.client(new SingleEndpointLocator(locator))
+                .read("/configure/"+fqi+"/aaf", configDF);
+        if (acf.get(TIMEOUT)) {
+            return acf.value.getProps();
+        } else if (acf.code()==401){
+            trans.error().log("Bad Password sent to AAF");
+        } else if (acf.code()==404){
+            trans.error().log("This version of AAF does not support remote Properties");
+        } else {
+            trans.error().log(errMsg.toMsg(acf));
         }
+        return new ArrayList<>();
     }
 
     private static void validate(final PropAccess pa) throws LocatorException, CadiException, APIException {
@@ -950,12 +1042,12 @@ public class Agent {
             @Override
             public Void code(Rcli<?> client) throws CadiException, ConnectException, APIException {
                 Future<Perms> fc = client.read("/authz/perms/user/"+aafcon.defID(),permDF);
-                if(fc.get(aafcon.timeout)) {
+                if (fc.get(aafcon.timeout)) {
                     System.out.print("Success connecting to ");
                     System.out.println(client.getURI());
                     System.out.print("   Permissions for ");
                     System.out.println(aafcon.defID());
-                    for(Perm p : fc.value.getPerm()) {
+                    for (Perm p : fc.value.getPerm()) {
                         System.out.print('\t');
                         System.out.print(p.getType());
                         System.out.print('|');
@@ -973,12 +1065,12 @@ public class Agent {
 
     /**
      * Check returns Error Codes, so that Scripts can know what to do
-     * 
+     *
      *   0 - Check Complete, nothing to do
      *   1 - General Error
      *   2 - Error for specific Artifact - read check.msg
      *   10 - Certificate Updated - check.msg is email content
-     *   
+     *
      * @param trans
      * @param aafcon
      * @param cmds
@@ -989,22 +1081,22 @@ public class Agent {
         int exitCode=1;
         String mechID = fqi(cmds);
         String machine = machine(cmds);
-        
+
         TimeTaken tt = trans.start("Check Certificate", Env.REMOTE);
         try {
-        
+
             Future<Artifacts> acf = aafcon.client(CM_VER)
                     .read("/cert/artifacts/"+mechID+'/'+machine, artifactsDF);
-            if(acf.get(TIMEOUT)) {
+            if (acf.get(TIMEOUT)) {
                 // Have to wait for JDK 1.7 source...
                 //switch(artifact.getType()) {
-                if(acf.value.getArtifact()==null || acf.value.getArtifact().isEmpty()) {
+                if (acf.value.getArtifact()==null || acf.value.getArtifact().isEmpty()) {
                     AAFSSO.cons.printf("No Artifacts found for %s on %s", mechID, machine);
                 } else {
                     String id = aafcon.defID();
                     GregorianCalendar now = new GregorianCalendar();
-                    for(Artifact a : acf.value.getArtifact()) {
-                        if(id.equals(a.getMechid())) {
+                    for (Artifact a : acf.value.getArtifact()) {
+                        if (id.equals(a.getMechid())) {
                             File dir = new File(a.getDir());
                             Properties props = new Properties();
                             FileInputStream fis = new FileInputStream(new File(dir,a.getNs()+".props"));
@@ -1013,24 +1105,25 @@ public class Agent {
                             } finally {
                                 fis.close();
                             }
-                            
-                            String prop;                        
+
+                            String prop;
                             File f;
-    
-                            if((prop=trans.getProperty(Config.CADI_KEYFILE))==null ||
+
+                            if ((prop=trans.getProperty(Config.CADI_KEYFILE))==null ||
                                 !(f=new File(prop)).exists()) {
                                     trans.error().printf("Keyfile must exist to check Certificates for %s on %s",
                                         a.getMechid(), a.getMachine());
                             } else {
                                 String ksf = trans.getProperty(Config.CADI_KEYSTORE);
                                 String ksps = trans.getProperty(Config.CADI_KEYSTORE_PASSWORD);
-                                if(ksf==null || ksps == null) {
+                                if (ksf==null || ksps == null) {
                                     trans.error().printf("Properties %s and %s must exist to check Certificates for %s on %s",
                                             Config.CADI_KEYSTORE, Config.CADI_KEYSTORE_PASSWORD,a.getMechid(), a.getMachine());
                                 } else {
+                                    Symm symm = ArtifactDir.getSymm(f);
+
                                     KeyStore ks = KeyStore.getInstance("JKS");
-                                    Symm symm = Symm.obtain(f);
-                                    
+
                                     fis = new FileInputStream(ksf);
                                     try {
                                         ks.load(fis,symm.depass(ksps).toCharArray());
@@ -1040,7 +1133,7 @@ public class Agent {
                                     X509Certificate cert = (X509Certificate)ks.getCertificate(mechID);
                                     String msg = null;
 
-                                    if(cert==null) {
+                                    if (cert==null) {
                                         msg = String.format("X509Certificate does not exist for %s on %s in %s",
                                                 a.getMechid(), a.getMachine(), ksf);
                                         trans.error().log(msg);
@@ -1049,28 +1142,28 @@ public class Agent {
                                         GregorianCalendar renew = new GregorianCalendar();
                                         renew.setTime(cert.getNotAfter());
                                         renew.add(GregorianCalendar.DAY_OF_MONTH,-1*a.getRenewDays());
-                                        if(renew.after(now)) {
-                                            msg = String.format("X509Certificate for %s on %s has been checked on %s. It expires on %s; it will not be renewed until %s.\n", 
+                                        if (renew.after(now)) {
+                                            msg = String.format("X509Certificate for %s on %s has been checked on %s. It expires on %s; it will not be renewed until %s.\n",
                                                     a.getMechid(), a.getMachine(),Chrono.dateOnlyStamp(now),cert.getNotAfter(),Chrono.dateOnlyStamp(renew));
                                             trans.info().log(msg);
                                             exitCode = 0; // OK
                                         } else {
-                                            trans.info().printf("X509Certificate for %s on %s expiration, %s, needs Renewal.\n", 
+                                            trans.info().printf("X509Certificate for %s on %s expiration, %s, needs Renewal.\n",
                                                     a.getMechid(), a.getMachine(),cert.getNotAfter());
                                             cmds.offerLast(mechID);
                                             cmds.offerLast(machine);
-                                            if(placeCerts(trans,aafcon,cmds)) {
-                                                msg = String.format("X509Certificate for %s on %s has been renewed. Ensure services using are refreshed.\n", 
+                                            if (placeCerts(trans,aafcon,cmds)) {
+                                                msg = String.format("X509Certificate for %s on %s has been renewed. Ensure services using are refreshed.\n",
                                                         a.getMechid(), a.getMachine());
                                                 exitCode = 10; // Refreshed
                                             } else {
-                                                msg = String.format("X509Certificate for %s on %s attempted renewal, but failed. Immediate Investigation is required!\n", 
+                                                msg = String.format("X509Certificate for %s on %s attempted renewal, but failed. Immediate Investigation is required!\n",
                                                         a.getMechid(), a.getMachine());
                                                 exitCode = 1; // Error Renewing
                                             }
                                         }
                                     }
-                                    if(msg!=null) {
+                                    if (msg!=null) {
                                         FileOutputStream fos = new FileOutputStream(a.getDir()+'/'+a.getNs()+".msg");
                                         try {
                                             fos.write(msg.getBytes());
@@ -1079,7 +1172,7 @@ public class Agent {
                                         }
                                     }
                                 }
-                                
+
                             }
                         }
                     }
@@ -1095,7 +1188,7 @@ public class Agent {
     }
 
 }
-            
-        
+
+