Fortify Sys Reqs 20.1.0
Fortify Sys Reqs 20.1.0
Fortify Software
Software Version: 20.1.0
System Requirements
Legal Notices
Micro Focus
The Lawn
22-30 Old Bath Road
Newbury, Berkshire RG14 1QN
UK
https://www.microfocus.com
Warranty
The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in
the express warranty statements accompanying such products and services. Nothing herein should be construed as
constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained
herein. The information contained herein is subject to change without notice.
Copyright Notice
© Copyright 2001 - 2020 Micro Focus or one of its affiliates
Trademark Notices
All trademarks, service marks, product names, and logos included in this document are the property of their respective
owners.
Documentation Updates
The title page of this document contains the following identifying information:
l Software Version number
l Document Release Date, which changes each time the document is updated
l Software Release Date, which indicates the release date of this version of the software
This document was produced on October 07, 2020. To check for recent updates or to verify that you are using the most
recent edition of a document, go to:
https://www.microfocus.com/support-and-services/documentation
Contents
Preface 6
Contacting Micro Focus Fortify Customer Support 6
For More Information 6
About the Documentation Set 6
Change Log 7
Introduction 8
Software Delivery 8
Software Licenses 8
Fortify Static Code Analyzer Requirements 8
Hardware Requirements 9
Software Requirements 9
Platforms and Architectures 9
Supported Languages 10
Supported Build Tools 12
Supported Compilers 13
Secure Code Plugins 14
Single Sign-On (SSO) 15
Service Integrations for Fortify Static Code Analyzer Tools 15
Fortify Software Security Content 16
Fortify Software Security Center Server Requirements 16
Hardware Requirements 16
Database Hardware Requirements 16
Database Performance Metrics for Minimum and Recommended Hardware
Requirements 17
Platforms and Architectures 17
Application Servers 18
Fortify Software Security Center Database 18
Deploying Fortify Software Security Center to a Kubernetes Cluster (Optional Deployment
Strategy) 19
Kubernetes: Versions 1.14–1.17 19
Locally-Installed Tools Required 19
Additional Requirements 20
Browsers 20
Authentication Systems 21
Hardware Requirements 36
Software Requirements 36
Ports and Protocols 36
Required Connections 37
Optional Connections 38
Connections for Tools 39
Fortify WebInspect Enterprise Sensor 40
Fortify WebInspect Enterprise Notes and Limitations 40
Fortify License and Infrastructure Manager Requirements 40
Hardware Requirements 40
Software Requirements 41
Version Compatibility Matrix 42
Fortify Software Component Compatibility 42
FPR File Compatibility 42
Virtual Machine Support 43
Technologies and Features no Longer Supported in this Release 43
Technologies and Features to Lose Support in the Next Release 44
Acquiring Fortify Software 45
About Verifying Software Downloads 48
Preparing Your System for Digital Signature Verification 48
Verifying Software Downloads 49
Assistive Technologies (Section 508) 49
Preface
Contacting Micro Focus Fortify Customer Support
You can contact Micro Focus Fortify Customer Support, manage your Support cases, acquire licenses,
and manage your account on the following website:
https://softwaresupport.softwaregrp.com
Change Log
The following table lists revisions made to this document.
Revision 4: Added:
October 7, 2020
l "Software Requirements" on page 27 - Inadvertently omitted from
document.
Revision 3: Updated:
August 19, 2020
l "Supported Build Tools" on page 12 - New supported version for
xcodebuild available with Micro Focus Fortify Static Code Analyzer
version 20.1.1
Revision 2: Updated:
June 19, 2020
l "Supported Build Tools" on page 12 and "Supported Compilers" on
page 13 - New supported versions for xcodebuild, and swiftc that are
available with Micro Focus Fortify Static Code Analyzer version 20.1.1
Revision 1: Updated:
June 1, 2020
l "Supported Build Tools" on page 12 and "Supported Compilers" on
page 13 - New supported versions for xcodebuild, swiftc, and Clang that
are available with Micro Focus Fortify Static Code Analyzer version
20.1.1
l "Software Requirements" on page 35 - Updated the supported IIS
versions and recommended browsers for WebInspect Enterprise server
Software Delivery
Micro Focus Fortify Software is delivered only electronically. It is not available on disc. See "Acquiring
Fortify Software" on page 45 for more information.
Software Licenses
Micro Focus Fortify Software products require a license.
For Micro Focus Fortify Software Security Center, Micro Focus Fortify Static Code Analyzer, Micro
Focus Fortify Audit Workbench, Micro Focus Fortify Secure Code Plugins, Micro Focus Fortify
ScanCentral, and Micro Focus Fortify WebInspect Agent, you must download the Fortify licenses for
your purchases from either the Fortify Customer Portal (https://support.fortify.com) or Micro Focus
Fortify Customer Support (https://softwaresupport.softwaregrp.com). To access either location, use
the credentials that Micro Focus Fortify Customer Support has provided.
To download the Fortify license from the Fortify Customer Portal:
1. Log onto the Fortify Customer Portal.
2. Click Download Licenses, and then click the link for the license you want to use.
For Micro Focus Fortify WebInspect and Micro Focus Fortify WebInspect Enterprise, you will receive an
email with instructions for how to activate your product.
Hardware Requirements
Fortify recommends that you install Micro Focus Fortify Static Code Analyzer on a high-end processor
with at least 16 GB of RAM. If you plan to scan dynamic languages such as JavaScript, TypeScript,
Python, PHP, or Ruby, Fortify recommends that you have 32 GB of RAM. If your software is complex,
you might require more RAM. See the content about improving performance in the Micro Focus Fortify
Static Code Analyzer User Guide for more information.
Increasing the number of processor cores and increasing memory both result in faster processing.
Software Requirements
Micro Focus Fortify Static Code Analyzer requires Java 8. The Fortify SCA and Applications installer
installs OpenJDK/JRE 1.8.0_181.
Translating .NET and Visual Studio C/C++ projects requires the Windows operating system and the
.NET Framework version 4.7.2 or later.
Fortify Static Code Analyzer Tools (including Secure Code Plugins) support the platforms and
architectures listed in the following table.
Windows 8.1, 10
Supported Languages
Micro Focus Fortify Static Code Analyzer supports the programming languages listed in the following
table.
Language Versions
ABAP/BSP 6
ActionScript 3.0
Angular 2,4,5,6,7
Apex 36
ASP.NET 2.0–4.8
C# 5, 6, 7, 8
Language Versions
COBOL IBM Enterprise COBOL for z/OS 3.4.1 with CICS, IMS, DB2, and IBM MQ
ColdFusion 8, 9, 10
Go 1.12, 1.13
MXML (Flex) 4
PL/SQL 8.1.6
Ruby 1.9.3
Swift 5
See "Supported Compilers" on page 13 for supported swiftc versions.
Language Versions
XML 1.0
Bamboo (see the Atlassian The Fortify App for Bamboo is available from the
Marketplace for Atlassian Marketplace.
supported versions)
Gradle 2.13, 4.x (4.10.3 and The Fortify Static Code Analyzer Gradle build integration
earlier) supports the following language/platform combinations:
l Java/Windows, Linux, and macOS
l Kotlin/Windows and Linux
l C/Linux
l C++/Linux
Jenkins (see the Jenkins Plugin The Fortify Jenkins plugin is available from the Jenkins
Index for supported Plugins Index at https://plugins.jenkins.io/fortify.
versions)
Xcodebuild 11, 11.1, 11.2.1, 11.3, Note: Xcodebuild version 11.4.1, 11.5, and 11.6
11.3.1, 11.4.1, 11.5, 11.6 support is available with Fortify Static Code Analyzer
version 20.1.1.
Supported Compilers
Micro Focus Fortify Static Code Analyzer supports the compilers listed in the following table.
Plugin /
Extension IDE and Version Notes
Security (see the Visual Studio Marketplace for Security Assistant Extension for Visual
Assistant supported versions) Studio is available from the Visual Studio
Extension for Marketplace.
Visual Studio
Fortify Software Security Center Bug 20.1.0 Audit Workbench, Eclipse Plugin,
Tracker Visual Studio Extension
Hardware Requirements
Micro Focus Fortify Software Security Center requires the hardware specifications listed in the following
table.
RAM 8 GB 64 GB
Note: Although Fortify Software Security Center has not been tested on all Linux variants, most
distributions are not known to have issues.
Application Servers
Micro Focus Fortify Software Security Center supports Apache Tomcat version 9.x for the following
JDK versions:
l Red Hat OpenJDK 8
l SUSE OpenJDK 8
l Oracle JDK 8
l Zulu OpenJDK 8 from Azul (installation of fontconfig, DejaVu Sans font and DejaVu Serif font is
Collation /
Database Versions Character Set Driver
Oracle 12c AL32UTF8 for all Oracle Database 12c Release 2 (12.2.x) JDBC Driver
Release 2 languages
Driver class:
19c WE8MSWIN1252 oracle.jdbc.OracleDriver
for US English JAR file:
ojdbc8.jar (for Java 8)
Collation /
Database Versions Character Set Driver
SQL Server 2016 Make sure to use The driver is included in the Fortify Software
the case-sensitive Security Center WAR file.
2017
(CS) option when
Microsoft JDBC Driver 8.2 for SQL Server
2019 choosing your
collation method. Driver class:
For example: com.microsoft.sqlserver.
jdbc.SQLServerDriver
SQL_
Latin1_
General_
CP1_CS_AS
Note: Fortify does not support the direct conversion from one database server type to another,
such as converting from MySQL to Oracle. To do this, you must use the Server API to move data
from your current Fortify Software Security Center instance to a new Fortify Software Security
Center instance that uses the database server type you want to use going forward. Micro Focus
Professional Services can assist you with this process.
Additional Requirements
l Kubeconfig file for the Kubernetes cluster
l Docker Hub account with access to Fortify Software Security Center images
Note: If you need access to Fortify Docker Organization on Docker Hub, contact
[email protected] with your first name, your last name, and your Docker account
name. Micro Focus Fortify will then give you access to the Fortify Docker organization that
contains the Fortify Software Security Center images.
l DNS name for the Fortify Software Security Center web application (address used to access the
service)
l Java keystore for setting up HTTPS (For details, see the Micro Focus Fortify Software Security
Center User Guide) The keystore must contain a CA certificate and a server certificate for the Fortify
Software Security Center DNS name with an associated private key.
l Keystore password
Browsers
Fortify recommends that you use one of the browsers listed in the following table and a screen
resolution of 1400 x 800.
Browser Version
Safari 11
Authentication Systems
Micro Focus Fortify Software Security Center supports the following directory services:
l LDAP: LDAP 3 compatible
Important! Although Fortify supports the use of multiple LDAP servers, it does not support the
use of multiple LDAP servers behind a load balancer.
BIRT Reporting
Micro Focus Fortify Software Security Center custom reports support Business Intelligence and
Reporting Technology (BIRT) Designer version 4.4.2.
Application Servers
Micro Focus Fortify ScanCentral supports Apache Tomcat version 9.0.x for Java 8.
Intended
Use Equation
Intended
Use Equation
Supported Languages
Fortify ScanCentral supports offloading project translation to ScanCentral sensors for the following
languages. See "Supported Languages" on page 10 for specific supported versions.
l .NET applications in C# and VB.NET (.NET Core, .NET Standard, ASP.NET)
Note: Translation of .NET applications require .NET Framework version 4.7.2 or later.
l ABAP
l Apex
l Classic ASP
l ColdFusion
l Java
l JavaScript
l PHP
l PL/SQL
l Python
l Ruby
l T-SQL
l TypeScript
l Visual Basic
Gradle 6.x
Maven 3.x
MSBuild 16.4
Oracle HotSpot 5, 6, 7, 8
Red Hat JBoss Enterprise Application Platform 5.1.2, 5.2.0, 6.0.1, 6.1.1, 6.2.0, 6.3.0, 6.4.0
Jetty 9.3
WildFly 10.1
.NET Frameworks
Fortify WebInspect Agent supports .NET Framework versions 2.0, 3.0, 3.5, 4.0, 4.5, 4.5.1, and 4.7.
Running as Administrator
Micro Focus Fortify WebInspect requires administrative privileges for proper operation of all features.
Refer to the Windows operating system documentation for instructions on changing the privilege level
to run Fortify WebInspect as an administrator.
Hardware Requirements
Fortify recommends that you install Micro Focus Fortify WebInspect on a system that conforms to the
supported components listed in the following table. Fortify does not support beta or pre-release
versions of operating systems, service packs, and required third-party components.
Processor 2.5 GHz quad-core Complex applications might benefit from additional cores.
or faster
Hard disk 40 GB Using SQL Express and storing scans locally requires
additional disk space per scan.
Software Requirements
Micro Focus Fortify WebInspect runs on and works with the software packages listed in the following
table.
Windows 8.1
Internet Explorer 10
default settings. Micro Focus Fortify WebInspect requires that the default instance is named
SQLEXPRESS.
When using the full edition of SQL Server:
l You can install the full version of SQL Server on the local host or nearby (co-located). You can
configure this option in Fortify WebInspect Application Settings (Edit > Application Settings >
Database).
l The account specified for the database connection must also be a database owner (DBO) for the
named database. However, the account does not require sysadmin (SA) privileges for the database
server. If the database administrator (DBA) did not generate the database for the specified user,
then the account must also have the permission to create a database and to manipulate the security
permissions. The DBA can rescind these permissions after Fortify WebInspect sets up the database,
but the account must remain a DBO for that database.
WebInspect on Docker
Fortify WebInspect on Docker has the requirements listed in the following table.
Windows 10
Required Connections
The following table lists the ports and protocols Micro Focus Fortify WebInspect uses to make required
connections.
Fortify Target host Scan target host Any HTTP Fortify WebInspect must connect to the
WebInspect web application or web service to be
to target scanned.
host
Fortify SQL Server Express SQLEXPRESS service 1433 SQL TCP Used to maintain the scan data and to
WebInspect or SQL Server on localhost or SQL generate reports within the Fortify
to SQL Standard/Enterprise TCP service locally WebInspect application.
database installed or remote
host
Optional Connections
The following table lists the ports and protocols Micro Focus Fortify WebInspect uses to make optional
connections.
Fortify Fortify Lease Concurrent User 443 Web Required for Fortify WebInspect
WebInspect WebInspect license services client to lease and use a
to Fortify LIM over SSL Concurrent User license
License and maintained in a LIM license pool.
(Local
Infrastructure You can detach the client license
Licensing
Manager from LIM after activation to avoid
Service)
(LIM) a constant connection.
Fortify Fortify User-specified Fortify 443 or HTTP or The Enterprise Server menu
WebInspect WebInspect WebInspect server user- HTTPS connects Fortify WebInspect as a
to Fortify Enterprise specified over SSL client to the enterprise security
WebInspect server solution to transfer findings and
Enterprise user role and permissions
management.
Fortify Fortify User-specified Fortify 443 or HTTP or Separate from the Fortify
WebInspect WebInspect WebInspect server user- HTTPS WebInspect UI, you can configure
sensor Enterprise specified over SSL the local installation as a remote
service to server scan engine for use by the
Fortify enterprise security solution
WebInspect community. This is done through a
Enterprise Windows Service. This constitutes
a different product from Fortify
WebInspect desktop and is
recommended to be run on its
own, non-user-focused machine.
Browser to localhost Manual Step-Mode Scan Dynamic, HTTP or Fortify WebInspect serves as a web
Fortify 8081, or HTTPS proxy to the browser, enabling
Fortify QC server User-specified ALM server Server- HTTP or Permits submission of findings as
WebInspect specified HTTPS defects to the ALM bug tracker.
to Quality over SSL
Center
Enterprise
(ALM)
Web Proxy To target host localhost 8080 or HTTP or Intercepts and displays web traffic
user- HTTPS
specified over SSL
Web Form To target host localhost Dynamic, HTTP or Intercepts web traffic and captures
Editor 8100, or HTTPS submitted forms
user- over SSL
specified
Login or To target host localhost Dynamic, HTTP or Records browser sessions for replay
Workflow 8081, or HTTPS during scan
Macro user- over SSL
Recorders specified
Web Fortify WebInspect Target User- HTTP Scanner for identifying rogue web
Discovery machine to host specified and applications hosted among the targeted
targeted IP range network range HTTPS scanned IP and port ranges
range over SSL
Use to provide targets to Fortify
WebInspect (manually)
Important! Visual Studio Express versions do not support third-party extensions. Therefore, these
versions do not meet the software requirements to use the WebInspect SDK.
Product Versions
Note: Product versions that are not specifically listed in this document are not supported.
Important! This is opposite the requirement for Fortify Software Security Center databases as
described in "Fortify Software Security Center Database" on page 18.
Hardware Requirements
The following table lists the hardware requirements for the Micro Focus Fortify WebInspect Enterprise
server.
RAM 16 GB Recommended
8 GB Minimum
Software Requirements
Micro Focus Fortify WebInspect Enterprise server runs on and works with the software packages listed
in the following table.
Internet Explorer 11
Hardware Requirements
The following table lists the hardware requirements for Fortify WebInspect Enterprise Administrative
Console.
RAM 4 GB Minimum
Hard disk 2 GB
Software Requirements
The Fortify WebInspect Enterprise Administrative Console runs on and works with the software
packages listed in the following table.
Windows 8.1
Required Connections
The following table lists the ports and protocols Micro Focus Fortify WebInspect Enterprise uses to
make required connections.
URL or
Direction Endpoint Details Port Protocol Notes
Fortify WebInspect SQL Server SQL TCP 1433 or SQL TCP Used to maintain the scan data
Enterprise Manager Standard/Enterprise service on user- and full Enterprise environment.
server to SQL locally specified Custom configurations of
database installed or SQL Server are permitted,
remote host including port changes and
encrypted communication.
Fortify WebInspect Fortify Software User- 8180 or HTTP or As a modular add-on, Fortify
Enterprise Manager Security Center specified user- HTTPS WebInspect Enterprise requires a
machine to Fortify server Fortify specified over SSL connection to its core Fortify
Software Security Software Software Security Center server.
Center server Security
Center Note: This connection is
server required only if you integrate
Fortify WebInspect Enterprise
with Fortify Software Security
Center.
Sensor machines to Fortify WebInspect User- 443 or HTTPS Communication is two-way HTTP
Fortify WebInspect Enterprise server specified user- over SSL traffic, initiated in-bound by the
Enterprise Manager Fortify specified Fortify WebInspect sensor
server WebInspect machine.
Enterprise
server
Browser users to Fortify WebInspect User- 443 or HTTPS You can configure Fortify
Fortify WebInspect Enterprise server specified user- over SSL WebInspect Enterprise not to use
Enterprise server UI Fortify specified SSL, but tests indicate that it might
WebInspect affect the product usability.
Enterprise
server
Browser user to Fortify Software User- 8180 or HTTP or You can configure the Fortify
Fortify Software Security Center specified user- HTTPS Software Security Center server on
Security Center UI server Fortify specified over SSL any available port during
Software installation.
Security
Center
server
Optional Connections
The following table lists the ports and protocols Micro Focus Fortify WebInspect Enterprise uses to
make optional connections.
Fortify Fortify User-specified Fortify 443 or HTTPS Communication is two-way HTTP traffic,
WebInspect WebInspect WebInspect user- over SSL initiated in-bound by the Fortify
desktop Enterprise Enterprise server specified WebInspect desktop machine.
machines to server
Fortify
WebInspect
Enterprise
Manager
server
Fortify Fortify https://licenseservice. 443 HTTPS For one-time activation of the Fortify
WebInspect Licensing fortify.microfocus.com over SSL WebInspect Enterprise server license as
Enterprise Service well as periodic checks during an update.
Manager You may optionally use the following:
machine to
l An offline activation process instead of
Fortify
using this direct connection
License
activation l Upstream proxy with authentication
server instead of a direct Internet connection
Fortify SmartUpdate https://smartupdate. 443 HTTPS Used to acquire product updates as well
WebInspect fortify.microfocus.com over SSL as all connected clients (Fortify
Enterprise WebInspect sensors and Fortify
Manager WebInspect desktop). The administrator
machine to manually runs SmartUpdate, however
SmartUpdate Fortify recommends that you set up an
server automated schedule. New client releases
are held in reserve until the Fortify
WebInspect Enterprise administrator
marks them as Approved, at which time
they are automatically distributed from
the Fortify WebInspect Enterprise
Manager server. Can support the use of
an upstream proxy with authentication
instead of a direct Internet connection.
Fortify User’s mail Email alerts 25 or SMTP Used for SMTP alerts for administration
WebInspect server user- team. To enable mobile TXT alerts, you
Enterprise specified can use an SMTP-to-SMS gateway
Manager address.
machine to
mail server
Fortify User’s SNMP SNMP alerts 162 or SNMP Used for SNMP alerts for administration
WebInspect Community user- team.
Enterprise specified
Manager
machine to
SNMP
Community
Web Proxy To target localhost 8080 or HTTP or Intercepts and displays web traffic
web user-specified HTTPS
application over SSL
Web Form To target localhost Dynamic, HTTP or Intercepts web traffic and captures submitted
Editor web 8100, or HTTPS forms
application user-specified over SSL
Login or To target localhost Dynamic, HTTP or Records browser sessions for replay during
Workflow Macro web 8081, or HTTPS scan
Recorders application user-specified over SSL
Web Discovery To localhost User-specified HTTP Scanner for identifying rogue web
targeted IP range and applications hosted among the targeted
range HTTPS scanned IP and port ranges
over SSL
Use to provide targets to Fortify WebInspect
(manually)
Hardware Requirements
Fortify recommends that you install the LIM on a system that conforms to the supported components
listed in following table. Beta or pre-release versions of operating systems, service packs, and required
third-party components are not supported.
RAM 2+ GB Recommended
1 GB Minimum
20 GB Minimum
Software Requirements
LIM runs on and works with the software packages listed in the following table.
ASP.NET4.5, 4.6
Component Version
Micro Focus Fortify Static Code Analyzer Tool used to modify or audit the FPR.
l If you merge two FPRs, the resulting FPR has the version of the more recently generated FPR. For
example, if you merge a version 18.20 FPR with a version 20.1.0 FPR, the resulting FPR has the
version number 20.1.0.
You can only open 20.1.0 FPR files with Fortify Software Security Center or Fortify Static Code
Analyzer Tools version 20.1.0 or later.
Note: Running Fortify Software products in a VM environment with shared CPU and memory
resources is not supported.
l Compilers:
l Clang 10.0, 10.0.1
l PyCharm 2018.x
l WebStorm 2018.x
l Operating Systems:
l macOS 10.13
l Solaris
l Supported Languages:
l .NET Core 1.x
l Swift 4.2
The following Micro Focus Fortify Software Security Center features are no longer supported:
l Authentication Tokens
The JenkinsToken type has been removed from this release. Use the CIToken type instead.
l Bug Trackers:
l Team Foundation Server (TFS) 2015 and 2017
l Fortify Static Code Analyzer support for all Swift, Xcode, and Objective-C/C++ versions will follow
the deprecation path Apple Inc. adopts.
The following Micro Focus Fortify Static Code Analyzer features are scheduled for deprecation in the
next release:
l Incremental Analysis
The following Fortify Software Security Center and Fortify Static Code Analyzer Tools features are
scheduled for deprecation in the next release:
l Authentication Tokens:
Use the new ScanCentralCtrlToken type instead of CloudCtrlToken. The CloudCtrlToken type will be
removed in the next release.
l Reports:
l DISA STIG 3.x
l SSA Portfolio
l SSA Application
l External Metadata Mappings:
l DISA STIG 3.x
l The package includes the Fortify Remediation Plugin for Eclipse, the
Fortify Security Assistant Plugin for Eclipse, and the Fortify
Remediation Plugin for JetBrains IDEs.
Fortify_SCA_and_ Signature file for the Fortify SCA and Applications package for Windows
Apps_
20.1.0_
Windows.zip.sig
Fortify_SCA_and_ Signature file for Fortify Static Code Analyzer for Linux
Apps_
20.1.0_
Linux.tar.gz.sig
Fotify_SCA_and_ Signature file for the Fortify SCA and Applications package for macOS
Apps_20.1.0_
Mac.tar.gz.sig
WebInspectToolkit_ Fortify WebInspect Toolkit package for use with Fortify WebInspect
20.1.0.zip Enterprise
gpg: Signature made Fri, Oct 06, 2017 10:37:56 PM PDT using RSA key ID
AA71A9CF
gpg: checking the trustdb
gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model
gpg: depth: 0 valid: 3 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 3u
gpg: next trustdb check due at 2025-12-07
gpg: Good signature from "Micro Focus Group Limited RSA-2048-12"
Note: A warning message might be displayed because the public key is not known to the system.
You can ignore this warning or set up your environment to trust these public keys.