Searching the Help
To search for information in the Help, type a word or phrase in the Search box. When you enter a group of words, OR is inferred. You can use Boolean operators to refine your search.
Results returned are case insensitive. However, results ranking takes case into account and assigns higher scores to case matches. Therefore, a search for "cats" followed by a search for "Cats" would return the same number of Help topics, but the order in which the topics are listed would be different.

Search for | Example | Results |
---|---|---|
A single word | cat
|
Topics that contain the word "cat". You will also find its grammatical variations, such as "cats". |
A phrase. You can specify that the search results contain a specific phrase. |
"cat food" (quotation marks) |
Topics that contain the literal phrase "cat food" and all its grammatical variations. Without the quotation marks, the query is equivalent to specifying an OR operator, which finds topics with one of the individual words instead of the phrase. |

Search for | Operator | Example |
---|---|---|
Two or more words in the same topic |
|
|
Either word in a topic |
|
|
Topics that do not contain a specific word or phrase |
|
|
Topics that contain one string and do not contain another | ^ (caret) |
cat ^ mouse
|
A combination of search types | ( ) parentheses |
|
- Configure CSA
- Stop CSA
- Update applicationContext.xml to be FIPS 140-2 Compliant
- Configure Properties in the Java Security File
- Create a CSA Encryption Keystore
- Create a New Keystore and Truststore for Secure Communication
- Re-Encrypt CSA Passwords
- Configure CSA Properties
- Configure the Marketplace Portal for FIPS 140-2 Compliance
- Configure the Identity Management Component
- Disable HP Single Sign-On
- Configure CSA to Use SAML
- Start CSA
- Update the Process Engine Password
- Test Secure Connections
Configure CSA Properties
To configure CSA properties for FIPS 140-2 compliance:
-
Open a command prompt and change to the
%CSA_HOME%\jboss-as\standalone\deployments\csa.war\WEB-INF\classes
directory. For example:C:\Program Files\HPE\CSA\jboss-as\standalone\deployments\csa.war\
WEB-INF\classes -
Open the
csa.properties
file in an editor.-
Verify that the
enableHPSSO
property is either set to false or is commented out. -
Set the
com.hp.csa.service.ssl.certificate.validation
property to true. -
Comment out the following properties for the global search feature (this feature is not supported when configuring CSA for FIPS 140-2 compliance):
csa.provider.es.authPassword
csaKeystore
csaKeystorePassword
-
Configure the following properties:
Property Description useExternalProvider Required. For FIPS 140-2 compliance, uncomment and set this property to true.
When enabled, CSA uses the RSA BSAFE libraries to encrypt and decrypt passwords. If a password was encrypted using different libraries (for example, if the password was encrypted before this property is enabled), the resulting decrypted password will not be valid.
If you cannot connect to the database after you have configured CSA for FIPS 140-2 compliance, try re-encrypting the database password in the database properties file.
Default: commented out/disabled
securityProviderName Required. The name of the FIPS 140-2 compliant provider. By default, CSA uses the RSA BSAFE provider and this property should be set to JsafeJCE.
keySize Optional. The key size used for CSA encryption. By default, the key size is 128. If you manually enter a different key size when encrypting a password, uncomment this property and configure the value to the key size used to encrypt the passwords.
Note All passwords must be encrypted using the same key size.
By default, the password encryption utility encrypts all passwords using a key size of 128 (even if you do not specify a key size when running the utility).keystore Required. The absolute path to and file name of the CSA encryption keystore. This is the keystore that supports PKCS #12 and stores the key used by CSA to encrypt and decrypt data in CSA.
Example (this example uses the same example name from Create a CSA Encryption Keystore):
%CSA_HOME%/jboss-as/standalone/configuration/csa_encryption_keystore.p12
Note Use only forward slashes (/) as your path separators.
keyAlias Required. The alias used to identify the CSA encryption key in the CSA encryption keystore.
Example (this example uses the same example name from Create a CSA Encryption Keystore):
csa_encryption_key
keystorePasswordFile Required. The absolute path to and file name of the CSA encryption keystore password. This is a temporary file that stores the CSA encryption keystore password in clear text. This file is required to start the CSA service and is automatically deleted when the service is started.
The password file must contain only the following content:
keystorePassword=<CSA encryption keystore password>
where
<CSA encryption keystore password>
is the CSA encryption keystore password in clear text.Note Use only forward slashes (/) as your path separators.
encryptedKeyFile Required. The location of the CSA encrypted symmetric key.
Example (this example uses the same example name from Create a CSA Encryption Keystore):
%CSA_HOME%/jboss-as/standalone/configuration/key.dat
Note Use only forward slashes (/) as your path separators.
csaTruststore Required. The CSA keystore that stores trusted Certificate Authority certificates. This is the server you created in Step 1: Create a CSA server keystore that Supports PKCS #12.
Note This property is located in another section of the
csa.properties
file.Example (this example uses the same example name of the CSA server truststore from Create a CSA Encryption Keystore):
%CSA_HOME%/jboss-as/standalone/configuration/csa_server_truststore.p12
Note Use only forward slashes (/) as your path separators.
csaTruststorePassword Required. The encrypted password of the CSA keystore (see Encrypt a Marketplace Portal Password for instructions on encrypting passwords). An encrypted password is preceded by
ENC
without any separating spaces and is enclosed in parentheses.Default: No default specified
Example
ENC(9eC7TTnB0uGOGK5U648UITcEV5AuV5T)
Note This property is located in another section of the
csa.properties
file.This is the <CSA server truststore password> from Create a CSA Encryption Keystore.
-
-
Copy the property values from step 2b to the
%CSA_HOME%\jboss-as\standalone\deployments\idm-service.war\WEB-INF\classes\idm-security.properties
file. The property values must be the same in both files. -
When configuring a command line tool, copy the property values from step 2b to its configuration file. Add
;ssl=authenticate
at the end of the database connection string if it is missing. -
When executing a tool, you must add these system properties:
‑Dcom.sun.net.ssl.enableECC=false
and‑Djsse.enableCBCProtection=false
For example:
"java ‑Dcom.sun.net.ssl.enableECC=false ‑Djsse.enableCBCProtection=false ‑jar provider-tool.jar <tool parameters>"
Note Each time the tool is executed, the password file must be created for that execution. The content (format and password) must be the same that was used for the CSA startup.
Note Remote console access does not support FIPS and hence it should be disabled when CSA is running on FIPS Mode.
To disable the remote console access, see the section "Install and Configure Remote Console Service" in Cloud Service Automation Installation Guide.
We welcome your comments!
To open the configured email client on this computer, open an email window.
Otherwise, copy the information below to a web mail client, and send this email to clouddocs@hpe.com.
Help Topic ID:
Product:
Topic Title:
Feedback: