Configuration Management System (CMS)

For the Windows and Redhat Enterprise Linux operating systems

Software Version: 2018.11

Customized output from:

Document Release Date: November 2018

Software Release Date: November 2018

Micro Focus logo

Legal Notices

Warranty

The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice.

Restricted Rights Legend

Confidential computer software. Except as specifically indicated otherwise, a valid license from Micro Focus is required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license.

Disclaimer

Certain versions of software and/or documents (“Material”) accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.

Copyright Notice

© 2011 - 2018 Micro Focus or one of its affiliates.

Trademark Notices

MICRO FOCUS and the Micro Focus logo, among others, are trademarks or registered trademarks of Micro Focus (IP) Limited or its subsidiaries in the United Kingdom, United States and other countries. All other marks are the property of their respective owners.

Adobe™ is a trademark of Adobe Systems Incorporated.

Microsoft® and Windows® are U.S. registered trademarks of Microsoft Corporation.

UNIX® is a registered trademark of The Open Group.

 
 
 
 

Configure CAC (Smart Card / PKI Authentication) Support on UCMDB

Configure CAC Support on UCMDB Server

This section describes how to configure Smart Card Authentication or PKI Authentication (CAC) support on UCMDB server.

Note:  

  1. Import the root CA and any intermediate certificates into the UCMDB Server Truststore as follows:

    1. On the UCMDB machine, copy the certificate files to the following directory on UCMDB:

      C:\UCMDB\UCMDBServer\conf\security

      Note: If your certificate is in Microsoft p7b format, you may need to convert it to PEM format.

    2. For each certificate, run the following command:

      C:\UCMDB\UCMDBServer\bin\jre\bin\keytool.exe -import -v -keystore
      C:\UCMDB\UCMDBServer\conf\security\server.truststore -file <certificate> -alias <certificate alias>

      Note: (FIPS mode only) If UCMDB server is running in FIPS mode, make sure you import each certificate into server-fips.truststore by following the steps below:

      1. Stop UCMDB Server.
      2. Copy <UCMDB_Server_Install_Dir>\lib\bcfips\bc-fips-1.0.1.jar into the <UCMDB_Server_Install_Dir>\bin\jre\lib\ext folder.
      3. Open <UCMDB_Server_Install_Dir>\bin\jre\lib\security\java.security using a text editor and add the following lines to the provider list:

        security.provider.11=org.bouncycastle.jcajce.provider.BouncyCastleFipsProvider
      4. Run the following command:

        <UCMDB_Server_Install_Dir>\bin\jre\bin\keytool.exe -import -v -keystore <UCMDB_Server_Install_Dir>\conf\security\server-fips.truststore" -storetype BCFKS -providername BCFIPS -storepass <password of server-fips.truststore> –file <certificate> -alias < certificate alias >
      5. Revert the changes you made from step ii to step iii.
      6. Restart UCMDB Server.
      7. For UCMDB Cluster, perform the above steps on all UCMDB writer and reader servers.
    3. (Non-FIPS mode only) Enter the UCMDB Server Truststore password.

    4. When asked, Trust this certificate?, press y and then Enter.

    5. Make sure the output Certificate was added to the keystore.

  2. Open the JMX console by launching the Web browser and entering the Server address, as follows: https://<UCMDB Server Host Name or IP>:8443/jmx-console.

    You may have to log in with a user name and password.

  3. Under UCMDB, click UCMDB:service=Ports Management Services to open the Operations page.

  4. Under UCMDB, click UCMDB:service=Security Services to open the Operations page. In the loginWithCAC service, do the following:

  5. (FIPS mode only) Export the CAC certificate along with its private key.

    When UCMDB server is on FIPS mode, enabling CAC in UCMDB will enable two-way authentication between UCMDB UI and UCMDB Server. For the two-way authentication work properly, you need to export the CAC certificate along with its private key and import them into the keystore of client JRE (assume the keystore file is jssecacerts).

    To export the CAC certificate along with the private key, do the following:

    1. Open Microsoft Certificates (run certmgr.msc as Administrator from command prompt).
    2. Locate your CAC certificate. (We use User1-CP.01.01 in this example.)

    3. Right-click the certificate and select All Tasks > Export.... The Certificate Export Wizard opens.
    4. Click Next.
    5. On the Export Private Key wizard page, select Yes, export the private key, and click Next.
    6. On the Export File Format page, select Personal Information Exchange - PKCS # 12 (.PFX), and click Next.

    7. On the Password page, provide the password, and click Next.
    8. On the File to Export page, click Browse to locate the file for export.
    9. Click Next.
  6. (FIPS mode only) Import the certificates (for example, user1.pfx) into keystore of client JRE.

    1. Make sure bc-fips-1.0.1.jar exists in folder <JRE_install_dir>\lib\ext.
    2. Make sure org.bouncycastle.jcajce.provider.BouncyCastleFipsProvider exists in java.security of client JRE.
    3. Run the following command to import CAC certificate (by default, the password of cacerts/jssecacerts is changeit), and we assume jssecacerts is the file name of keystore in client JRE:

      <Client_JRE_dir>\bin\keytool.exe -importkeystore -v -deststorepass <keystore_password> -destkeystore "<path_of_jssecacerts>\jssecacerts" -deststoretype BCFKS -destprovidername BCFIPS -srckeystore "<path_of_user1.pfx>\user1.pfx" -srcstoretype PKCS12 -srcstorepass <key_password_of_user1.pfx>
    4. Change the password of private key of CAC certificate (user1.pfx in this example) to the password of jssecacerts:

      <Client_JRE_dir>\bin\keytool -keypasswd -alias <alias_of_CAC_cert> -keypass <password_of_CAC_cert> -new <password_of_ jssecacerts > -keystore "<path_of_ jssecacerts>\jssecacerts" -storetype BCFKS -providername BCFIPS -storepass <password_of_ jssecacerts>
  7. Configure UCMDB to use LW-SSO authentication and restart the UCMDB Server.

    For details about LW-SSO authentication, see .

  8. You should now be able to log into UCMDB with https://<UCMDB Server Host Name or IP>.<domainname>:8444.

Configure CAC Support on Standalone CMS UI

  1. Copy the server-fips.keystore and server-fips.truststore files from the <UCMDBServer>\conf\security folder to the machine where CMS UI is installed. (C:\)
  2. Modify the server.xml file.

    1. Open the <CMS_UI_Home>\conf\server.xml file using a text editor.
    2. In the lines where connector port is 8443, replace 8443 with 8553.
    3. For the maxThreads parameter, change its value to 200.
    4. For the clientAuth parameter, change its value to true.
    5. Update the following lines:

      keystoreFile="${catalina.home}/conf/server-fips.keystore"
                     keystorePass="${keystorepassword}" sendReasonPhrase="true" keystoreType="BCFKS" keystoreProvider="BCFIPS"
         truststoreFile="${catalina.home}/conf/server-fips.truststore"
                    truststorePass="${keystorepassword}" truststoreType="BCFKS" truststoreProvider="BCFIPS"
                     clientAuth="true" sslProtocol="TLSv1.2" sslEnabledProtocols="TLSv1.2"
         crlFile="<ucmdb_browser>\conf\crl.pem""
      
    6. Save the file.
  3. Modify the configuration.

    1. Go to the browser\conf folder, open the ucmdb_browser_config.xml file using a text editor.
    2. Add the UCMDB server domain name or UCMDB server IP, and save the file.
    3. Open the ucmdb-browser-fips-lwsso*.xml file using a text editor.
    4. Add the domain name.
    5. Restart the CMS UI service.
  4. Import the certificate, and access CMS UI using the following address in a private IE window:

    https://<CMS_UI_hostname_or_IP_address>:8553/ucmdb-browser/

© Copyright 2011 - 2018 Micro Focus or one of its affiliates