Customized output from:
|
Document Release Date: November 2018 Software Release Date: November 2018 |
|
The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice.
Confidential computer software. Except as specifically indicated otherwise, a valid license from Micro Focus is required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license.
Certain versions of software and/or documents (“Material”) accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.
© 2011 - 2018 Micro Focus or one of its affiliates.
MICRO FOCUS and the Micro Focus logo, among others, are trademarks or registered trademarks of Micro Focus (IP) Limited or its subsidiaries in the United Kingdom, United States and other countries. All other marks are the property of their respective owners.
Adobe™ is a trademark of Adobe Systems Incorporated.
Microsoft® and Windows® are U.S. registered trademarks of Microsoft Corporation.
UNIX® is a registered trademark of The Open Group.
This section describes how to configure Smart Card Authentication or PKI Authentication (CAC) support on UCMDB server.
Note:
Import the root CA and any intermediate certificates into the UCMDB Server Truststore as follows:
On the UCMDB machine, copy the certificate files to the following directory on UCMDB:
C:\UCMDB\UCMDBServer\conf\security
Note: If your certificate is in Microsoft p7b format, you may need to convert it to PEM format.
For each certificate, run the following command:
C:\UCMDB\UCMDBServer\bin\jre\bin\keytool.exe -import -v -keystore
C:\UCMDB\UCMDBServer\conf\security\server.truststore -file <certificate> -alias <certificate alias>
Note: (FIPS mode only) If UCMDB server is running in FIPS mode, make sure you import each certificate into server-fips.truststore by following the steps below:
Open <UCMDB_Server_Install_Dir>\bin\jre\lib\security\java.security using a text editor and add the following lines to the provider list:
security.provider.11=org.bouncycastle.jcajce.provider.BouncyCastleFipsProvider
Run the following command:
<UCMDB_Server_Install_Dir>\bin\jre\bin\keytool.exe -import -v -keystore <UCMDB_Server_Install_Dir>\conf\security\server-fips.truststore" -storetype BCFKS -providername BCFIPS -storepass <password of server-fips.truststore> –file <certificate> -alias < certificate alias >
(Non-FIPS mode only) Enter the UCMDB Server Truststore password.
When asked, Trust this certificate?, press y and then Enter.
Make sure the output Certificate was added to the keystore.
Open the JMX console by launching the Web browser and entering the Server address, as follows: https://<UCMDB Server Host Name or IP>:8443/jmx-console.
You may have to log in with a user name and password.
Under UCMDB, click UCMDB:service=Ports Management Services to open the Operations page.
(optional) Click ComponentsConfigurations. Do the following:
Click mapComponentToConnectors. Do the following:
In the mapComponentToConnectors service, set componentName to ucmdb-ui.
Set only isHTTPSWithClientAuth to true, and click Invoke.
In the mapComponentToConnectors service, set componentName to root.
Under UCMDB, click UCMDB:service=Security Services to open the Operations page. In the loginWithCAC service, do the following:
Set loginWithCAC to true, and click Invoke.
(optional) Click usernameField to specify the field from the certificate that will be used by UCMDB to extract a username, and click Invoke.
Note: If you do not specify a field, the default of PRINCIPAL_NAME_FROM_SAN_FIELD is used.
Click pathToCRL to set a path to an offline Certificate Revocation List (CRL) to be used if the online list (from the certificate) is not available, and click Invoke.
Note: When you work with a local CRL and there is a working Internet connection to the UCMDB server, the local CRL is used. The validation of any certificate (even if it is not revoked) fails in the following situations:
If you do not set the path to an offline CRL and the UCMDB server cannot access the online CRL, all certificates that contain a CRL or OCSP URL are rejected (since the URL cannot be accessed, the revocation check fails). To give the UCMDB server access to the Internet, uncomment the following lines in the wrapper.conf file and provide a valid proxy and port:
#wrapper.java.additional.40=-Dhttp.proxyHost=<PROXY_ADDR>
#wrapper.java.additional.41=-Dhttp.proxyPort=<PORT>
#wrapper.java.additional.42=-Dhttps.proxyHost=<PROXY_ADDR>
#wrapper.java.additional.43=-Dhttps.proxyPort=<PORT>
(optional) Set onlyCACCerts to true, and click Invoke.
Set this operation to true to accept only certificates that come from a physical CAC device.
(FIPS mode only) Export the CAC certificate along with its private key.
When UCMDB server is on FIPS mode, enabling CAC in UCMDB will enable two-way authentication between UCMDB UI and UCMDB Server. For the two-way authentication work properly, you need to export the CAC certificate along with its private key and import them into the keystore of client JRE (assume the keystore file is jssecacerts).
To export the CAC certificate along with the private key, do the following:
Locate your CAC certificate. (We use User1-CP.01.01 in this example.)
On the Export File Format page, select Personal Information Exchange - PKCS # 12 (.PFX), and click Next.
(FIPS mode only) Import the certificates (for example, user1.pfx) into keystore of client JRE.
org.bouncycastle.jcajce.provider.BouncyCastleFipsProvider exists in java.security of client JRE.Run the following command to import CAC certificate (by default, the password of cacerts/jssecacerts is changeit), and we assume jssecacerts is the file name of keystore in client JRE:
<Client_JRE_dir>\bin\keytool.exe -importkeystore -v -deststorepass <keystore_password> -destkeystore "<path_of_jssecacerts>\jssecacerts" -deststoretype BCFKS -destprovidername BCFIPS -srckeystore "<path_of_user1.pfx>\user1.pfx" -srcstoretype PKCS12 -srcstorepass <key_password_of_user1.pfx>
Change the password of private key of CAC certificate (user1.pfx in this example) to the password of jssecacerts:
<Client_JRE_dir>\bin\keytool -keypasswd -alias <alias_of_CAC_cert> -keypass <password_of_CAC_cert> -new <password_of_ jssecacerts > -keystore "<path_of_ jssecacerts>\jssecacerts" -storetype BCFKS -providername BCFIPS -storepass <password_of_ jssecacerts>
Configure UCMDB to use LW-SSO authentication and restart the UCMDB Server.
You should now be able to log into UCMDB with https://<UCMDB Server Host Name or IP>.<domainname>:8444.
Modify the server.xml file.
Update the following lines:
keystoreFile="${catalina.home}/conf/server-fips.keystore"
keystorePass="${keystorepassword}" sendReasonPhrase="true" keystoreType="BCFKS" keystoreProvider="BCFIPS"
truststoreFile="${catalina.home}/conf/server-fips.truststore"
truststorePass="${keystorepassword}" truststoreType="BCFKS" truststoreProvider="BCFIPS"
clientAuth="true" sslProtocol="TLSv1.2" sslEnabledProtocols="TLSv1.2"
crlFile="<ucmdb_browser>\conf\crl.pem""
Modify the configuration.
Import the certificate, and access CMS UI using the following address in a private IE window:
https://<CMS_UI_hostname_or_IP_address>:8553/ucmdb-browser/
© Copyright 2011 - 2018 Micro Focus or one of its affiliates