SSL with custom certificates - configuration
Posted: Wed Sep 21, 2016 12:49 pm
Hi Everyone!
I'm looking for a solution on how to implemet SSL with custom certificates, as working from what I found in documentation and forum topics here I did not succeed. Below I tried to give a detailed summary on steps I took. Any help is much appreciated.
Thanks,
Dan
=========================================================================
TM1 version: 10.2.2 FP5 (Windows 64bit)
Clients involved: Architect, Perspectives (both 32 bit), TM1 Web
Authentication method: Integrated Login (IntegratedSecurityMode=3)
NOTE: No Cognos BI components are invoved in the implementation whatsoever
Our TM1 implementation is working fine with SSL connection using the IBM generated certificates from the „TM1_install_dir\bin\SSL” directory. Our settings rely on using certificate version 2 (tm1ca_v2.pem etc, i.e. the 2048 bit version using SHA256). Also, our settings are not exporting any of the certificates from the Certificate Store.
Our Client expressed a need to use their own certificate authority and certificates, also without exporting them from the Certificate Store. We tried to make that happen, but failed to make it work and are now looking for help and / or a step-by-step guide on how to implement that.
What we have done was the following:
1. Created a Certificate Signing Request using the ThirdPartyCertificateTool. The command line commands issued were as follows:
for the Signings Identitiy
ThirdPartyCertificateTool.bat -java:local -c -s -d "CN=computername O=company C=country" -r D:\TM1\SignRequest.csr -D ../configuration/signkeypair -p NoPassWordSet
for the Encrypt Identity
ThirdPartyCertificateTool.bat -java:local -c -e -d "CN=computername O=company C=country" -r D:\TM1\EncryptRequest.csr -D ../configuration/encryptkeypair -p NoPassWordSet
2. Our Client’s IT team received the output files SignRequest.csr and EncryptRequest.csr and generated two .cer files respectively, and also sent us the root CA certificate file in .cer format, two issueing (intermediate) certificates (also in .cer format) and two certificate chain files for the signings and encryption certificates in PKCS#7 format.
3. Next, We imported the certificates to the keystores as follows
• ThirdPartyCertificateTool.bat -java:local -i -s -r SignCertificate.cer -D ..\configuration\signkeypair -p NoPassWordSet -t <sign certificate’s cert chain file in PKCS#7 format>
• ThirdPartyCertificateTool.bat -java:local -i -e -r EncryptCertificate.cer -D ..\configuration\encryptkeypair -p NoPassWordSet -t <encrypt certificate’s cert chain file in PKCS#7 format>
• ThirdPartyCertificateTool.bat -java:local -i -T -r <root CA cert in .cer format> -D ..\configuration\signkeypair -p NoPassWordSet
4. After that, using the java keytool, we imported the root CA certificate to the trusted CA Certs keystore.
• keytool -import -trustcacerts -file <root CA cert in .cer format> -keystore ..\lib\security\cacerts -alias RootCA
In Cognos Configuration under the Cryptography Node > Cognos the „Use Third Party CA?” parameter was set to True, and the StandaloneCertificateAuthority variable with a value of True was added to the Local Configuration Advanced properties.
From this point on, whatever parameters we set to the Admin Server’s SSL properties in Cognos Configuration, or the TM1 servers’ tm1s.cfg file and the Architect/Perspectives clients’ Options, we could not get things to work.
I'm looking for a solution on how to implemet SSL with custom certificates, as working from what I found in documentation and forum topics here I did not succeed. Below I tried to give a detailed summary on steps I took. Any help is much appreciated.
Thanks,
Dan
=========================================================================
TM1 version: 10.2.2 FP5 (Windows 64bit)
Clients involved: Architect, Perspectives (both 32 bit), TM1 Web
Authentication method: Integrated Login (IntegratedSecurityMode=3)
NOTE: No Cognos BI components are invoved in the implementation whatsoever
Our TM1 implementation is working fine with SSL connection using the IBM generated certificates from the „TM1_install_dir\bin\SSL” directory. Our settings rely on using certificate version 2 (tm1ca_v2.pem etc, i.e. the 2048 bit version using SHA256). Also, our settings are not exporting any of the certificates from the Certificate Store.
Our Client expressed a need to use their own certificate authority and certificates, also without exporting them from the Certificate Store. We tried to make that happen, but failed to make it work and are now looking for help and / or a step-by-step guide on how to implement that.
What we have done was the following:
1. Created a Certificate Signing Request using the ThirdPartyCertificateTool. The command line commands issued were as follows:
for the Signings Identitiy
ThirdPartyCertificateTool.bat -java:local -c -s -d "CN=computername O=company C=country" -r D:\TM1\SignRequest.csr -D ../configuration/signkeypair -p NoPassWordSet
for the Encrypt Identity
ThirdPartyCertificateTool.bat -java:local -c -e -d "CN=computername O=company C=country" -r D:\TM1\EncryptRequest.csr -D ../configuration/encryptkeypair -p NoPassWordSet
2. Our Client’s IT team received the output files SignRequest.csr and EncryptRequest.csr and generated two .cer files respectively, and also sent us the root CA certificate file in .cer format, two issueing (intermediate) certificates (also in .cer format) and two certificate chain files for the signings and encryption certificates in PKCS#7 format.
3. Next, We imported the certificates to the keystores as follows
• ThirdPartyCertificateTool.bat -java:local -i -s -r SignCertificate.cer -D ..\configuration\signkeypair -p NoPassWordSet -t <sign certificate’s cert chain file in PKCS#7 format>
• ThirdPartyCertificateTool.bat -java:local -i -e -r EncryptCertificate.cer -D ..\configuration\encryptkeypair -p NoPassWordSet -t <encrypt certificate’s cert chain file in PKCS#7 format>
• ThirdPartyCertificateTool.bat -java:local -i -T -r <root CA cert in .cer format> -D ..\configuration\signkeypair -p NoPassWordSet
4. After that, using the java keytool, we imported the root CA certificate to the trusted CA Certs keystore.
• keytool -import -trustcacerts -file <root CA cert in .cer format> -keystore ..\lib\security\cacerts -alias RootCA
In Cognos Configuration under the Cryptography Node > Cognos the „Use Third Party CA?” parameter was set to True, and the StandaloneCertificateAuthority variable with a value of True was added to the Local Configuration Advanced properties.
From this point on, whatever parameters we set to the Admin Server’s SSL properties in Cognos Configuration, or the TM1 servers’ tm1s.cfg file and the Architect/Perspectives clients’ Options, we could not get things to work.