Developers Integration Lab (DIL) Certificate Installation Instructions. Version 1.6

Similar documents
SSL/TLS Certificate Generation

OIOIDWS Integration testing

SSL/TLS Certificate Generation

SSL/TLS Certificate Generation

Public Key Enabling Oracle Weblogic Server

SAML with ADFS Setup Guide

Wildcard Certificates

Provisioning Certificates

Configuring the RTP Server

Configure DNA Center Assurance for Cisco ISE Integration

Configure Cisco DNA Assurance

Managing Administrative Security

Configuring NiFi Authentication and Proxying with Apache Knox

How to use an EPR certificate with the MESH client

SAML 2.0 SSO. Set up SAML 2.0 SSO. SAML 2.0 Terminology. Prerequisites

Configuring SSL for EPM /4 Products (Cont )

Configuring CA WA Agent for Application Services to Work with IBM WebSphere Application Server 8.x

eroaming platform Secure Connection Guide

ADFS Setup (SAML Authentication)

SSL or TLS Configuration for Tomcat Oracle FLEXCUBE Universal Banking Release [December] [2016]

SSO Authentication with ADFS SAML 2.0. Ephesoft Transact Documentation

Enabling Microsoft Outlook Calendar Notifications for Meetings Scheduled from the Cisco Unified MeetingPlace End-User Web Interface

Enabling Secure Sockets Layer for a Microsoft SQL Server JDBC Connection

CA Spectrum. Common Access Card Authentication Solution Guide. Release 9.4

Application notes for supporting third-party certificate in Avaya Aura System Manager 6.3.x and 7.0.x. Issue 1.3. November 2017

SSL Configuration: an example. July 2016

FileAudit Plus. Steps for Enabling SSL: The following steps will help you in the installation of SSL certificate in FileAudit Plus

MSE System and Appliance Hardening Guidelines

Oracle iplanet Web Server Integration Guide

How to convert.crt SSL Certificate to.pfx format (with openssl Linux command) and Import newly generated.pfx to Windows IIS Webserver

Oracle Insurance Policy Administration Configuration of SAML 1.1 Between OIPA and OIDC

HP Operations Orchestration

AUTHORIZED DOCUMENTATION. Installation Guide. Novell Cloud Manager 1.1. December 8,

Securing U2 Soap Server

Web Service Integration

StreamServe Persuasion SP4 StreamStudio

SAML-Based SSO Configuration

VSP16. Venafi Security Professional 16 Course 04 April 2016

S/MIME on Good for Enterprise MS Online Certificate Status Protocol. Installation and Configuration Notes. Updated: November 10, 2011

BusinessObjects Enterprise XI Release 1 and Release 2

Using Certificates with HP Network Automation

How to Configure SSL Interception in the Firewall

FortiNAC. Analytics SSL Certificates. Version: 5.x Date: 8/28/2018. Rev: D

Configuring Oracle Java CAPS for SSL Support

Veritas Access Software-Defined Storage (SDS) Management Platform Solutions Guide

X-road MISP2 installation and configuration guide. Version 1.20

McAfee Cloud Identity Manager Installation Guide For McAfee Cloud Identity Manager v3.1 August 2012

Keytool and Certificate Management

Prepaid Online Vending System. XMLVend 2.1 Test Suite Setup Instructions

HPE Enterprise Integration Module for SAP Solution Manager 7.1

OCSP Client Tool V2.2 User Guide

Security configuration of the mail server IBM

How to Configure Mutual Authentication using X.509 Certificate in SMP SAP Mobile Platform (3.X)

SSL/TLS Certificate Check

Advanced Integration TLS Certificate on the NotifySCM Server

Using ISE 2.2 Internal Certificate Authority (CA) to Deploy Certificates to Cisco Platform Exchange Grid (pxgrid) Clients

IBM Workplace TM Collaboration Services

IBM Presentations: Implementing SSL Security in WebSphere Partner Gateway

Participant User Guide, Version 2.6

Venafi Server Agent Agent Overview

DataFlux Secure 2.5. Administrator s Guide. Second Edition. SAS Documentation

Please select your version

Configuring Ambari Authentication with LDAP/AD

Bugzilla ID: Bugzilla Summary:

HP Enterprise Integration Module for SAP Solution Manager

User guide NotifySCM Installer

Creating an authorized SSL certificate

Configuring Ambari Authentication with LDAP/AD

This PDF Document was generated for free by the Aloaha PDF Suite If you want to learn how to make your own PDF Documents visit:

6 Public Key Infrastructure 6.1 Certificates Structure of an X.509 certificate X.500 Distinguished Name and X.509v3 subjectalternativename

ENTRUST CONNECTOR Installation and Configuration Guide Version April 21, 2017

Configuring IBM WebSphere Application Server 7 for Secure Sockets Layer and Client-Certificate Authentication on SAS 9.3 Enterprise BI Server Web

Symantec PKI Enterprise Gateway Deployment Guide. v8.15

IBM Security Identity Governance and Intelligence. SDI-based IBM Security Privileged Identity Manager adapter Installation and Configuration Guide IBM

JAVA - DRI Connection Test Manual

Hitachi ID Systems Inc Identity Manager 8.2.6

How to use the MESH Certificate Enrolment Tool

Configuring SSL. SSL Overview CHAPTER

Configuring Java CAPS for SSL Support

Configuring SSL. SSL Overview CHAPTER

Installation 1. DLM Installation. Date of Publish:

Entrust Connector (econnector) Venafi Trust Protection Platform

DIL 3.0 Release Notes

GlobalForms SSL Installation Tech Brief

Obtaining a Google Maps API Key. v1.0. By GoNorthWest. 15 December 2011

Upgrading Big Data Management to Version Update 2 for Cloudera CDH

SAP Edge Services, cloud edition Streaming Service - Configuration Guide Version 1803

SECARDEO. certbox. Help-Manual. Secardeo GmbH Release:

SSH Communications Tectia SSH

Integration Guide. SafeNet Authentication Client. Using SAC CBA for VMware Horizon 6 Client

Upgrading Big Data Management to Version Update 2 for Hortonworks HDP

Managing AON Security

Genesys Security Deployment Guide. What You Need

On-demand target, up and running

How to Set Up External CA VPN Certificates

Oracle Oracle Identity Manager 11g

Configuring SSL CHAPTER

Skywire LTE CAT1 AWS IoT with TLS User Manual

PKI Cert Creation via Good Control: Reference Implementation

Configuring SAML-based Single Sign-on for Informatica Web Applications

Transcription:

Developers Integration Lab (DIL) Certificate Installation Instructions Version 1.6 May 28, 2014

REVISION HISTORY REVISION DATE DESCRIPTION 0.1 17 September 2011 First Draft Release DIL Certificate Installation Instructions 0.2 17 September 2011 Updated certificate download link examples 1.0 13 November 2012 First Publication Release DIL Certificate Installation Instructions 1.1 3 January 2013 Addition of section 5.4.6 describing how to import alternate certificates for use with other environments 1.2 20 January 2013 Added general grammatical changes 1.3 22 May 2013 Included additional steps for Certificate Set Up 1.4 22 July 2013 Added section 5.4.7 1.5 28 March 2014 Updated to accommodate new Cert Download Password field in Participant table 1.6 28 May 2014 Updated with the instructions to download certificates with user provided passwords i

TABLE OF CONTENTS 1. INTRODUCTION... 1 1.1 PURPOSE... 1 1.2 SCOPE... 1 2. DOCUMENT DESCRIPTION... 1 3. REFERENCED DOCUMENTS... 1 4. PROBLEM DESCRIPTION & GOALS... 1 5. INSTRUCTIONS... 2 5.1 REQUIRED INFORMATION... 2 5.2 DOWNLOAD YOUR CERTIFICATE... 2 5.3 DOWNLOAD THE CA CERTIFICATES... 3 5.4 NON-FIPS INSTALLATION (WINDOWS / GLASSFISH)... 3 5.4.1 SETUP YOUR WORK FOLDER... 3 5.4.2 KEYSTORE AND TRUSTSTORE... 3 5.4.3 INSTALL THE CERTIFICATES (GLASSFISH)... 5 5.4.4 UPDATE GLASSFISH DOMAIN CONFIGURATION... 6 5.4.5 VERIFY GLASSFISH DOMAIN CONFIGURATION... 6 5.4.6 USE OF ALTERNATIVE CERTIFICATES... 6 5.4.7 CERTIFICATE REVOCATION LIST (CRL) CHECKING... 8 5.5 FIPS INSTALLATION (RED HAT LINUX / JBOSS)... 8 5.5.1 SETUP YOUR WORK FOLDER... 8 5.5.2 NSS DATASTORE... 9 5.5.3 UPDATE JBOSS SERVER CONFIGURATION... 10 5.5.4 VERIFY JBOSS SERVER CONFIGURATION... 10 ii

1. INTRODUCTION 1.1 PURPOSE This document provides the required steps to download, install, and configure a DIL Certificate. 1.2 SCOPE The instructions in this document are applicable to all participants, both internal and external, in the DIL environment. 2. DOCUMENT DESCRIPTION This document includes the following sections: Section 1.0 Introduction Section 2.0 Document Description Section 3.0 Referenced Documents Section 4.0 Problem Description & Goals Section 5.0 Instructions 3. REFERENCED DOCUMENTS N/A 4. PROBLEM DESCRIPTION & GOALS Communication between gateways requires a secured transport mechanism. This is accomplished by SSL certificates issued to each gateway server AEGIS.net is a Certificate Authority with the ability to issue SSL certificates using the following hierarchy: AEGISROOTCA AEGISDILCA [Issued Server Certificate] The hierarchy mentioned above is the three-level certificate architecture used within the DIL. All SSL certificates are of the type PKS-12, however you can add your own private certificate under the trust chain as well. If you are planning on using the Private Cert provided by the DIL, please skip over section 5.4.6. 1

If you change your machine name at any time, you will need to generate a new certificate. This can be done by notifying the development team at DIL_Support@aegis.net. 5. INSTRUCTIONS These instructions are intended for use by a participant within the DIL environment. The participant must first complete the self-registration of their DIL account. 5.1 REQUIRED INFORMATION 1. The participant must provide the full machine name of the gateway server as part of their Gateway Profile. a. Example of machine name machine.domain.com 2. The participant s CA account information is then defined as: a. Your account name will be your machine name; e.g. machine.domain.com. 5.2 DOWNLOAD YOUR CERTIFICATE 1. Upon registering a Test System and the associated host/machine name(s) with DIL, you can download a certificate for each registered host/machine name. To do so, click on the Download Certificates button located at the bottom of the Test system page. 2. Download Certificate page will be displayed with the list of registered host/machine names and a provision to enter password for each certificate. Enter a password for each certificate and click on Save Password button at the top right corner of the page. Note: The length of the password should be min of 6 characters. 3. Once the submitted password information is saved, please download your machine s private certificate by clicking on the machine name. 4. 5. You will now be prompted with a browser dialog to either open or save. Note that if your browser is configured to save by default, you may not see this window. Save your certificate file to your local machine. a. Your certificate file name will be your gateway machine name with a.p12 extension; e.g. machine.domain.com.p12 2

b. If the install fails, please contact DIL Help Desk Support. 5.3 DOWNLOAD THE CA CERTIFICATES Your certificate is the end of a three-part chain. You need to download the other two certificate parts: AEGISROOTCA and AEGISDILCA. 1. Select the following link on the Download Certificate page to download the AEGISROOTCA: Please download the DIL Root certificate here AEGISROOTCA.pem 2. Select the following link on the Download Certificate page to download the AEGISDILCA: Please download the DIL Cross certificate here AEGISDILCA.pem 5.4 NON-FIPS INSTALLATION (Windows / Glassfish) 5.4.1 SETUP YOUR WORK FOLDER Windows XP/2003 Server 64 bit is the operating system and Glassfish 2.1.1 is the target application server for these instructions. 1. Create a work folder; e.g. C:\Sun\AppServer\certificaterequest 2. Copy all certificates generated and downloaded from the AEGIS.net CA site to your work folder. 3. Copy the cacerts.jks truststore from the Glassfish domain config folder: C:\Sun\AppServer\domains\domain1\config\cacerts.jks 4. Open a command prompt window and change directory to your work folder. 5.4.2 KEYSTORE AND TRUSTSTORE Execute the following commands to generate your keystore and install the certificates to your keystore and truststore. Replace the text <pkcs12_file> with the name of the downloaded machine keystore file including the file extension. IMPORT PKCS12 KEYSTORE TO JAVA KEYSTORE keytool -importkeystore -srckeystore <pkcs12_file> -srcstoretype PKCS12 - deststoretype JKS -destkeystore gateway.jks 3

* You will be prompted to enter your password three (3) times. After correctly entering your password you should have an output similar to this: Enter destination keystore password: Re-enter new password: Enter source keystore password: Entry for alias <machine_cert> successfully imported. Import command completed: 1 entries successfully imported, 0 entries failed or cancelled NOTE: The source keystore password above is the password that you provided for your machine certificate in the DIL application. Use the same password for the destination keystore password for easy remembrance. VERIFY JAVA KEYSTORE keytool -list -v -keystore gateway.jks > gatewaylist * You will be prompted to enter your password. This will list the private key details. Examine the output to insure there are no errors. IMPORT CHAIN OF TRUST CERTIFICATES TO THE TRUSTSTORE keytool -import -v -trustcacerts -alias AEGISROOTCA -file AEGISROOTCA.pem -keystore cacerts.jks -keypass changeit -storepass changeit * Enter yes or y to the prompt. You should see the following output: Trust this certificate? [no]: yes Certificate was added to keystore NOTE: The keypass value is the literal value changeit. The storepass value is the password specific to the machine or IP address registered with the DIL. keytool -import -v -trustcacerts -alias AEGISDILCA -file AEGISDILCA.pem - keystore cacerts.jks -keypass changeit -storepass changeit * No input is required. You should see the following output: Certificate was added to keystore NOTE: The keypass value is the literal value changeit. The storepass value is the password specific to the machine or IP address registered with the DIL. keytool -importkeystore -srckeystore <pkcs12_file> -srcstoretype PKCS12 - deststoretype JKS -destkeystore cacerts.jks 4

* You will be prompted to enter the truststore password followed by your password. You should see the following output: Enter destination keystore password: Enter source keystore password: Entry for alias <machine_cert> successfully imported. Import command completed: 1 entries successfully imported, 0 entries failed or cancelled VERIFY THE TRUSTSTORE CONTENTS keytool -list -keystore cacerts.jks > cacertslist * You will be prompted to enter the truststore password. This will list all of the trusted certificates. Examine the output to insure the imported certificates are present aegisrootca, aegisdilca andmachine cert. IMPORT ALL CERTIFICATES TO YOUR KEYSTORE keytool -import -v -trustcacerts -alias AEGISROOTCA -file AEGISROOTCA.pem -keystore gateway.jks -keypass <JKS_Keystore_password> -storepass < JKS_Keystore_password> * Enter yes or y to the prompt. You should see the following output: Trust this certificate? [no]: yes Certificate was added to keystore keytool -import -v -trustcacerts -alias AEGISDILCA -file AEGISDILCA.pem - keystore gateway.jks -keypass < JKS_Keystore_password> -storepass < JKS_Keystore_password> * No input is required. You should see the following output: Certificate was added to keystore VERIFY KEYSTORE CONTENTS keytool -list -keystore gateway.jks > gatewaylist2 * You will be prompted to enter your password. This will list all of the trusted certificates. Examine the output to insure the imported certificates are present aegisrootca, aegisdilca and the machine cert. 5.4.3 INSTALL THE CERTIFICATES (GLASSFISH) 1. Copy the keystore and truststore files from your work folder to the Glassfish domain config folder: C:\Sun\AppServer\domains\domain1\config\gateway.jks C:\Sun\AppServer\domains\domain1\config\cacerts.jks 5

5.4.4 UPDATE GLASSFISH DOMAIN CONFIGURATION Modify the domain.xml Glassfish configuration file to now use your new keystore. 1. Locate and update all key.alias values to your certificate alias; i.e. <machine>.domain.com. 2. Update the following <jvm-options> settings related to your keystore: -Djavax.net.ssl.keyStore=${com.sun.aas.instanceRoot}/config/gateway.jks -Djavax.net.ssl.keyStorePassword=<machine> -DSERVER_KEY_ALIAS=<machine>.domain.com -DCLIENT_KEY_ALIAS=<machine>.domain.com - Dcom.sun.enterprise.security.httpsOutboundKeyAlias=<machine>.domain.com NOTE: <machine>.domain.com is an example alias name. The actual alias name for your certificate is your registered machine name by default. You can verify this using the keytool command keytool list keystore gateway.jks storepass <key_store_password> 5.4.5 VERIFY GLASSFISH DOMAIN CONFIGURATION 1. Start your Glassfish server. 2. Examine the server logs after the application server start up is complete and verify that there are no errors. 5.4.6 USE OF ALTERNATIVE CERTIFICATES You may store and use additional, alternate certificates in your keystore and truststore files if your test system has the need to communicate with other testing environments. An example of this would be if your test system will also be used for onboard testing with the ehealth Exchange (formerly the NwHIN). The DIL Certificate Architecture mirrors that of the ehealth Exchange in that it relies on 3 levels, the Root Certificate, Cross Certificate, and finally the Private certificate. This Chain of Trust, i.e. the Root and Cross certificates validates and trusts the private certificate. You must first successfully obtain the required ehealth Exchange Root Certificate, Cross Certificate, and their Private certificate. Please refer to the 6

CONNECT Open Source Wiki page, Certificate Setup, for specific instructions. This page is found at: https://developer.connectopensource.org/display/connectwiki/certificate+setup The following steps are those that are needed to add these certificates to your existing keystore and truststore files: C:\Sun\AppServer\domains\domain1\config\gateway.jks C:\Sun\AppServer\domains\domain1\config\cacerts.jks IMPORT THE WEB SERVICE [PRIVATE] CERTIFICATE: keytool -import -v -trustcacerts -alias gateway -file servercert.bin -keystore gateway.jks -keypass changeit -storepass changeit * The -keypass and storepass passwords need to match those of the servercert.bin and gateway.jks respectively. IMPORT CHAIN OF TRUST CERTIFICATES TO THE TRUSTSTORE keytool -import -v -trustcacerts -alias entrust -file cacert.crt -keystore cacerts.jks - keypass changeit -storepass changeit * The -keypass and storepass passwords need to match those of the cacert.crt and cacerts.jks respectively. * Enter yes or y to the prompt. You should see the following output: Trust this certificate? [no]: yes Certificate was added to keystore [Storing cacerts.jks] keytool -import -v -trustcacerts -alias entrust-cross -file cross.crt -keystore cacerts.jks -keypass changeit -storepass changeit * The -keypass and storepass passwords need to match those of the cross.crt and cacerts.jks respectively. * No input is required. You should see the following output: Certificate was added to keystore [Storing cacerts.jks] 7

5.4.7 Certificate Revocation List (CRL) Checking Certificate Revocation Lists (CRLs) are lists of certificates that are no longer valid or that have been revoked by a Certification Authority (CA). Each gateway must implement either Online Certificate Status Protocol (OCSP) based certificate revocation checking or use CRLs against an NHIN-governed CA to determine the revocation status of each certificate. To enable the CRL checking in glassfish application server, add the following two JVM options in the domain.xml file as the two properties would remain false by default. You will need JDK 6 update 18 or later versions for supporting CRL checking. <jvm-options>-dcom.sun.net.ssl.checkrevocation=true</jvm-options> <jvm-options>-dcom.sun.security.enablecrldp=true</jvm-options> For debugging certification issues, add the following jvm option in domain.xml <jvm-options>-djava.security.debug=certpath</jvm-options> For other application servers, please check your server documentation regarding enabling CRL checking. FOR CRL checking, you need to open port 9345 at firewall so that you can have access to CRL list at http://ca.dil.aegis.net:9345/ejbca/publicweb/webdist/certdist?cmd=crl&issuer=cn=aegi SDILCA,O=AEGISnetInc,C=US. 5.5 FIPS INSTALLATION (Red Hat Linux / JBoss) The following set of instructions is intended for users utilizing FIPS mode enabled on the participant machine. 5.5.1 SETUP YOUR WORK FOLDER Red Hat Enterprise Linux is the operating system and Glassfish 2.1.1 or JBoss 5.1.0 are the target application servers for these instructions. The Mozilla NSS 3.12.4 datastore database is installed in the directory /opt/fipsdb for these instructions. 1. Create a work folder; e.g. /opt/fipsdb/cert 2. Copy all certificates generated and downloaded from the AEGIS CA site to your work folder. 3. Open a command prompt window and change directory to your work folder. 8

5.5.2 NSS DATASTORE Execute the following commands to import your server certificate and the AEGIS DIL and ROOT CA certificates to your NSS datastore. Replace the text <machine> with the value of your machine name. DISABLE FIPS MODE modutil -fips false -dbdir /opt/fipsdb * FIPS Mode must be disabled before making any modifications to prevent corruption of the NSS datastore. You will be prompted to continue. Simply press the Enter key again. You should see the following output: WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q <enter>' to abort, or <enter> to continue: FIPS mode disabled. IMPORT PKCS12 SERVER CERTIFICATE TO THE NSS DATASTORE pk12util -i <machine>.domain.com.p12 -n <machine>.domain.com -d /opt/fipsdb * You will be prompted to enter the NSS password. After correctly entering that password, you will be prompted to enter the password for your server certificate. After correctly entering that password you should have an output similar to this: Enter Password or Pin for "NSS Certificate DB": Enter password for PKCS12 file: pk12util: PKCS12 IMPORT SUCCESSFUL IMPORT THE AEGIS ROOT AND DIL CA CERTIFICATES certutil -A -n "AEGISROOTCA" -t "TC,," -i AEGISROOTCA.pem -d /opt/fipsdb certutil -A -n "AEGISDILCA" -t "TC,," -i AEGISDILCA.pem -d /opt/fipsdb * No input is required. CONFIRM THE CONTENTS OF YOUR NSS DATABASE certutil -L -d /opt/fipsdb * No input is required. This will list all of the certificates. Examine the output to insure the imported certificates are present aegisrootca, aegisdilca and <machine>.domain.com. You should see the following output: 9

Certificate Nickname <machine>.domain.com AEGISDILCA AEGISROOTCA Trust Attributes SSL,S/MIME,JAR/XPI u,u,u TC,, TC,, VERIFY THE CERTIFICATE CHAIN IS CORRECT vfychain -d /opt/fipsdb <machine>.domain.com * No input is required. This will verify that the certificate chain has been correctly established. You should see the following output: Chain is good! ENABLE FIPS MODE modutil -fips true -dbdir /opt/fipsdb * FIPS Mode must be enabled before (re)starting the application server. You should see the following output: WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q <enter>' to abort, or <enter> to continue: FIPS mode enabled. 5.5.3 UPDATE JBOSS SERVER CONFIGURATION Follow the FIPS 140-2 Red Hat Linux / JBoss configuration instructions for CONNECT 3.2: https://developer.connectopensource.org/display/nhinr32/fips+install+%28linux+and+jboss%29 5.5.4 VERIFY JBOSS SERVER CONFIGURATION 1. Start your JBoss server. 2. Examine the server logs after the application server start up is complete and verify that there are no certificate errors. 10