This section describes the management of secure socket layer (SSL) keys and the settings for traffic decryption of the BMC Real User Cloud Probe.
A web application uses encryption to protect sensitive data that travels between the client and the server. Without the proper deciphering mechanism, the system cannot decrypt the intercepted traffic. To process encrypted traffic, you must upload the appropriate cryptographic keys (so-called SSL keys) to the host with the Cloud Probe.
The Cloud Probe supports SSL keys with certificates that use the privacy-enhanced mail (PEM) format. Passphrase- and Password-protected private keys are not supported. For a list of supported cipher suites, see Key management views.
Navigate to the Cloud Probe configuration file.
Operating System | File location |
---|---|
Linux | <installDirectory>/conf |
Windows |
|
pem__PEM
suffix:mv /<keyLocation>/<keyName>.pem /<keyDestination>/<keyName>.pem__PEM
<
keyname>.pem__PEM
.To manage SSL keys, insert the following code blocks to the epssl.cfg file as shown below or in the Example SSL keys.
keymaterial <privateKeyFilePath>/<keyName>.pem__PEM ON keyfor 0.0.0.0-255.255.0.0 443-443 1 <keyName>.pem
The first line specifies the location of the private key and uses the following syntax:
Keyword | Path to private key | State of key |
---|---|---|
|
|
|
<privateKeyFilePath>
is the path to the private key file.ON
.
The <privateKeyFilePath>
where you store the keys, should not contain spaces; otherwise, the command will return an error. The SSL key path name must use forward slashes (/), even when the Cloud Probe is on a Windows system.
The second line specifies the properties of the private key mentioned in the previous line, and uses the following syntax:
Keyword | IP address (range) | Port (range) | Host ID | Private key |
---|---|---|---|---|
keyfor | 0.0.0.0-255.255.0.0 | 443-443 | 1 |
|
The private key specified in the second line does not have pem__PEM
suffix.
Start the Cloud Probe service.
To verify an SSL key has been loaded properly by a Cloud Probe, the check for the following success message in the installationDirectory/cloudprobe\staging\var\log\epx\probe.log_ file.
<date and time stamp> info [CORE] INFO: SSL Keys and/or Hosts accept: GOOD
Issue: After the Cloud probe service starts, the SSL CFG ERROR
error in the cloud-probe service log indicates a problem with epssl.cfg file.
Resolution: Check the definition of the key file in the epssl.cfg file for the following:
Installing the Real User Cloud Probe
3 Comments
Nataliia Lytvynenko
Ranganath Samudrala
Please add a comment related to the Cipher Suite supported by the Cloub Probe as well. Oh - I see that here: https://docs.bmc.com/docs/display/public/euem25/Key+management+views
Sandy Reid