Use this topic to enable security for the actions performed via the product interface and CLI and for communication between the Console Server and Search components.
If you want to additionally disable the HTTP port, ensure that you navigate to the computers hosting the Console Server and Search components, and navigate to %BMC_ITDA_HOME%\tomcat\conf\. In the server.xml file, comment out the following tag and then restart the Console Server and Search components. For more information, see Starting or stopping product services.
<Connector connectionTimeout="20000" port="9797" protocol="HTTP/1.1" redirectPort="9443"/>
By enabling security for the Console Server, you can secure the actions performed by using the product interface and by using the CLI.
To enable security for actions performed by using the product interface, you need to perform a set of steps as described in the following sections. These steps vary based on whether you want to use the default self-signed certificate available with IT Data Analytics or whether you want to use a custom self-signed certificate for enabling security.
To enable security for actions performed by using the CLI, type -s
in the command syntax. This applies even if you use a custom self-signed certificate. For more information about the individual CLI commands, see Managing the product from the command line interface.
Windows: %BMC_ITDA_HOME%\custom\conf\server
consoleserver.protocol=https
consoleserver.port=9443
In the searchserviceCustomConfig.properties file, add the following properties:
consoleserver.protocol=https
searchservice.port=9443
protocol=https
Note
If you are operating in an environment with multiple Search components, ensure that you make this change on all the computers hosting the Search component.
Before you begin enabling security for the Console Server with a custom self-signed certificate, ensure that you have generated a KeyStore in the JKS format. For more information, see Generating a KeyStore and TrustStore.
Locate the server.xml file at one of the following locations:
Linux: $BMC_ITDA_HOME/tomcat/conf
In the server.xml file, add the following properties with appropriate values, depending on the KeyStore that you generated earlier (see the following example).
keystoreFile="keystoreFilePath"
keystorePass="keystorePassword"
keyAlias="AliasofKeystore"
<Connector SSLEnabled="true" ciphers="TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384,TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384,TLS_DHE_DSS_WITH_AES_256_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,TLS_ECDH_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_DSS_WITH_AES_256_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256,TLS_DHE_DSS_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_DSS_WITH_AES_128_CBC_SHA,TLS_ECDHE_ECDSA_WITH_RC4_128_SHA,TLS_ECDH_ECDSA_WITH_RC4_128_SHA,TLS_ECDH_RSA_WITH_RC4_128_SHA,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384,TLS_DHE_DSS_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256,TLS_DHE_DSS_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA,TLS_EMPTY_RENEGOTIATION_INFO_SCSVF" clientAuth="false" keyAlias="truesightserver" keystoreFile="conf/bmcitda2.jks" keystorePass="changeit" maxThreads="150" port="9443" protocol="org.apache.coyote.http11.Http11NioProtocol" scheme="https" secure="true" sslProtocol="TLS"/>
Navigate to the following location to locate the olaengineCustomConfig.properties file and the searchserviceCustomConfig.properties file.
Windows: %BMC_ITDA_HOME%\custom\conf\server
In the olaengineCustomConfig.properties file, add the following properties:
consoleserver.protocol=https
consoleserver.port=9443
In the searchserviceCustomConfig.properties file, add the following properties:
consoleserver.protocol=https
searchservice.port=9443
protocol=https
Note
If you are operating in an environment with multiple Search components, ensure that you make this change on all the computers hosting the Search component.
Import the self-signed certificate into the Console Server's Java Runtime Environment (JRE) by using the following command:
keytool -
import
-trustcacerts -alias <HostName-or-IP> -keystore $BMC_ITDA_HOME/jre/lib/security/cacerts -file <Certificate-Path>
<HostName-or-IP>
refers to the host name or IP address of the computer on which the Console Server is located.<Certificate-Path>
refers to the absolute path to the self-signed certificate of the Console Server.By enabling security for the Search components, you can secure the communication between the Console Server and Search components, as follows:
Windows: %BMC_ITDA_HOME%\custom\conf\server
searchservice.port=9443
protocol=https