Session layer security
TrueSight Server Automation uses Transport Layer Security (TLS) for session layer security across all communications legs.
For more information about TLS support and the support of TLS version 1.2, see Configuring the TLS protocol.
For these communication legs, the following cipher suites are employed:
|Communication leg||Cipher suites|
TrueSight Server Automation Application Server
|TrueSight Server Automation |
Console (RCP client)
|Any third-party client that uses web services for communication||Application Server|
These ciphers provide the following capabilities:
256-bit AES symmetric block cipher mode
RSA on all ports
RSA and DH on the web service port (for backward communication with CLM and other products)
SHA 256 (NEW IN 8.9.03) and SHA1 HMAC construction for integrity protection
The TrueSight Server Automation Application Server and all client applications use the certified OpenSSL FIPS 140-2 object module for cryptographic operations on all transported data.
Communication with middle tier
When a TrueSight Server Automation client establishes a TLS connection with a middle tier entity (that is, the Authentication, Application, or Network Shell Proxy Services), the client must validate a certificate from that entity. At installation, middle tier entities are provisioned with self-signed X.509 certificates. (Optionally, you can provision middle tier entities with certificates issued by a CA. For more information, see Securing communication with CA certificates.) When a client first accesses a middle tier entity (by necessity, the Authentication Service) to authenticate and obtain an SSO credential, the client establishes a TLS connection with the Application Server hosting the Authentication Service. In the course of the TLS handshake, the client is presented with the Application Server self-signed X.509 certificate. The client cannot recognize the certificate as trusted so the client prompts the user to accept or reject the self-signed certificate. The client application displays the certificate's content, as well as its SHA1 and SHA256 fingerprints. If the user chooses to:
- Trust the self-signed certificate, the certificate is added to the client's list of trusted certificates and a secure session is established for the client.
- Not to trust the self-signed certificate, the session is terminated.
All client services running on a TrueSight Server Automation Application Server (Authentication Service, Application Service, and Network Shell Proxy Service) share the same certificate. If your installation employs multiple Application Servers or stand-alone Network Shell proxy servers, they too share the same certificate. After a client application has added the Authentication Service's certificate to its list of trusted certificates, the user is no longer prompted to trust that certificate when establishing future sessions with any of these other related entities.
A client's list of trusted certificates are stored in a file written in the Privacy Enhanced Mail (PEM) format. This file is known as a keystore. The keystore resides in a default location, but you can modify that location, as described in Setting override locations for client SSO files. Client applications re-write the keystore file when a trusted X.509 certificate is added to or removed from the trusted certificate store.
Communication with server tier
Self-signed certificates are used to secure communication between entities that communicate directly with agents. These entities could be Application Servers, Network Shell proxy servers, repeaters, or Network Shell clients. By default, TrueSight Server Automation generates self-signed certificates when an agent is installed on a server. The certificate is stored in a file called certificate.pem in the directory where the agent is installed. If this file is:
- Present, it is read every time an Application Server, Network Shell proxy server, repeater, or Network Shell client establishes a connection with the agent.
Not present, the agent creates one. Self-signed server-side certificates are used to secure the exchange of TLS session keys between agents and entities that communicate with agents.
NEW IN 8.9.03 For fresh installation of RSCD Agent 8.9.03, the certificate.pem is created with SHA256 Signature Algorithm.
If secure logging is configured on RSCD agent, certificate.pem file is used in secure logging. So, in case of upgrade, by default, the existing certificate.pem file is not upgraded to SHA256. To use SHA256 in certificate.pem for upgraded RSCD Agent, perform the following steps:
- Back up the existing certificate.pem, RSCD log files and respective signature files. This is applicable if you want to verify older RSCD log files on the server.
- Delete certificate.pem file.
- Perform any operation against RSCD Agent (for example, restart service, agent info). The RSCD Agent automatically creates a new certificate.pem file with SHA256 Signature Algorithm.
By default, TrueSight Server Automation does not use client-side certificates. However, you can choose to use self-signed client-side certificates for TLS sessions with RSCD agents. To accomplish this, you must provision agents with the SHA1 or SHA 256 fingerprints of trusted clients' self-signed certificates.