Configuring data encryption
This topic provides an overview of data encryption and instructions for provisioning the report server with a trust store.
- How encryption works between reports client and reports server
- Provisioning the reports server with a PKCS#12 trust store
How encryption works between reports client and reports server
For traffic between the reports client and the reports server,
relies on the HTTPS protocol (HTTP over TLS) to enable a secure communication between the web browser and reports server. Users authenticate themselves to the reports server over the HTTPS session.The TLS communication protocol automatically negotiates an encryption algorithm to secure data. Server-side certificates are used during the TLS handshake to establish session keys for encrypting traffic between the web browser and the reports server. By default the reports server uses a self-signed certificate, but you can replace it with a custom certificate. To generate a new certificate, you can use a tool such as OpenSSL.
A default installation of
sets up a Authentication Service, called BMC SARA Authentication. The reports server accesses the BMC SARA Authentication Service to authenticate a user and acquire single sign-on (SSO) credentials in the name of the authenticating user.By default, the mkcertstore utility extracts and uses the SSL certificate that was created during the
installation. During the installation, you are prompted to provide a certificate password.The installation program then runs the following command on Microsoft Windows:
"<BDSSAInstallationDirectory>\br\deployments\_template\bladelogic.keystore"
"<certificatePassword>"
The installation program then runs the following command on UNIX:
"<BDSSAInstallationDirectory>/br/deployments/_template/bladelogic.keystore"
"<certificatePassword>"
In these commands:
- <hostName> stands for host name of the reports server computer.
- <certificatePassword> stands for the certificate password.
Provisioning the reports server with a PKCS#12 trust store
- On the reports server, use the mkpkcs12 utility to generate a PKCS#12 trust store, as follows:
(Windows) Enter the following command from the BDSSAInstallationDirectory\bin directory:
mkpkcs12.exe C:\client_keystore.pkcs12(UNIX) Enter the following command from the BDSSAInstallationDirectory/br directory:
./mkpkcs12 /root/client_keystore.pkcs12The mkpkcs12 utility generates a file called client_keystore.pkcs12 at the location you have specified.
- Copy the client_keystore.pkcs12 file to the following location on the reports server:
- (Windows) BDSSAInstallationDirectory\security
- (UNIX) BDSSAInstallationDirectory/security
Create the securities folder, if it does not exist, and copy the file into the folder.
- Restart the reports server.