Importing the TLS security certificates for a PATROL Agent
To import the security certificates into the PATROL Agent certificate store
PATROL Agent communicates with the Integration Service, PATROL console, and the remote cell.
The PATROL Agent acts as a client or a server based on the components with which it communicates, as explained in the following section:
- PATROL Agent to Integration Service communication: PATROL Agent acts as a client.
- PATROL Agent to PATROL console communication: PATROL Agent acts as a server.
- PATROL Agent to remote cell communication: PATROL Agent acts as a client.
TLS mode of communication requires the client, and the server to have public key infrastructure (PKI) certificates deployed in their respective certificate stores. The authentication process varies depending on the PATROL Agent's role as a server or a client, as explained in the following sections:
PATROL Agent configured as a client
PATROL Agent operates as a client when it is communicating with the Integration Service, and the remote cell. To enable the TLS handshake, deploy the Mozilla NSS certificates in the DB store format at the PATROL Agent. There are two security options as explained in the following section:
- Integration Service is authenticated by the PATROL Agent: To enable the PATROL Agent to authenticate the server, import the Certificate Authority (CA) certificates of the Integration Service or remote cell to the PATROL Agent certificate store. This is in continuation to the Security Level 3 implementation of the previous versions of the PATROL Agent communication.
- Integration Service is not authenticated by the PATROL Agent: In a trusted environment, if the PATROL Agent administrator can ensure the authenticity of the Integration Service Host, or the remote cell the PATROL Agent can be configured to bypass sever authentication. This is in continuation to the Security Level 2 implementation of the previous versions of the PATROL Agent communication.
The following sections explain the procedure to implement the preceding security mechanisms:
Integration Service is not authenticated by the PATROL Agent
In this scenario, the Integration Service certificates are not imported to the PATROL Agent certificate store. You can proceed to configure the PATROL Agent to enable TLS 1.2 mode.
Integration Service is authenticated by the PATROL Agent
Perform the following steps to import the security certificates to the PATROL Agent certificate store.
Create a Mozilla certificate store on the central server for the PATROL Agent.
Run the following command#On Microsoft Windows
$mkdir <installationdirectory>\common\security\keys\PatrolAsClient_DB
$certutil -N -d sql:<installationdirectory>\common\security\keys\PatrolAsClient_DB
#On Unix
$mkdir <installationdirectory>/common/security/keys/PatrolAsClient_DB
$certutil -N -d sql:<installationdirectory>/common/security/keys/PatrolAsClient_DBProcure CA certificates of the Integration Service from your security administrator, and place them in the <installationdirectory>\common\security\keys\PatrolAsClient_DB directory.
Import the CA certificate to the PATROL Agent client certificate store.
Run the following commandcertutil -d sql: <installationdirectory>\common\security\keys\PatrolAsClient_DB -A -n "Trusted IS CA" -t "CT,," -a -i ca.crtIf the CA certificates are in public-key cryptography standards 12 (PKCS12) format, import the certificate using the following command.
$pk12util pk12util -i client.p12 -d sql: <installationdirectory>\common\security\keys\PatrolAsClient_DB -W <password>- Perform the configuration changes needed to enable TLS 1.2 mode.
PATROL Agent configured as a server
Perform the following steps, when PATROL Agent is communicating with the PATROL console.
Create a Mozilla certificate store on the central server for the PATROL Agent.
Run the following command#On Microsoft Windows
$mkdir <installationdirectory>\common\security\keys\PatrolAsServer_DB
$certutil -N -d sql:<installationdirectory>\common\security\keys\PatrolAsServer_DB
#On Unix
$mkdir ./<installationdirectory>/common/security/keys/PatrolAsServer_DB
$certutil -N -d sql:./<installationdirectory>/common/security/keys/PatrolAsServer_DBProcure the CA certificates from your organisation's security administrator, and place them in the <installationdirectory>\common\security\keys\PatrolAsServer_DB directory.
Import the procured CA certificates to the PATROL Agent server certificate store.
Run the following commandcertutil -d sql: <installationdirectory>\common\security\keys\PatrolAsServer_DB -A -n "Trusted IS CA" -t "CT,," -a -i ca.crtIf the CA certificates are in public-key cryptography standards 12 (PKCS12) format, import the certificate using the following command.
pk12util pk12util -i server.p12 -d sql: <installationdirectory>\common\security\keys\PatrolAsServer_DB -W <password>- Perform the configuration changes needed to enable TLS 1.2 mode.
Where to go from here
Configuring-the-PATROL-Agent-network-communication-to-be-TLS-compliant
Related topic