Enabling TLS server certificate validation among the internal product components
If these components are communicating in HTTPS mode, then TLS 1.2 is enabled by default. Complete the following steps to enable server certificate validation:
I. Obtain a signed security certificate
Ensure that you obtain a CA-signed certificate from the security department of your organization or create a request to obtain it from the CA that your organization recommends. For information about creating a request for a signed certificate, see Creating-a-request-for-a-CA-signed-certificate.
The certificate (<CertificateName>.crt) will be available at the following location:
II. Install the security certificate
The Application Server and ETL Engine Server use cotruststore.ts truststore to communicate with other components. The truststore is bundled along with the Server installation, and is located in the <Server Installation Directory>/secure directory. The default <Server Installation Directory> is /opt/bmc/BCO.
Complete the following procedure on the Application Server and ETL Engine Server:
Log on to the computer where the Server is installed. The keytool utility that is used to import the certificates is present in the <Server Installation Directory>/jre/bin directory. Add this directory path to the PATH environment variable by running the following command:
export PATH=<Server Installation Directory>/jre/bin:$PATHGo to <Server Installation Directory>/secure directory and import the procured certificates by running the following command:
keytool -importcert -trustcacerts -file <path>/<CertificateName>.cert -keystore cotruststore.ts -alias <CertificateName>- When you are prompted, enter the password to access the keystore.
- When you are prompted to trust the certificate, enter Yes.
III. Configure the product components to use TLS
Complete the following steps on all the computers that have the Application Server components and ETL Engine Server installed:
Navigate to the <Server Installation Directory>/tools directory and run the switchTLSmode.pl script.
#Example
perl switchTLSmode.pl -on -tspwd -flow internal
2. When you are prompted, enter the password to access the truststore.
The communication channels between the internal product components are now TLS 1.2 enabled with server certificate validation.
Related topic