Enabling TLS server certificate validation to external database
The local and remote ETL Engine Servers of TrueSight Capacity Optimization can communicate with the following external databases:
- Oracle
- PostgreSQL
- SQL Server
You can use Transport Layer Security (TLS) 1.2 with server certificate validation to secure communication between these components.
Before you begin
Ensure that you use the database versions that support TLS 1.2. For more information, see TLS-considerations-for-TrueSight-Capacity-Optimization.
For external Oracle database
Before you begin
- Ensure that the Oracle database is configured in TLS 1.2 mode.
- Ensure that TLS-compatible ojdbc7.jar file exists in the <Oracle client home>/jdbc/lib directory. If not, you can copy the file from the Oracle Website.
Enable TLS 1.2 with server certificate validation
- Procure the Oracle database certificate from the system administrator of your organization if a self-signed certificate is used. Ensure that the certificate is in x509 format. For example, oracle.crt.
If a certificate that is signed for the Oracle database by an enterprise certificate authority (CA) or a third-party CA as a trusted root authority is used, import this signed certificate to avoid importing of multiple signed certificates for all TLS connections. Save the procured certificate file in the following locations:
Component
Location
Local ETL Engine Server
<Local ETL Engine Server Installation Directory>/secure
Remote ETL Engine Server
<Remote ETL Engine Server Installation Directory>/secure
Log on to the computer where the Server is installed. The keytool utility that is used to import the certificates is present in the <Server Installation Directory>/jre/bin directory. Add this directory path to the PATH environment variable by running the following command:
export PATH=<Server Installation Directory>/jre/bin:$PATHGo to <Server Installation Directory>/secure directory and import the procured certificates by running the following command:
keytool -importcert -trustcacerts -file <path>/oracle.crt -keystore cotruststore.ts -alias <CertificateName>- When you are prompted, enter the password for the keystore.
- When you are prompted to trust the certificate enter Yes.
The communication between the external Oracle database and the ETL Engine Servers is now TLS 1.2 enabled with server certificate validation.
For external PostgreSQL database
- Procure the PostgreSQL database certificate from the system administrator of your organization if a self-signed certificate is used. Ensure that the certificate is in x509 format. For example, postgresql.crt.
If a certificate that is signed for the PostgreSQL database by an enterprise certificate authority (CA) or a third-party CA as a trusted root authority is used, import this signed certificate to avoid importing of multiple signed certificates for all TLS connections. Save the procured certificate file in the following locations:
Component
Location
Local ETL Engine Server
<Local ETL Engine Server Installation Directory>/secure
Remote ETL Engine Server
<Remote ETL Engine Server Installation Directory>/secure
Log on to the computer where the Server is installed. The keytool utility that is used to import the certificates is present in the <Server Installation Directory>/jre/bin directory. Add this directory path to the PATH environment variable by running the following command:
export PATH= <Server Installation Directory>/jre/bin:$PATHGo to <Server Installation Directory>/secure directory and import the procured certificates by running the following command:
keytool -importcert -trustcacerts -file <path>/extdb.crt -keystore cotruststore.ts -alias <CertificateName>- When you are prompted, enter the password to access the keystore.
- When you are prompted to trust the certificate enter Yes.
The communication between the external PostgreSQL database and the ETL Engine Servers is now TLS 1.2 enabled with server certificate validation.
For external SQL Server database
You can configure only Java-based database extractors to be TLS compliant.
- Procure the Certificate Authority (CA) signed certificate from the system administrator of your organization. Ensure that the certificate is in x509 format. For example, extdatabase.crt.
Save the procured certificate file in the following locations:
Component
Location
Local ETL Engine Server
<Local ETL Engine Server Installation Directory>/secure
Remote ETL Engine Server
<Remote ETL Engine Server Installation Directory>/secure
Log on to the computer where the Server is installed. The keytool utility that is used to import the certificates is present in the <Server Installation Directory>/jre/bin directory. Add this directory path to the PATH environment variable by running the following command:
export PATH= <Server Installation Directory>/jre/bin:$PATHGo to <Server Installation Directory>/secure directory and import the procured certificates by running the following command:
keytool -importcert -trustcacerts -file <path>/extdb.crt -keystore cotruststore.ts -alias <CertificateName>- When you are prompted, enter the password to access the keystore.
- When you are prompted to trust the certificate enter Yes.
The communication between the external SQL Server database and the ETL Engine Servers is now TLS 1.2 enabled with server certificate validation.
Where to go from here