Enabling security for the Console Server and Search components--
To enable security for actions performed by using the product interface, you need to perform a set of steps as described in the following sections. These steps vary based on whether you want to use the default self-signed certificate available with TrueSight IT Data Analytics or whether you want to use a custom self-signed certificate for enabling security.
To enable security for actions performed by using the CLI, type -s in the command syntax. This applies even if you use a custom self-signed certificate. For more information about the individual CLI commands, see Managing-the-product-from-the-command-line-interface.
- To enable security for the Console Server with default certificate
- To enable security for the Console Server with custom self-signed certificate
To enable security for the Console Server with default certificate
- Navigate to the following location to locate the olaengineCustomConfig.properties file and the searchserviceCustomConfig.properties file.
- Windows: %BMC_ITDA_HOME%\custom\conf\server
- Linux: $BMC_ITDA_HOME/custom/conf/server
- In the olaengineCustomConfig.properties file, add the following properties:
- consoleserver.protocol=https
- consoleserver.port=9443
In the searchserviceCustomConfig.properties file, add the following properties:
- consoleserver.protocol=https
- searchservice.port=9443
- protocol=https
- Restart the Console Server and Search components.
For more information, see Starting-or-stopping-product-services. - Log on to the product in a supported browser by replacing "http" with "https" and port 9797 with port 9443.
For example, https://Host1:9443/console/.
To enable security for the Console Server with custom self-signed certificate
Before you begin enabling security for the Console Server with a custom self-signed certificate, ensure that you have generated a KeyStore in the JKS format. For more information, see 2018-06-09_08-51-07_Generating a KeyStore and TrustStore.
- Generate a custom self-signed certificate.
- Locate the server.xml file at one of the following locations:
- Windows: %BMC_ITDA_HOME%\tomcat\conf
- Linux: $BMC_ITDA_HOME/tomcat/conf
In the server.xml file, add the following properties with appropriate values, depending on the KeyStore that you generated earlier (see the following example).
- keystoreFile="keystoreFilePath"
- keystorePass="keystorePassword"
keyAlias="AliasofKeystore"
Example<Connector
SSLEnabled="true"
ciphers="TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384,TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384,TLS_DHE_DSS_WITH_AES_256_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,TLS_ECDH_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_DSS_WITH_AES_256_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256,TLS_DHE_DSS_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_DSS_WITH_AES_128_CBC_SHA,TLS_ECDHE_ECDSA_WITH_RC4_128_SHA,TLS_ECDH_ECDSA_WITH_RC4_128_SHA,TLS_ECDH_RSA_WITH_RC4_128_SHA,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384,TLS_DHE_DSS_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256,TLS_DHE_DSS_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA,TLS_EMPTY_RENEGOTIATION_INFO_SCSVF"
clientAuth="false" keyAlias="truesightserver"
keystoreFile="conf/bmcitda2.jks" keystorePass="changeit"
maxThreads="150" port="9443"
protocol="org.apache.coyote.http11.Http11NioProtocol"
scheme="https" secure="true" sslProtocol="TLS"/>- keystoreFile="keystoreFilePath"
- Navigate to the following location to locate the olaengineCustomConfig.properties file and the searchserviceCustomConfig.properties file.
- Windows: %BMC_ITDA_HOME%\custom\conf\server
- Linux: $BMC_ITDA_HOME/custom/conf/server
- In the olaengineCustomConfig.properties file, add the following properties:
- consoleserver.protocol=https
- consoleserver.port=9443
In the searchserviceCustomConfig.properties file, add the following properties:
- consoleserver.protocol=https
- searchservice.port=9443
- protocol=https
Import the self-signed certificate into the Console Server's Java Runtime Environment (JRE) by using the following command:
keytool -import -trustcacerts -alias <HostName-or-IP> -keystore $BMC_ITDA_HOME/jre/lib/security/cacerts -file <Certificate-Path>
In this command, the following variables apply:- <HostName-or-IP> refers to the host name or IP address of the computer on which the Console Server is located.
- <Certificate-Path> refers to the absolute path to the self-signed certificate of the Console Server.
- Restart the Console Server and Search components.
For more information, see Starting-or-stopping-product-services. - Log on to the product in a supported browser.
Example for accessing the console: https://Host1:9443/console/.
Enabling security for the Search components
By enabling security for the Search components, you can secure the communication between the Console Server and Search components, as follows:
- Navigate to the following location on each of the Search components:
- Windows: %BMC_ITDA_HOME%\custom\conf\server
- Linux: $BMC_ITDA_HOME/custom/conf/server
- In the the searchserviceCustomConfig.properties file, add the following properties:
- searchservice.port=9443
- protocol=https
- Restart the Search components.
For more information, see Starting-or-stopping-product-services.