Configuring TrueSight Operations Management Report Engine to enable TLS
Following installation of the TrueSight Operations Management Report Engine components, you can switch from the default inter-component security configuration to TLS 1.2 configuration.
To configure the TrueSight Operations Management Reporting Engine components to enable TLS 1.2
There are different communication channels established between the TrueSight Operations Management Reporting Engine components. Perform the TLS configurations per communication channel. Select the communication channel that you want to make TLS compliant and perform the tasks accordingly. The flowchart in the following diagram explains the complete TLS configuration workflow.
To enable TLS 1.2, complete the procedures by navigating the following tabs, or select the procedures from documentation links in the flowchart.
TrueSight Operations Management Reporting communicates with various components in a secure manner using TLS. These components might operate like a client or a server based on the context of communication. To achieve TLS mode of communication, the security certificates need to be authenticated between a client and a server. If a component is operating as a client, it requires a truststore to verify the server's credentials. If a component is operating as a server, it requires a keystore that provides credentials to the client to verify. You must procure these certificate files from your organization's security administrator or generate the CA-signed certificates.There are two types of certificate files that are used for authentication.
- A public certificate file which is a Certificate Authority (CA) signed certificate in .crt format.
- A private key file which is in Public-Key Cryptography Standards (PKCS) that is .p12 format.

- Step a: To apply TrueSight Infrastructure Management SQL Anywhere database certificate to Reporting Engine
- Step b: To apply Infrastructure Management server and cell certificate to Reporting Engine
- Step c: To apply Oracle/SQL database certificates to Reporting Engine
- Step d: To import the private key into the Report Engine keystore
- Step e: To create the signed certificates for SAP Business Objects Web client and secure it
Step a: To apply TrueSight Infrastructure Management SQL Anywhere database certificate to Reporting Engine
The Report engine uses the following certificate files procured from the Infrastructure Management SQL Anywhere database administrator for its communication.- certificate file in .pem format
- key file in .pem format
- identity file in .pem format
- Log on to the computer where the TrueSight Operations Management Report Engine is installed.
- Procure the certificate, key, and identity file in .pem format from the Infrastructure Management SQL Anywhere database administrator and place it in the <TrueSight Operations Management Report Engine Install Directory>\ReportEngine\tools\jre\lib\security directory.
Step b: To apply Infrastructure Management server and cell certificate to Reporting Engine
The Report engine uses the cacerts as the default keystore and truststore for its communication with the Infrastructure Management server cell component. This truststore and keystore file is present along with the TrueSight Operations Management Reporting installation, and is located in the <TrueSight Operations Management Reporting Install Directory>\ReportEngine\tools\jre\lib\security directory.Perform the following sequence of steps to secure the communication between the Infrastructure Management server cell and the Report engine component.- Log on to the computer where the TrueSight Operations Management Reporting is installed.
- Procure the Infrastructure Management server cell signed certificate, and place it in the <TrueSight Operations Management Reporting Install Directory>\ReportEngine\tools\jre\lib\security directory.
- The keytool utility that is used to import the certificates is present in the <TrueSight Operations Management Reporting Install Directory>\ReportEngine\tools\jre\bin directory. Add this directory path to the PATH environment variable by running the following command:# Microsoft Windows operating system#Unix operating systemCurrentDirectory>cd <TrueSight Operations Management Reporting Install Directory>\ReportEngine\tools\jre\bin$cd <TrueSight Operations Management Reporting Install Directory>/ReportEngine/tools/jre/bin
- Navigate to the <TrueSight Operations Management Reporting Install Directory>\ReportEngine\tools\jre\lib\security directory, and import the procured certificate from the Infrastructure Management server cell to the default truststore file by running the following command:keytool -import -alias cell -file mcell.crt -keystore cacerts
Step c: To apply Oracle/SQL database certificates to Reporting Engine
The Reporting engine uses the cacerts as the default truststore file for its communication with the Reporting database (Oracle/SQL) or the external Oracle database communication. This truststore is present along with the TrueSight Operations Management Reporting installation, and is located in the <TrueSight Operations Management Report Engine Install Directory>\ReportEngine\tools\jre\lib\security directory. Perform the following sequence of steps to secure the communication between the Reporting database (Oracle) and the Report engine component.- Log on to the computer where the TrueSight Operations Management Reporting is installed.
- Perform the following steps depending on the type of the Reporting database used:
- Oracle database: Procure the oracle certificate from the oracle database administrator, and place it in the <TrueSight Operations Management Report Engine Install Directory>\ReportEngine\tools\jre\lib\security directory.
- SQL database: Procure the SQL certificate from the SQL database administrator, and place it in the <TrueSight Operations Management Report Engine Install Directory>\ReportEngine\tools\jre\lib\security directory.
- The keytool utility that is used to import the certificates is present in the <TrueSight Operations Management Report Engine Install Directory>\ReportEngine\tools\jre\bin directory. Add this directory path to the PATH environment variable by running the following command:#Microsoft windows operating system#Unix operating system$cd <TrueSight Operations Management Reporting Install Directory>/ReportEngine/tools/jre/binCurrentDirectory>cd <TrueSight Operations Management Reporting Install Directory>\ReportEngine\tools\jre\bin
- Navigate to the <TrueSight Operations Management Reporting Install Directory>\ReportEngine\tools\jre\lib\security directory, and import the procured Oracle certificate/SQL certificate into the default truststore file by running the following commands:#Oracle databasekeytool -importcert -trustcacerts -file oracle.crt -keystore cacerts -alias oracleCert #SQL databasekeytool -importcert -trustcacerts -file sqlcert.crt -keystore cacerts -alias sqlCert
Step d: To import the private key into the Report Engine keystore
TrueSight Operations Management Report Engine communicates with the Infrastructure Management server cell. In this context of communication the Report Engine operates as a server. To establish this communication the Report Engine has to have a keystore with a private key imported into it.- Log on to the computer where the TrueSight Operations Management Report Engine is installed.
- Procure a private key in the PKCS12 format from the TrueSight Operations Management Report Engine security administrator, and place it in the <TrueSight Operations Management Reporting Install Directory>\ReportEngine\tools\jre\lib\security directory.
- The keytool utility that is used to import the certificates is present in the <TrueSight Operations Management Reporting Install Directory>\ReportEngine\tools\jre\bin directory. Add this directory path to the PATH environment variable by running the following command:# Microsoft Windows operating system# Unix operating systemCurrentDirectory>cd <TrueSight Operations Management Reporting Install Directory>\ReportEngine\tools\jre\bin$cd <TrueSight Operations Management Reporting Install Directory>/ReportEngine/tools/jre/bin
- Navigate to the <TrueSight Operations Management Reporting Install Directory>\ReportEngine\tools\jre\lib\security directory, and import the procured private key from the Report Engine system administrator to the default keystore file by running the following command:keytool -importkeystore -deststorepass changeit -destkeypass changeit -destkeystore cacerts -srckeystore server.p12 -srcstoretype PKCS12 -srcstorepass password
Step e: To create the signed certificates for SAP Business Objects Web client and secure it
SAP Business Object Central Management Server communicates with the BI Launchpad web client. The SAP BO TOMCAT server uses BIKeystore keystore for its communication with the BI Launchpad web client. The SAP Business Objects 4.1 is installed using the java supported by SAP (sapjvm) SAPJVM. The keytool utility that is used to create certificate files is located in the <SAP Business objects Install directory>\SAP BusinessObjects\SAP BusinessObjects Enterprise XI 4.0\win64_x64\sapjvm\bin directory. Perform the following set of steps to generate a CA signed certificate and place it in the BIKeystore keystore file:- To create a keystore, navigate to the <SAP Business objects Install directory>\SAP BusinessObjects\SAP BusinessObjects Enterprise XI 4.0\win64_x64\sapjvm\bin directory and run the following command: The command prompts you to enter the details such as name, organization details as shown in the following code block. Enter the details appropriately.The preceding command generates BIKeystore.keystore file in the C:\SSL directory.keytool -genkey -keyalg RSA -keysize 4096 -sigalg sha256withRSA -alias sapserv –keystore C:\SSL\BIKeystore.keystore
...
...
What is the name of your organizational unit?
[Unknown]: <organizational unit>
What is the name of your organization?
[Unknown]: <company>
What is the name of your City or Locality?
[Unknown]: <city>
What is the name of your State or Province?
[Unknown]: <state>
What is the two-letter country code for this unit?
[Unknown]: <country code>
Is CN=<FQDN of SAP server<organizational unit>, O=<company>, L=<city>, ST=<state>, C=<country code> correct?
[no]: yes - To create a Certificate Signing Request (CSR), navigate to the keytool location where the JAVA 7 or later is installed and run the following command:Send the SAPBO.csr to the Certifying Authority (CA) to generate a CA signed certificate.keytool -certreq -keyalg RSA -keysize 4096 -alias sapserv -file C:\SSL\SAPBO.csr -keystore C:\SSL\BIKeystore.keystore -ext SAN=dns:Change by the hostname,dns: Change by the FQDN,dns: Change by the alias 1,dns: Change by the alias 2 and etc...
- Import the CA signed certificate into the BIKeystore.keystore file by running the following command:#Syntax
keytool -importcert -keystore <path of the keystore file> -alias <alias name> -file <CA signed certificate name>
#Example
keytool -importcert -keystore C:\SSL\BIKeystore.keystore -alias sapcert -file SAPBO.cer
Perform the following steps to enable the Infrastructure Management server main cell to Reporting engine communication to be TLS compliant:
- Step 1:To configure the Infrastructure Management server cell component
- Step 2:To configure the Report Engine component
To configure the Infrastructure Management server cell component
- Using a text editor, open the mcell.dir file on the BMC TrueSight Infrastructure Management Server host computer. The file is located in the <Infrastructure Management server Install Directory>\pw\server\etc directory.
Check for the instance of the code line having encryption key value as shown in the following code block:
gateway.reportengine bpre.<fullyQualifiedHostName> <encryptionKey> <fullyQualifiedHostName>:<3783>#Example
gateway.reportengine bpre.vs-pun-tsim-bp03.bmc.com mc vs-pun-tsim-bp03.bmc.com:3783
Modify the existing value of encryption key to *TLS as shown in the following example:
gateway.reportengine bpre.vs-pun-tsim-bp03.bmc.com *TLS vs-pun-tsim-bp03.bmc.com:3783- Save and close the file.
Reload the mcell.dir file by entering the following command from a command line:
#Syntax
mcontrol -n cellName reload dir#Example
mcontrol -n pncell_vm-w23-rds1016 reload dir
To configure the Report Engine component
Navigate to the reportsCLI directory by running the following command:
# Microsoft Windows operating system
CurrentDirectory>cd <TrueSight Operations Management Reporting Install directory>\bin\reportsCLI# Unix operating system
$cd <TrueSight Operations Management Reporting Install directory>/bin/reportsCLIInitiate the configuration settings by running the following command:
#Syntax
tls_config init -truststore <truststore file> -truststorepassword <truststore password> [-keystore <keystore file> -keystorepassword <keystore password>][-SqlAnywhereCert <trust certificate path>]#Example
tls_config init -truststore cacerts -truststorepassword <truststore password> -keystore cacerts -keystorepassword <keystore password> -SqlAnywhereCert <BMC TrueSight Operations Management Report Engine Install Directory>\ReportEngine\tools\jre\binEnable the TLS configuration by running the following command:
tls_config enable -component cell
Perform the following steps to enable the Infrastructure Management server SQL Anywhere database to Report Engine communication to be TLS compliant:
Step 1: To configure the SQL Anywhere database on Windows operating system /To configure the SQL Anywhere database on Unix operating system
Step 2: To configure the Report Engine component
Before you begin
Ensure that the SQL Anywhere security certificates are procured and placed in the relevant directory paths. For more information, see Importing-security-certificates-for-the-TrueSight-Operations-Management-Report-Engine.
To configure the SQL Anywhere database on Windows operating system
Logon to the Infrastructure Management server computer where the SQL Anywhere database is installed, and perform the following steps:
Stop the database by running the following command:
pw p r dbsrv- Using a text editor, open the pndbsrv.conf file located in the <Infrastructure Management server Install Director>\TrueSight\pw\pronto\conf directory.
Add the following lines into pndbsrv.conf file.
#Syntax
COMDefine -esCOMDefine -ec "TLS(identity=<identify_file_dir_path>\<identity_file>;identity_password=<password provided for protecting the private key>)"#Example
COMDefine -esCOMDefine -ec "TLS(identity=<Infrastructure Management Server Install Directory>\pw\pronto\conf\id.pem;identity_password=pwd)"Restart the database by running the following command:
pw p r dbsrv
To configure the SQL Anywhere database on Unix operating system
- Take a backup of the startdbsrv7 file located in the <Infrastructure Management server Install Directory>/TrueSight/pw/pronto/bin directory.
Create an environment variable for the TLS configuration as shown in the following code block:
#Syntax
Setenv TLS_CONFIG -ec "TLS(identity=<identity_file_dir_path>\<identity_file>;identity_password=<password provided for protecting the private key>)"#Example
Setenv TLS_CONFIG -ec "TLS(identity=<Infrastructure Management Server Install Directory>/pw/pronto/conf/id.pem;identity_password=pwd)"Append the newly created environment variable into the startdbsrv7 file as shown in the following code block:
if ($ip == "" || $ip == "localhost") then${DBINSTALLDIR}/asa/bin/dbsrv -ud -x "tcpip(ServerPort=$port)" ${DBINSTALLDIR}/storm_${DBHOSTNAME}.db -n storm_${DBHOSTNAME} -c ${dbsrvicache}g -ch ${dbsrvhcache}p -cl ${dbsrvlcache}p -gp 4096 -gn 50 -ti 0 -tl 0 -gk all -os 20000000 -o ${SATMP}/storm_${DBHOSTNAME}db.log -ec ${TLS_CONFIG} set count=0else${DBINSTALLDIR}/asa/bin/dbsrv -ud -x "tcpip(ServerPort=$port;MyIP=${ip})" ${DBINSTALLDIR}/storm_${DBHOSTNAME}.db -n storm_${DBHOSTNAME} -c ${dbsrvicache}g -ch ${dbsrvhcache}p -cl ${dbsrvlcache}p -gp 4096 -gn 50 -ti 0 -tl 0 -gk all -os 20000000 -o ${SATMP}/storm_${DBHOSTNAME}db.log -ec ${TLS_CONFIG}EndifRestart the database by running the following command:
pw p r dbsrv- Verify that the process has started with new TLS_CONFIG option in the logfile located in the <Infrastructure Management server Install Directory>/TrueSight/pw/pronto/logs.
To configure the Report Engine component
- Navigate to the <TrueSight Operations Management Report Engine Install directory>\bin\reportsCLI directory.
Initialize the configuration settings by running the following command:
#Syntax
tls_config init [-SqlAnywhereCert <trust certificate path>]#Example
tls_config init -SqlAnywhereCert "<TrueSight Operations Management Report Engine Install Directory>\ReportEngine\tools\jre\lib\security\cert.pem"Enable the TLS configuration by running the following command:
tls_config enable -component TSIMDB [-port <2638>]
Perform the following steps to enable the Infrastructure Management server Oracle database to Reporting Engine communication to be TLS compliant:
Before you begin
If the Oracle database is configured in TLS 1.2 mode, then perform the following steps to configure the Infrastructure Management Server in TLS 1.2 mode.
- Ensure that the Oracle database security certificates are procured and placed in the relevant directory paths. For more information, see Importing security certificates for the TrueSight Operations Management Report Engine.
To configure the Reporting Engine component
Navigate to the reportsCLI directory by running the following command:
# Microsoft Windows operating system
CurrentDirectory>cd <TrueSight Operations Management Reporting Install directory>\bin\reportsCLI# Unix operating system
$cd <TrueSight Operations Management Reporting Install directory>/bin/reportsCLIInitiate the configuration settings by running the following command:
#Syntax
tls_config init -truststore <truststore file> -truststorepassword <truststore password>#Example
tls_config init -truststore cacerts -truststorepassword <truststore password>Enable the TLS configuration by running the following command:
tls_config enable -componentType REDB -port 2484
There are two types of Reporting databases used in the TrueSight Operations Management Reporting. They are:
- Oracle database
- SQL server
Perform the following steps to enable the Reporting Engine to Reporting database communication to be TLS compliant:
To configure the Reporting engine
- Ensure that TrueSight Reporting Engine is installed by disabling the encryption switch. For more information, see To disable the encryption switch before installing the Report Engine to support TLS.
Navigate to the reportsCLI directory by running the following command:
# Microsoft Windows operating system
CurrentDirectory>cd <TrueSight Operations Management Reporting Install directory>\bin\reportsCLI# Unix operating system
$cd <TrueSight Operations Management Reporting Install directory>/bin/reportsCLIInitiate the configuration settings by running the following command:
#Syntax
tls_config init -truststore <truststore file> -truststorepassword <truststore password>#Example
tls_config init -truststore cacerts -truststorepassword <truststore password>
To configure the Reporting database
Navigate to the reportsCLI directory by running the following command:
# Microsoft Windows operating system
CurrentDirectory>cd <TrueSight Operations Management Reporting Install directory>\bin\reportsCLI
# Unix operating system
$cd <TrueSight Operations Management Reporting Install directory>/bin/reportsCLIEnable the TLS configuration by running the following command:
#Syntax
tls_config enable -componentType <component> -port <TLS port>#For Oracle database
tls_config enable -componentType REDB -port 2484
#For SQL server
tls_config enable -componentType REDB -port 2484
The Central Management Server communicates with the BI launch pad over https connection. Perform the following steps to enable this communication to be TLS compliant:
To configure the Central Management Server and Repository
- To open the Central Configuration Manager (CCM), from the desktop or Start menu, navigate to Sap Business Intelligence -> SAP BusinessObjects Platform 4 -> Central Configuration Manager.
- Stop the Tomcat web server.
- Locate the server.xml file located in the <TrueSight Operations Management Report Engine Install directory>\SAP BusinessObjects\Tomcat6\conf directory.
- Make a copy of this file and save it as server.xml.bak
- Using a text editor open the server.xml file.
Uncomment the instance of the code line having the Connector port value as tcp as shown in the following code block:
<Connector port="8443" ....Add the attributes to the xml file as shown in the following code block:
keystorePass="Password1" keystoreFile="C:\SSL\.keystore". <Connector port="8443" protocol="HTTP/1.1" SSLEnabled="true" maxThreads="150" scheme="https" secure="true" clientAuth="false" keystorePass="bmcAdm1n" keystoreFile="C:\SSL\.keystore" sslProtocol="SSL" sslEnabledProtocols="TLSv1.2"/>- Save and close the file.
Enable the following environment variables:
set JAVA_HOME=C:\Java64\jdk1.8.0_60set PATH=%PATH%;C:\Java64\jdk1.8.0_60\binset CATALINA_HOME=C:\apache-tomcat-7.0.64-64bitset JAVA_OPTS=-Djdk.tls.client.protocols="TLSv1.2" -Dsun.security.ssl.allowUnsafeRenegotiation=false -Dhttps.protocols="TLSv1.2"- Start the Tomcat web server.
Open the Central Management Server, and the BI launch pad web client using the port that is used to configure the TLS. For example, in the preceding command port number 8443 is used to configure TLS, hence open the server and client as shown below:
Https://<BO_Hostname>:8443/BOE/BI
Https://<BO_Hostname>:8443/BOE/CMC
Related topic