Activating FIPS encryption and connecting to LDAP
The U.S. Federal government agencies use software that complies with Federal Information Processing Standard (FIPS) 200. According to FIPS 200, software that complies with FIPS 140-2 must handle the information that needs cryptographic protection.
The built-in BMC Remedy Encryption Standard Security product does not include a FIPS option. If you need stronger levels of encryption, deploy and activate BMC Remedy Encryption Performance Security or BMC Remedy Encryption Premium Security.
- BMC Remedy Encryption Performance Security—When you activate this option, AR System encrypts network traffic by using AES CBC with a 128-bit key for data encryption and a 2048-bit modulus for the RSA key exchange, and SHA-1 for message authentication.
- BMC Remedy Encryption Premium Security—When you activate this option, AR System encrypts network traffic by using AES CBC with a 256-bit key for data encryption and a 4096-bit modulus for the RSA key exchange, and SHA-1 for message authentication.
Both options support the minimum FIPS 140-2 encryption requirements.
If required, after you install BMC Remedy Encryption Performance Security or BMC Remedy Encryption Premium Security, configure FIPS encryption.
Activating FIPS encryption
If BMC Remedy Encryption Performance Security or BMC Remedy Encryption Premium Security 20.02 is installed on a server, use the FIPS Enabled option in the Encryption tab (see Encryption tab) in conjunction with the Security Policy setting to switch compliance with Federal Information Processing Standard (FIPS) 140-2 on or off:
FIPS Enabled option | Security Policy value | Is server FIPS compliant? | Description |
---|---|---|---|
Selected | Required | Yes |
|
Selected | Disabled | No | Clients communicating with the server cannot communicate with FIPS-compliant servers. |
Cleared | Optional, Required, or Disabled | No | Clients communicating with the server cannot communicate with FIPS-compliant servers. |
Transition tips
If you are in the process of converting to a FIPS-compliant environment, consider these tips:
- Do not select the FIPS Enabled option for a server until all clients that must communicate with that server have the appropriate BMC Remedy Encryption Performance Security or BMC Remedy Encryption Premium Security 20.02 installed.
- During the transition phase, set the Security Policy to Optional on all servers that have BMC Remedy Encryption Performance Security or BMC Remedy Encryption Premium Security 20.02 installed so that they can communicate with clients that have not yet been upgraded to 20.02.
- Be aware that when a server's Security Policy is set to Optional and a client cannot support the encryption algorithm (such as AES) required by the server, communication between the server and client is unencrypted.
To activate FIPS compliance
- Ensure that one of these products is installed on the appropriate BMC Remedy AR System server and on any clients that will communicate with the server:
- BMC Remedy Encryption Performance Security
BMC Remedy Encryption Premium Security
- Log on to the server.
- Open the AR System Administration Console.
- Click System > General > Server Information.
- In the AR System Administration: Server Information form, click the Encryption tab.
- In the New Encryption Settings area, select the FIPS Enabled option.
- In the Security Policy list, select Required.
In the Data Key Details area, select an AES algorithm.
See Configuring the data key.- In the Public Key Details area, select an RSA algorithm.
See Configuring the public key. - Click Apply.
Restart the server.
In the AR System server configuration file, servers use one of these encryption configurations when FIPS compliance is on:- Relog on to any clients that are connected to the server.
- From AR System Administration: Plugin Server Configuration form update the following settings:
- Set integer to 8 (Performance Security) or 9 (Premium Security):
<dataEncryptionAlg> integer</dataEncryptionAlg> - Ensure that integer is set to 1 (Required).
<encryptionPolicy> integer</encryptionPolicy>
- Set integer to 8 (Performance Security) or 9 (Premium Security):
- Save the settings.
- Restart the Java plug-in server.
FIPS-compliant AREA and ARDBC LDAP plug-ins
When you install the AR System server, the FIPS-certified Network Security Services (NSS) 3.11.4 libraries from Mozilla are added to the following LDAP plug-ins:
- AR System External Authentication (AREA)
- AR System Database Connectivity (ARDBC)
To connect to the LDAP server
To comply with FIPS 140-2, the plug-ins must use Secure Sockets Layer (SSL) to connect to the LDAP server. The FIPS-certified Network Security Services (NSS) 3.11.4 libraries provide the capability to comply with FIPS 140-2. To make your LDAP environment actually compliant with FIPS 140-2, you must further configure your LDAP server. For more information, see the Federal government FIPS 200 and 140-2 guidelines and your LDAP server documentation.
FIPS 140-2 certification
BMC Remedy Encryption Performance Security and BMC Remedy Encryption Premium Security use the latest versions of the FIPS-certified libraries. The following FIPS-certified libraries provide the cryptography used by the Performance and Premium FIPS encryption options:
- Network Security Services (NSS) 3.11.4
- OpenSSL FIPS 1.2
- RSA BSAFE Crypto-J 6.2.4 FIPS-140
The latest JAR files are used in these applications, which are compatible with the Federal Information Processing Standards Publication 140-2: Security Requirements for Cryptographic Modules (FIPS 140-2).
For more information about the FIPS-certified modules, see:
- https://csrc.nist.gov/projects/cryptographic-module-validation-program/Certificate/3172
- https://csrc.nist.gov/projects/cryptographic-module-validation-program/Certificate/3184
To configure Crypto-J
To operate Crypto-J in compliance with FIPS 140-2 requirements, edit the java.security file and set the following security properties:
- Set com.rsa.cryptoj.fips140initialmode to one of the following values:
- FIPS140_MODE (default)
- FIPS140_SSL_MODE
- FIPS140_ECC_MODE
- FIPS140_SSL_ECC_MODE
- Set com.rsa.cryptoj.fips140auth to the required FIPS-140 Security Level.
The recognized values are as follows:- LEVEL1—Security Level 1 (default)
- LEVEL2—Security Level 2
FIPS Compliance for the entire Remedy system
Remedy Encryption Performance Security and Remedy Encryption Premium Security only enable FIPS compliance for AR System RPC API calls. They do not enable FIPS compliance for other components. The components which are FIPS compliant include components such as:
- AR System Database connections
- LDAP connections
- External Database Connections with Atrium Integrator
- Web browser traffic to Mid-Tier
- Web browser traffic to Smart IT
- REST API connections
- SOAP UI/Web Services
- Email Engine to Email Server connections
To learn more about how to configure encryption for these other connections, please see the following documentation and contact the system administration for each of these external systems:
- HTTP(S) Tomcat
- AREA LDAP
- ARDBC LDAP
- External Database (AI)
- REST API
- Email Engine
Remedy Single Sign-On has other instructions to configure Remedy Encryption Security. For more information, see <link>.
Related topics
Installing-BMC-Remedy-Encryption-Security
Installing-an-application-that-communicates-with-encrypted-servers