Page History
Table of Contents |
---|
Introduction
- Users benefit from the The JS7 - Certificate Authority included with the JOC Cockpit benefits users by allowing them to create and to rollout private keys and certificates.
- This includes simplified rollout to the Controller and Agent instances to establish for establishing JS7 - Secure Connections.
- The built-in Certificate Authority is applicable when operating JOC Cockpit in a Security Level Low or Medium, see see the JS7 - Security Architecture and JS7 - Secure Operation articles for more information.
- The built-in Certificate Authority:
- creates X.509 certificates for HTTPS Mutual Authentication
- between JOC Cockpit and Controller instances,
- between Primary and Secondary Controller instances,
- between Controller instances and Agents.
- is not used to create Server Authentication Certificates for access to JOC Cockpit. Access is performed by user browsers , and therefore it is preferable to use a Server Authentication Certificate that is which has been signed by a known Certificate Authority for which user browsers include the Root CA certificateand whose Root CA certificate is recognized by user's browsers.
- creates X.509 certificates for HTTPS Mutual Authentication
- Users benefit from the simplified rollout of private keys and certificates when using the built-in Certificate Authority.
JS7 provides a Certificate Rollout Client available with as part of the Controller and Agent instance's Start Scripts to create and to rollout . This client creates and rolls out private keys and certificates using the built-in Certificate Authority. Rollout of private keys and certificates created with an external Certificate Authority are not in scope of the Certificate Rollout Client. The functionality includesCertificate Rollout Client provides the following functions:
- use of a security token to authenticate with the JOC Cockpit by use of a security token, see JS7 - Certificate Authority - Manage Certificates with JOC Cockpit, for more information.
- requesting to request a private key and certificate to be created by the JOC Cockpit on-the-fly,
- to update updating a Controller or Agent instance's configuration for use of the private key and certificate with HTTPS mutual authentication.
...
Rollout of certificates includes to perform performing the following steps:
- JOC Cockpit
- The JOC Cockpit Certificate Authority is set up and the Root CA private key and certificate are made available.
- Valid security tokens are generated with the JOC Cockpit for the Controller and Agent instances that require a certificate.
- For details see JS7 - Certificate Authority - Manage Certificates with JOC Cockpit
- Controller/Agent Instance
- Both components include the Certificate Rollout Client that which is available from the Controller/Agent Instance Start Script.
- The Certificate Rollout Client connects to the JOC Cockpit. Authentication is performed by use of using the one-time security token generated with in the previous step.
- The JOC Cockpit Certificate Authority is requested to create a private key and Server/Client Authentication Certificate for the specified host. Private The private key and certificate are created on-the-fly and are returned to the Certificate Rollout Client. In addition, the JOC Cockpit stores the certificate with in the JS7 - Database.
The Certificate Rollout Client:- stores the private key in a keystore file,
- stores the Server/Client Authentication Certificate in a truststore file,
- updates the configuration in the
./config/private/private.conf
file.
...
- for a Controller instance:
./bin/controller_instance.sh|cmd
- For details see see the JS7 - Controller - Command Line Operation article.
- for an Agent instance:
./bin/agent_<port>.sh|cmd
- For details see see the JS7 - Agent Command Line Operation article.
Standard Arguments
The following arguments are used independently from an HTTP connection or HTTPS of whether the connection to the JOC Cockpit is made with HTTP or HTTPS:
Expand | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Explanation:
|
...
The following arguments are used in addition to standard arguments in case that if the JOC Cockpit is has been set up for HTTPS connections:
Expand | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||||||||||||
Explanation:
|
...
The following arguments are used in addition to HTTPS connection arguments in case that if the JOC Cockpit is has been set up for JOC Cockpit - HTTPS Mutual Authentication.
Expand | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||||||||||||
Explanation:
|
...
- the
cert
argument for the Instance Start Script is used to build the Java classpath and to start the Java executable. - The
--token
argument specifies the one-time token to connect to JOC Cockpit. - The
--joc-uri
argument specifies the URL for JOC Cockpit. - If no additional arguments are used then the Command Line Client determines default values for the Keystore and Truststore from the instances'
./config/private/private.conf
configuration file, including defaults for the DN and for the SAN of the certificate.
...