Line 1: | Line 1: | ||
− | = | + | = Transport Layer Security= |
− | + | __TOC__ | |
− | + | Web Services can use a secured Transport Layer Security (TLS) connection mechanism provided by Genesys servers. When configured, Web Services connects to a secure port on the Genesys server, verifies the server's authority, and encrypts/decrypts network traffic. | |
− | Web Services can use a secured Transport Layer Security (TLS) connection mechanism provided by Genesys servers. When configured, Web Services | ||
== Prerequisites== | == Prerequisites== | ||
− | Before configuring Web Services, | + | Before configuring Web Services, make sure the Genesys server secure port is configured as described in [http://docs.genesys.com/Special:Repository/81g_dep-security.pdf?id=c9043536-fe62-42a5-807b-f4eb80f31a26#G27.1117411 Chapter 20: Genesys TLS Configuration] of the [http://docs.genesys.com/Special:Repository/81g_dep-security.pdf?id=c9043536-fe62-42a5-807b-f4eb80f31a26 Genesys Security Deployment Guide] and that all certificates for server host and the certificate authority are configured and available. |
+ | ==Configuration== | ||
+ | You can configure secured connections to Genesys components in the following ways: | ||
+ | * [[SecuredConnections#Minimal_configuration|Minimal configuration]] | ||
+ | * [[SecuredConnections#Validate_the_certificate_against_the_CA|Validate the certificate against the CA]] | ||
+ | ==Minimal configuration== | ||
+ | Web Services does not check the server's certificate against certificate authority, but all traffic is encrypted. To configure Web Services with minimal configuration, all you need to do is configure a connection to a secured port on the Genesys server. You can do this using '''either''' of the following methods: | ||
+ | *For the initial connection to Configuration Server, set the '''tlsEnabled''' option to <tt>true</tt> in the '''onpremise-settings.yaml''' file. This creates a secured connection to Configuration Server the first time Web Services starts. | ||
+ | *For an environment that is already configured with Configuration Manager synchronization enabled, you can make changes with Configuration Manager as described in the [http://docs.genesyslab.com/Special:Repository/81g_dep-security.pdf?id=c9043536-fe62-42a5-807b-f4eb80f31a26#G27.1040827 Genesys Security Deployment Guide]. These changes are synchronized back to the Cassandra database from Configuration Manager. | ||
− | < | + | ==Validate the certificate against the CA== |
− | + | In order to support the client-side certificate check, Web Services needs the public key for the Certificate Authority (CA). Web Services supports two formats of key storage: | |
− | * [[ | + | * PEM |
− | + | * JKS | |
− | </ | + | |
+ | Genesys recommends using JKS because it's compatible with both Cassandra and HTTPS. | ||
+ | |||
+ | Complete the steps below to validate the certificate against the CA. | ||
+ | '''Start''' | ||
+ | <ol> | ||
+ | <li>If you plan to use a JKS file, you can generate if from a PEM file by importing the PEM certificate, as shown here: | ||
+ | <Source lang="text"> | ||
+ | keytool -importcert -file ca_cert.pem -keystore ca_cert.jks | ||
+ | </source> | ||
+ | This generates a '''ca_cert.jks''' key storage file that Web Services can use. | ||
+ | </li> | ||
+ | <li>Once you have the '''ca_cert.jks''' file, place it in a location available from your Web Services host, such as: | ||
+ | * A local folder on the Web Services host | ||
+ | * A network share | ||
+ | * The '''genconfig''' folder on the Web Services host | ||
+ | </li> | ||
+ | <li>Configure the following option in the '''server-settings.yaml''' file configure: | ||
+ | <ul> | ||
+ | <li>For a PEM file, set [[HTCCConfigurationOptionsReference#caCertificate|caCertificate]] to the location of the file. For example: | ||
+ | <source lang="text"> | ||
+ | caCertificate: /opt/jetty/genconfig/ca_cert.pem | ||
+ | </source> | ||
+ | </li> | ||
+ | <li>For a JKS file, set [[HTCCConfigurationOptionsReference#caCertificate|caCertificate]] to the location of the file and set [[HTCCConfigurationOptionsReference#jksPassword|jksPassword]] to the password for the key storage. For example: | ||
+ | <source lang="text"> | ||
+ | caCertificate: /opt/jetty/genconfig/ca_cert.jks | ||
+ | jksPassword: pa$$word | ||
+ | </source> | ||
+ | </li> | ||
+ | </ul> | ||
+ | </li> | ||
+ | <li> | ||
+ | </ol> | ||
+ | '''End''' | ||
− | |||
==Next Step== | ==Next Step== |
Revision as of 14:30, February 1, 2016
Transport Layer Security
Contents
Web Services can use a secured Transport Layer Security (TLS) connection mechanism provided by Genesys servers. When configured, Web Services connects to a secure port on the Genesys server, verifies the server's authority, and encrypts/decrypts network traffic.
Prerequisites
Before configuring Web Services, make sure the Genesys server secure port is configured as described in Chapter 20: Genesys TLS Configuration of the Genesys Security Deployment Guide and that all certificates for server host and the certificate authority are configured and available.
Configuration
You can configure secured connections to Genesys components in the following ways:
Minimal configuration
Web Services does not check the server's certificate against certificate authority, but all traffic is encrypted. To configure Web Services with minimal configuration, all you need to do is configure a connection to a secured port on the Genesys server. You can do this using either of the following methods:
- For the initial connection to Configuration Server, set the tlsEnabled option to true in the onpremise-settings.yaml file. This creates a secured connection to Configuration Server the first time Web Services starts.
- For an environment that is already configured with Configuration Manager synchronization enabled, you can make changes with Configuration Manager as described in the Genesys Security Deployment Guide. These changes are synchronized back to the Cassandra database from Configuration Manager.
Validate the certificate against the CA
In order to support the client-side certificate check, Web Services needs the public key for the Certificate Authority (CA). Web Services supports two formats of key storage:
- PEM
- JKS
Genesys recommends using JKS because it's compatible with both Cassandra and HTTPS.
Complete the steps below to validate the certificate against the CA. Start
- If you plan to use a JKS file, you can generate if from a PEM file by importing the PEM certificate, as shown here:
keytool -importcert -file ca_cert.pem -keystore ca_cert.jks
This generates a ca_cert.jks key storage file that Web Services can use.
- Once you have the ca_cert.jks file, place it in a location available from your Web Services host, such as:
- A local folder on the Web Services host
- A network share
- The genconfig folder on the Web Services host
- Configure the following option in the server-settings.yaml file configure:
- For a PEM file, set caCertificate to the location of the file. For example:
caCertificate: /opt/jetty/genconfig/ca_cert.pem
- For a JKS file, set caCertificate to the location of the file and set jksPassword to the password for the key storage. For example:
caCertificate: /opt/jetty/genconfig/ca_cert.jks jksPassword: pa$$word
- For a PEM file, set caCertificate to the location of the file. For example:
End