How to Create Keystore and Truststore Files for Secure Communication in the Informatica Domain



Similar documents
HTTPS Configuration for SAP Connector

Secure Communication Requirements

DOCUMENTUM CONTENT SERVER CERTIFICATE BASED SSL CONFIGURATION WITH CLIENTS

DOCUMENTUM CONTENT SERVER CERTIFICATE BASED SSL CONFIGURATION AND TROUBLESHOOTING

Application Note AN1502

Chapter 1: How to Configure Certificate-Based Authentication

SolarWinds Technical Reference

Creating a Free Trusted SSL Cert with StartSSL for use with Synctuary

KMIP installation Guide. DataSecure and KeySecure Version SafeNet, Inc

SSL Certificate Generation

Configuring TLS Security for Cloudera Manager

Creating and Managing Certificates for My webmethods Server. Version 8.2 and Later

Installing Apache as an HTTP Proxy to the local port of the Secure Agent s Process Server

CA Nimsoft Unified Management Portal

Managing the SSL Certificate for the ESRS HTTPS Listener Service Technical Notes P/N REV A01 January 14, 2011

SSL Configuration on Weblogic Oracle FLEXCUBE Universal Banking Release [August] [2014]

Implementing SSL Security on a PowerExchange Network

Configuring Secure Socket Layer and Client-Certificate Authentication on SAS 9.3 Enterprise BI Server Systems That Use Oracle WebLogic 10.

Generating an Apple Push Notification Service Certificate

Version 9. Generating SSL Certificates for Progeny Web

Customizing SSL in CA WCC r11.3 This document contains guidelines for customizing SSL access to CA Workload Control Center (CA WCC) r11.3.

Wildcard Certificates

Service Manager 9.32: Generating SSL Profiles for an F5 HWLB

Improved Credential and SSL Configuration for EE 7

C O N F I G U R I N G O P E N L D A P F O R S S L / T L S C O M M U N I C A T I O N

What in the heck am I getting myself into! Capitalware's MQ Technical Conference v

SSL Configuration Best Practices for SAS Visual Analytics 7.1 Web Applications and SAS LASR Authorization Service

PowerCenter Real-Time Development

Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive

Developers Integration Lab (DIL) Certificate Installation Instructions. Version 1.4

To install and configure SSL support on Tomcat 6, you need to follow these simple steps. For more information, read the rest of this HOW-TO.

Informatica Cloud (Winter 2016) SAP Connector Guide

Deploying Certificates with Cisco pxgrid. Using Self-Signed Certificates with ISE pxgrid node and pxgrid Client

WEB SERVICES CERTIFICATE GUIDE

Generating and Renewing an APNs Certificate. Technical Paper May 2012

Universal Content Management Version 10gR3. Security Providers Component Administration Guide

How to Resolve the POODLE Vulnerability in Native Connection to Oracle

Generating SSH Keys and SSL Certificates for ROS and ROX Using Windows AN22

Creating an authorized SSL certificate

Protect your CollabNet TeamForge site

Encrypted Connections

Configure an ODBC Connection to SAP HANA

Oracle Fusion Applications Splitting Topology from Single to Multiple Host Servers

How to Configure a Secure Connection to Microsoft SQL Server

Marriott Enrollment Server for Web User Guide V1.4

Configuration (X87) SAP Mobile Secure: SAP Afaria 7 SP5 September 2014 English. Building Block Configuration Guide

Secure Agent Quick Start for Windows

Obtaining SSL Certificates for VMware View Servers

GB-OS. Certificate Management. Tel: Fax Web:

Installing Digital Certificates for Server Authentication SSL on. BEA WebLogic 8.1

How to Implement Transport Layer Security in PowerCenter Web Services

Enterprise Content Management System Monitor 5.1 Security Considerations Revision CENIT AG Brandner, Marc

Connect to an SSL-Enabled Microsoft SQL Server Database from PowerCenter on UNIX/Linux

How to Implement Two-Way SSL Authentication in a Web Service

Adeptia Suite 6.2. Application Services Guide. Release Date October 16, 2014

CHAPTER 7 SSL CONFIGURATION AND TESTING

Junio SSL WebLogic Oracle. Guía de Instalación. Junio, SSL WebLogic Oracle Guía de Instalación CONFIDENCIAL Página 1 de 19

Using LDAP Authentication in a PowerCenter Domain

SafeNet KMIP and Amazon S3 Integration Guide

Go to Policy/Global Properties/SmartDashboard Customization, click Configure. In Certificates and PKI properties, change host_certs_key_size to 2048

Configuring HTTPS support. Overview. Certificates

Entrust Certificate Services. Java Code Signing. User Guide. Date of Issue: December Document issue: 2.0

Enabling Single-Sign-On on WebSphere Portal in IBM Cognos ReportNet

Configuring SSL in OBIEE 11g

Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group

EMC Data Protection Search

Oracle Enterprise Manager. Introduction to the Oracle Virtual Networking Plug-in. Requirements. Supported Versions

Working with Certificate and Key Files in MatrixSSL

Enable SSL in Go2Group SOAP Server

LoadMaster SSL Certificate Quickstart Guide

Configuring Notification for Business Glossary

DIGIPASS Authentication for Windows Logon Getting Started Guide 1.1

Obtaining SSL Certificates for VMware Horizon View Servers

Informatica (Version 9.1.0) PowerCenter Installation and Configuration Guide

4.0. Offline Folder Wizard. User Guide

StoneGate SSL VPN Technical Note Adding Bundled Certificates

Configuring IBM WebSphere Application Server 7 for Secure Sockets Layer and Client-Certificate Authentication on SAS 9.3 Enterprise BI Server Web

SSL Configuration on WebSphere Oracle FLEXCUBE Universal Banking Release [September] [2013] Part No. E

HP Device Manager 4.7

EventTracker Windows syslog User Guide

Enabling Single-Sign-On between IBM Cognos 8 BI and IBM WebSphere Portal

DISTRIBUTED CONTENT SSL CONFIGURATION AND TROUBLESHOOTING GUIDE

Configure Managed File Transfer Endpoints

Managing Web Server Certificates on idrac

Iowa Immunization Registry Information System (IRIS) Web Services Data Exchange Setup. Version 1.1 Last Updated: April 14, 2014

An Oracle White Paper July Introducing the Oracle Home User in Oracle Database 12c for Microsoft Windows

Administering User Security

Replacing vcenter Server 4.0 Certificates VMware vsphere 4.0

How-to-Guide: SAP Web Dispatcher for Fiori Applications

Symantec Enterprise Vault

This section includes troubleshooting topics about certificates.

Informatica (Version 9.0.1) PowerCenter Installation and Configuration Guide

NetApp SANtricity Web Service for E-Series Proxy 1.0

Exchange Reporter Plus SSL Configuration Guide

NetIQ Identity Manager Setup Guide

Configuring Hadoop Distributed File Service as an Optimized File Archive Store

Replacing Default vcenter Server 5.0 and ESXi Certificates

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Gateway

User Guide. Informatica Smart Plug-in for HP Operations Manager. (Version 8.5.1)

Transcription:

How to Create Keystore and Truststore Files for Secure Communication in the Informatica Domain 2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise) without prior consent of Informatica Corporation. All other company and product names may be trade names or trademarks of their respective owners and/or copyrighted materials of such owners.

Abstract When you enable secure communication for the Informatica domain, you secure the connection between services and between the services and the service managers. For better security, you can provide a custom SSL key and certificate. This article describes how to create keystore and truststore files in PEM and JKS formats with a custom SSL key and certificate. Supported Versions Informatica 9.6.x Table of Contents Overview.... 2 Creating Keystores and Truststores with a Custom SSL Key and Certificate.... 3 Step 1. Create an SSL Key and Certificate.... 3 Step 2. Create Keystore Files.... 4 Step 3. Create Truststore Files.... 5 Enabling Secure Communication with Keystore and Truststore Files.... 5 Before Enabling Secure Communication.... 5 Enabling Secure Communication for the Domain.... 6 Overview To secure the connection between services and between the services and the service managers in the Informatica domain, use the secure communication option. When you enable secure communication, you secure the connections between the following components: The Service Manager and all services running in the domain The Data Integration Service and the Model Repository Service The Data Integration Service and the workflow processes The PowerCenter Integration Service and the PowerCenter Repository Service The domain services and the Informatica client tools and command line programs To enable secure communication in the domain, you need an SSL key and certificate. SSL keys and certificates are stored in keystore and truststore files. Informatica provides keystores and truststores based on an SSL key and certificate that is common to all Informatica installations. For better security, you can provide a custom SSL key and certificate. The SSL certificate can be selfsigned or issued by a certificate authority. Use a certificate from a certificate authority for a more secure domain. Informatica requires keystore and truststore files in PEM and JKS formats with the following names: infa_keystore.pem infa_truststore.pem infa_keystore.jks infa_truststore.jks 2

If you have a keystore and truststore in JKS format, export the certificate and key to create the keystore and truststore in PEM format. If you have a keystore and truststore in PEM format, convert the PEM keystore file to PKCS12. Then, export the certificate and key to JKS files. If you do not have keystore and truststore files, you can create them with OpenSSL and Java keytool. Download OpenSSL at the following link: http://www.openssl.org/source/. Java keytool is part of the Java Development Kit (JDK). Download the JDK at the following link: http://www.oracle.com/technetwork/java/javase/downloads/index.html The software available for download at the referenced links belongs to a third party or third parties, not Informatica Corporation. The download links are subject to the possibility of errors, omissions or change. Informatica assumes no responsibility for such links and/or such software, disclaims all warranties, either express or implied, including but not limited to, implied warranties of merchantability, fitness for a particular purpose, title and non-infringement, and disclaims all liability relating thereto. Creating Keystores and Truststores with a Custom SSL Key and Certificate When you enable secure communication for the domain, Informatica requires keystores and truststores. Create the keystores and truststores with a custom SSL key and certificate for a higher level of security. To create keystore and truststore files in PEM and JKS formats on a UNIX or Linux operating system, perform the following steps: 1. Create an SSL key and certificate. 2. Create keystore files. 3. Create truststore files. You need OpenSSL and keytool to complete the steps. Step 1. Create an SSL Key and Certificate Create an SSL key and certificate with OpenSSL. 1. Create a SSL key and certificate signing request (CSR). $ openssl req -new -newkey <encryption algorithm>:<number of bits> -<digest> -keyout <key file> -out <CSR file> For example, the following command uses 2048 bit RSA encryption and SHA1 digest to create a key file named keystore.key and a CSR file named keystore.csr: $ openssl req -new -newkey rsa:2048 -sha1 -keyout keystore.key -out keystore.csr 2. Provide the requested information to create the key. 3

The following image shows the requested information: 3. Create a certificate. $ openssl x509 -req -days <number of days> -in <CSR file> -signkey <key file> -out <CRT file> The command creates a self-signed certificate. Use a certificate from a certificate authority for a higher level of security. For example, the following command uses a CSR file named keystore.csr and a key file named keystore.key to create a self-signed certificate named keystore.crt that is valid for 11499 days: $ openssl x509 -req -days 11499 -in keystore.csr -signkey keystore.key -out keystore.crt Step 2. Create Keystore Files Create keystores in PEM and JKS formats with a CRT file and a key file. 1. Create the keystore file in PEM format. $ cat <CRT file> <key file> >> <PEM keystore> For example, the following command uses a CRT file named keystore.crt and a key file named keystore.key to create a PEM keystore named infa_keystore.pem: $ cat keystore.crt keystore.key >> infa_keystore.pem Note: The keystore in PEM format must be named "infa_keystore.pem" and is case sensitive. 2. Convert the keystore in PEM format to PKCS12 format. $ openssl pkcs12 -export -in <PEM keystore> -out <PKCS12 keystore> -name <name> For example, the following command uses a PEM keystore named infa_keystore.pem to create a PKCS12 keystore named keystore.p12 with the name informatica for the certificate and private key: $ openssl pkcs12 -export -in infa_keystore.pem -out keystore.p12 -name "informatica" 3. Convert the keystore in PKCS12 format to JKS format. 4

$ keytool -v -importkeystore -srckeystore <PKCS12 keystore> -srcstoretype PKCS12 - destkeystore <JKS keystore> -deststoretype JKS -srcalias <alias> -destalias <alias> For example, the following command converts a keystore in PKCS12 format named keystore.p12 to a keystore in JKS format named infa_keystore.jks from a source named informatica to a destination named informatica: $ keytool -v -importkeystore -srckeystore keystore.p12 -srcstoretype PKCS12 - destkeystore infa_keystore.jks -deststoretype JKS -srcalias "informatica" -destalias "informatica" Note: The keystore in JKS format must be named "infa_keystore.jks" and is case sensitive. The password for the keystore in JKS format must be the same as the private key pass phrase used to generate the SSL key. Step 3. Create Truststore Files Create truststores in PEM and JKS formats with a CRT file and keytool. 1. Create a truststore in PEM format. $ cat <CRT file> >> <PEM truststore> For example, the following command uses a CRT file named keystore.crt to create a truststore in PEM format named infa_truststore.pem: $ cat keystore.crt >> infa_truststore.pem Note: The truststore in PEM format must be named "infa_truststore.pem" and is case sensitive. 2. Create a truststore in JKS format. $ keytool -importcert -file <PEM truststore> -keystore <JKS truststore> -alias "<alias>" deststoretype JKS -v -trustacerts For example, the following command uses a PEM truststore named infa_truststore.pem to create a truststore in JKS format named infa_truststore.jks with the alias informatica: $ keytool -importcert -file infa_truststore.pem -keystore infa_truststore.jks -alias "informatica" deststoretype JKS -v -trustacerts Note: The truststore in JKS format must be named "infa_truststore.jks" and is case sensitive. Enabling Secure Communication with Keystore and Truststore Files After you create the keystore and truststore files, use the files to enable secure communication for the domain. Before Enabling Secure Communication Before you enable secure communication for the domain, the Informatica installation needs access to the keystore and truststore files. Move the following files to a directory accessible to the installer, the Administrator tool, or the command line programs: infa_keystore.jks infa_keystore.pem infa_truststore.jks infa_truststore.pem 5

You need the following information: The directory location of the keystore and truststore files The password for infa_keystore.jks The password for infa_truststore.jks Enabling Secure Communication for the Domain You can enable secure communication when you install Informatica or after you install Informatica. To enable secure communication for the domain, use one of the following methods: During installation, select the Enable secure communication for the domain option. After installation, edit the General Properties for the domain in the Administrator tool and run the infasetup UpdateGatewayNode or UpdateWorkerNode command. After installation, run the infacmd isp UpdateDomainOptions command and the infasetup UpdateGatewayNode or UpdateWorkerNode command. For more information about enabling secure communication, see the Informatica Security Guide. Author Brian Le Technical Writer 6