Configuring SSL Communications
Configuring SSL Communications
By default, Common Services use SSL/TLS communications. Immediately after installation, the system uses SSL
communication by using a self-signed certificate. However, you must set up SSL communications to use a valid server
certificate before any of the products can communicate with the Common Services and the Hitachi Ops Center Portal.
Depending on your environment, you can set up SSL by using one of the following methods:
• If your Hitachi Ops Center products are running on the same management server, you can follow the simplified
procedure described in Configuring SSL by using the CLI Setup Tool.
• If your Ops Center products are running on multiple servers, you must set up SSL manually by using various
commands as described in Configuring SSL for a multi-server configuration.
https://knowledge.hitachivantara.com/Documents/Management_Software/Ops_Center/10.6.x/Get_Started_with_Ops_Center/…
Updated: Fri, 10 Dec 2021 20:30:43 GMT
Powered by
1
Preparing the server certificate for Common Services
Prepare the server certificate for Common Services. Common Services supports both RSA and Elliptic Curve Digital
Signature Algorithm (ECDSA). You cannot configure only ECDSA. Prepare secret keys and server certificates for RSA
only or for both RSA and ECDSA.
NoteIf you configure both RSA and ECDSA in Common Services, RSA will be used for communication with Hitachi Ops
Center Automator. ECDSA will be used for communication with other products.
2. Run the following command to create a private key (in X.509 PEM format) and a certificate signing request (CSR).
When running the command, specify parameters according to the Cipher Suite supported by Common Services.
For details on the Cipher Suite supported by Common Services, see the Common Services Release Notes.
Specify /C=US/ST=xx/L=yy/O=zz according to your environment. For CN, specify a host name (or FQDN) or
IP address that can be used to access the Hitachi Ops Center Portal.
If you specified a host name for CN, specify DNS:host-name for subjectAltName. If you specified an IP
address for CN, specify IP:IP-address for subjectAltName. If you specified a host name for CN, and
specified that an IP address can also be used to access the Hitachi Ops Center Portal, specify DNS:host-
name,IP:IP-address for subjectAltName.
To create a CSR by using the openssl command in the installation directory of Common Services, you will need to
specify the -config option to load the settings file.
https://knowledge.hitachivantara.com/Documents/Management_Software/Ops_Center/10.6.x/Get_Started_with_Ops_Center/…
Updated: Fri, 10 Dec 2021 20:30:43 GMT
Powered by
2
3. Run the following command to check the results of creating the CSR.
5. After acquiring a server certificate signed by the certificate authority, run the following command to check the
results of creating the server certificate.
Setting the path information of the server certificate and private key
In the Common Services configuration definitions file, specify the settings for the signed server certificate acquired from
the certificate authority and the settings for the private key.
Concatenate the signed server certificate acquired from the certificate authority and the certificate from the intermediate
certificate authority into a single file as follows. If there are multiple certificates from intermediate certificate authorities,
concatenate all certificates in a chain.
Procedure
2. Transfer the signed server certificate acquired from the certificate authority and the private key to the management
server in a secure manner.
3. Store the server certificate and the private key in the following location:
user-data-directory/tls/
4. In the following configuration definitions file, specify the absolute paths to the server certificate file and private key
file, and then save the file.
user-data-directory/userconf/config_user.properties
◦ Settings
https://knowledge.hitachivantara.com/Documents/Management_Software/Ops_Center/10.6.x/Get_Started_with_Ops_Center/…
Updated: Fri, 10 Dec 2021 20:30:43 GMT
Powered by
3
▪ RSA settings:
CS_GW_SSL_CERTIFICATE = absolute-path-of-the-certificate-(RSA)-file
CS_GW_SSL_CERTIFICATE_KEY = absolute-path-of-the-private-key-(RSA)-file
▪ ECDSA settings:
CS_GW_SSL_CERTIFICATE_ECDSA = absolute-path-of-the-certificate-(ECDSA)-file
CS_GW_SSL_CERTIFICATE_KEY_ECDSA = absolute-path-of-the-private-key-(ECDSA)-file
For details on how to specify the SSL server settings, see the documentation for each product.
https://knowledge.hitachivantara.com/Documents/Management_Software/Ops_Center/10.6.x/Get_Started_with_Ops_Center/…
Updated: Fri, 10 Dec 2021 20:30:43 GMT
Powered by
4
server. In some cases, the certificate might have already been imported. In this case, you do not need to import the
certificate.
NoteIf you want to configure both RSA and ECDSA in Common Services, import the RSA root certificate into Hitachi
Ops Center Automator. Import the ECDSA root certificate into other products.
For details on how to import a certificate, see the documentation for each product.
You can import the root certificate of the server certificate for Common Services into the Common Services truststore,
as well as the root certificate of the server certificate for each product and for the Active Directory server.
Procedure
2. Run the following command to import the root certificate of the server certificate for Common Services into the
truststore.
In some cases, the certificate might have already been imported. In this case, you do not need to complete this
step.
◦ Format
◦ Options
▪ -alias alias-name
Specify the name so that the certificate can be identified in the truststore.
▪ -keystore path-to-truststore-file
Specify the following absolute path as the path to the truststore file:
https://knowledge.hitachivantara.com/Documents/Management_Software/Ops_Center/10.6.x/Get_Started_with_Ops_Center/…
Updated: Fri, 10 Dec 2021 20:30:43 GMT
Powered by
5
user-data-directory/tls/cacerts
▪ -storepass password-of-truststore-file
Specify the password of the truststore file. The default password is changeit.
NoteWe recommend that you change the truststore password.
▪ -file path-of-the-certificate-to-be-imported
3. In the same way, import the root certificate of the server certificate for each product into the truststore.
4. When you use LDAPS for communication with the Active Directory server, import the root certificate of the server
certificate for the Active Directory server.
5. If you link Common Services with an identity provider, import the root certificate of the server certificate for the
identity provider server.
6. Restart the Common Services service and the services for each product.
For details on how to restart the Common Services service, see Starting or stopping the Common Services
service. For details on how to restart the service of each product, see the documentation for each product.
user-data-directory/userconf/config_user.properties
◦ Setting
CS_PORTAL_SSL_CERTIFICATE_CHECK = true
https://knowledge.hitachivantara.com/Documents/Management_Software/Ops_Center/10.6.x/Get_Started_with_Ops_Center/…
Updated: Fri, 10 Dec 2021 20:30:43 GMT
Powered by
6
Configuring SSL for a single management server by using the CLI setup
tool
Use the cssslsetup command, you can create a single private key and server certificate for all Hitachi Ops Center
products installed on the same management server:
• Settings for SSL communications with products that are installed on a server other than the management server
• Settings of the SSL server for storage systems and the Active Directory server
• SSL communications settings for the Analyzer probe server and Protector clients
The cssslsetup command creates a common private key and CSR that can be used by all products.
NoteThis command only supports the RSA encryption algorithm. If you want to use both RSA and the Elliptic Curve
Digital Signature Algorithm (ECDSA), do not use the cssslsetup command.
cssslsetup command specifies the settings for operating as the SSL server.
https://knowledge.hitachivantara.com/Documents/Management_Software/Ops_Center/10.6.x/Get_Started_with_Ops_Center/…
Updated: Fri, 10 Dec 2021 20:30:43 GMT
Powered by
7
Product Settings
Analyzer detail view Importing the server certificate (in the PKCS#12 format) into the keystore
Analyzer view point Registering the server certificate and private key
• Specifying the SSL client settings and enabling the certificate verification function
cssslsetup command specifies the SSL communication settings, and enables the certificate verification function.
Product Settings
https://knowledge.hitachivantara.com/Documents/Management_Software/Ops_Center/10.6.x/Get_Started_with_Ops_Center/…
Updated: Fri, 10 Dec 2021 20:30:43 GMT
Powered by
8
Product Settings
None
Note
◦ You must use the setupcommonservice command for the following tasks:
▪ Import the root certificate into the truststore.
Administrator ▪ Enable the certificate verification function.
◦ If you want to link with Active Directory, you must import the certificate of the Active
Directory server into the truststore and register an Active Directory domain that
uses the DNS server. For the configuration procedure, see the Administrator
manual.
You can enable or disable the certificate verification function for maintenance of SSL communications.
https://knowledge.hitachivantara.com/Documents/Management_Software/Ops_Center/10.6.x/Get_Started_with_Ops_Center/…
Updated: Fri, 10 Dec 2021 20:30:43 GMT
Powered by
9
Creating a private key and a certificate signing request (cssslsetup)
Use the cssslsetup command to create a private key and a certificate signing request (CSR) used by all Hitachi Ops
Center products.
Main menu
1. Create certificate signing request and private key.
2. Set up SSL server.
3. Set up SSL client.
4. Enable/disable certificate verification(optional).
5. Restart services for each product.
Enter a number or q to quit:
3. Select 1. You are prompted to provide the required certificate information. When prompted, enter the following:
◦ Absolute path to the file where the shared private key is output.
◦ Absolute path to the file where the CSR is output.
◦ Signature algorithm for RSA.
◦ Key size.
◦ Host name.
◦ Organizational unit.
◦ Organization name.
◦ Name of the city or locality.
◦ Name of the state or province.
◦ 2-letter country code.
◦ Host name (or FQDN), IP address or both of SubjectAltName.
4. Make sure that the settings are correct. If they are correct, select 1. Yes. If you want to specify the settings again,
select 2. No (Cancel) to return to the main menu.
5. When the CSR is successfully created, the results are displayed and the main menu reappears. Select q to exit.
7. After acquiring the server certificate signed by the certificate authority, run the following command to check the
results:
https://knowledge.hitachivantara.com/Documents/Management_Software/Ops_Center/10.6.x/Get_Started_with_Ops_Center/…
Updated: Fri, 10 Dec 2021 20:30:43 GMT
Powered by
10
Configuring SSL server settings (cssslsetup)
Use the cssslsetup command to set the server certificate and the private key for the Hitachi Ops Center products on the
management server.
Main menu
1. Create certificate signing request and private key.
2. Set up SSL server.
3. Set up SSL client.
4. Enable/disable certificate verification(optional).
5. Restart services for each product.
Enter a number or q to quit:
3. Select 2.
4. Specify the target product for which you want to configure the SSL server.
Use commas to specify multiple products.
5. Specify an absolute path to the file where the shared private key is located.
6. Specify an absolute path to the file where the shared server certificate is located.
7. Specify whether the server certificate specified is issued by the intermediate certificate authority.
8. If you specified yes in step 7, specify the absolute path of the certificate of the intermediate certificate authority.
9. To specify settings for Hitachi Ops Center Analyzer detail view or Hitachi Ops Center API Configuration Manager,
specify, use an absolute path to specify the file name of the root certificate of the server certificate for use with all
Hitachi Ops Center products.
10. Specify the host name specified when creating the CSR.
11. To specify settings for Hitachi Ops Center Analyzer or Hitachi Ops Center Automator and ECC encryption
certificate settings are enabled, specify whether to leave the ECC encryption certificate settings enabled.
12. To specify settings for Hitachi Ops Center Administrator, specify the port number.
13. To specify settings for Hitachi Ops Center Administrator, specify the virtual appliance manager credentials.
14. To specify settings for Hitachi Ops Center Analyzer detail view, specify the following password:
https://knowledge.hitachivantara.com/Documents/Management_Software/Ops_Center/10.6.x/Get_Started_with_Ops_Center/…
Updated: Fri, 10 Dec 2021 20:30:43 GMT
Powered by
11
◦ KeyStorePassword / TrustStorePassword: Common password for the truststore and the keystore.
◦ KeyManagerPassword: Password for the key manager.
After the settings are implemented, a message is displayed and the main menu reappears.
Configuring SSL client settings and enabling the certificate verification function
(cssslsetup)
Use the cssslsetup command to configure the required SSL client settings on the management server and enable the
certificate verification function.
Main menu
1. Create certificate signing request and private key.
2. Set up SSL server.
3. Set up SSL client.
4. Enable/disable certificate verification(optional).
5. Restart services for each product.
Enter a number or q to quit:
3. Select 3.
4. Specify the target product for which you want to configure SSL client settings.
Use commas to specify multiple products.
1. Specify an absolute path to the file where the root certificate is located.
If you only want to configure the settings for linking with Active Directory or Active Directory Federation
Services, press Enter without specifying anything.
2. When the truststore file name is displayed, specify the truststore password.
https://knowledge.hitachivantara.com/Documents/Management_Software/Ops_Center/10.6.x/Get_Started_with_Ops_Center/…
Updated: Fri, 10 Dec 2021 20:30:43 GMT
Powered by
12
6. If you want to link with Active Directory or Active Directory Federation Services, import the certificate for the Active
Directory server or the Active Directory Federation Services server.
1. Specify, as an absolute path, the file name of the certificate for the Active Directory server or the Active
Directory Federation Services server.
If you do not want to link with Active Directory or Active Directory Federation Services, press Enter without
specifying anything.
2. When the truststore file name is displayed, specify the truststore password.
7. For Hitachi Ops Center API Configuration Manager, configure SSL communications with your storage systems.
2. Specify the storage device ID of the target storage system and use an absolute path for the server certificate.
3. To configure SSL communications for additional storage systems, select 1. Yes. If not, select 2. No.
4. Continue this procedure until you have registered all your storage systems.
After the settings are implemented, a message is displayed and the main menu reappears.
https://knowledge.hitachivantara.com/Documents/Management_Software/Ops_Center/10.6.x/Get_Started_with_Ops_Center/…
Updated: Fri, 10 Dec 2021 20:30:43 GMT
Powered by
13