Node and cluster security overview
Nodes and clusters include security features such as secure messaging, HTTPS, and system certificates that you need to understand before you install AS4 Microservice.
Secure messaging
You can use the Transport Layer Security (TLS) protocol without encryption with client authentication to provide all of the benefits of HMAC (hash message authentication code), in addition to handling the authentication and hashing without requiring a shared passphrase across different applications.
Restriction: Although you can use either the TLS or Secure Sockets
Layers (SSL) protocol with AS4 Microservice,
IBM recommends that you use SSL only for backward compatibility due to security vulnerabilities. For
more information, see the IBM Product Security
Incident Response Blog.
Important: If you are using a custom system certificate using SHA-1, you
must replace it with a certificate that uses SHA-2. TLS 1.2 and SHA-2 is the default for use with
MQ. Do not use either SHA-1 or MD5 signature hashes. TLS 1.1 and 1.0 andare still supported for
trading partners who require these protocols. If specified, TLS 1.2 is enforced as the minimum level
of security for any resources using it.
HTTPS
By default, HTTPS ports are enabled on all four member types, including the informational member
that you use to access the AS4 Microservice
user interface.
Important: These ports are secured with TLS 1.0, 1.1, or
1.2. Using TLS 1.2 is recommended to best secure the interfaces.
Restriction: You cannot use an HTTP port or change an HTTPS port number. HTTPS is more
secure than HTTP and other parts of the AS4 Microservice depend on the default HTTPS port
numbers.
HTTPS endpoints use a disk-based keystore file. You can update the keystore with a command that
uses an alias value to retrieve the associated certificates from the identity keystore. The AS4 Microservice user interface and the Java™ Management Extensions (JMX) tool use the same keystore and
presents the same certificate for server authentication.
Restriction: Only server
authentication is supported in AS4 Microservice. Client authentication is not supported, so you cannot add certificate authority (CA)
certificates for client authentication in the keystore to support HTTPS on the user interface. You
can use CA certificates only for server authentication. If you access the AS4 Microservice user interface by using a browser
that has the root certificate of the issuer, it can say that the web page is safe to access.
Otherwise, it can warn users. This setup is used by most secured websites that are using
HTTPS.
The following table shows the default
numbers for HTTPS ports:
Member | HTTPS Port |
---|---|
Operational | 9443 |
Informational | 19443 |
Catalog | 17443 |
Container | 18443 |
System Certificate
When you install AS4 Microservice, the Installation Manager prompts
you for information about a PKCS12 file. This file contains a private key and an X.509 certificate
that are used by the AS4 Microservice user
interface. This certificate is the certificate that is used by the JMX and HTTPS ports.
Important: To best secure the AS4 Microservice user interface and JMX interfaces,
use certificates with a SHA-2 hash. Do not use either SHA-1 or MD5 signature hashes.