Node Configuration Overview
Before you begin using Connect:Direct® Secure Plus, you must configure nodes for secure operations.
When you import the network map records into the Connect:Direct Secure Plus parameters file, Connect:Direct Secure Plus parameters are disabled and you will need to configure the .Local node record.
- Configure or create a new PKCS12 Key Store through the Key Management menu on the Secure+ Admin Tool.
- Import existing Certificates.
- Configure the Connect:Direct Secure Plus .Local node record.
- Define the security options for the local node. Because TLS provide the strongest authentication with easy-to-maintain keys, configure the local node for one of these protocols. Determine which protocol is used by most trading partners and configure the local node with this protocol.
- Determine which protocol is used by most trading partners and configure the local node with this protocol.
- Enable Override to allow customized remote node settings or Copy Statement settings.
- Customize a remote node for the following configurations:
- To disable the protocol for remote nodes that do not use Connect:Direct Secure Plus
- To configure remote nodes that use a protocol that is not defined in the local
node
- When you configure the local node, all remote nodes are automatically configured to the protocol defined in the local node. If a trading partner uses a different protocol, you must turn on the protocol in the remote node record. For example, if you activate the TLS protocol in the .Local node record and a trading partner uses the SSL protocol, configure the SSL protocol in the remote node record for the trading partner.
- To use a unique certificate file to authenticate a trading partner
- To use a different self-signed or CA-signed certificate for client or server authentication
- To identify a unique cipher suite used by a trading partner
- To activate common name validation
- To activate client authentication
- To enable a Security Mode such as FIPS 140-2.
- To activate external authentication
- If you want to use External Authentication Server to validate certificates:
- Update the .SEAServer record with the External Authentication Server host name and port
- Enable TLS
- Enable external authentication
- Specify the certificate validation definition to use
- If you want to prevent non-secure API connections from communicating with a
Connect:Direct Secure Plus enabled server:
- The
.Clientrecord is created by default when Secure+ is installed. - Enable TLS
- Disable override
- The
Certificates and keys protection in the PKCS12 Keystore
MAC: sha256, Iteration 10000
MAC length: 32, salt length: 20
PKCS7 Data
Shrouded Keybag: PBES2, PBKDF2, AES-256-CBC, Iteration 10000, PRF hmacWithSHA256Import Existing Certificates
About this task
Before performing your .Local node configuration, you need to import existing certificates.
To import existing certificates:
Procedure
Create PKCS12 Key Store
About this task
Before performing your .Local node configuration, you may need to create a new PKCS12 Key Store file.
To create a new PKCS12 Key Store file:
Procedure
Configuring the Connect:Direct Secure Plus .Local Node Record
About this task
Before you can configure the .Local node record, you must either import your existing certificates or create and configure a PKCS12 Key Store. For additional information, see Import Existing Certificates or Create PKCS12 Key Store in the documentation library.
It is recommended that you configure the .Local node record with the protocol used by most of your trading partners. Because remote node records can use the attributes defined in the .Local node record, defining the .Local node record with the most commonly used protocol saves time. After you define the protocol in the .Local node record, all remote nodes default to that protocol. Also, identify the trusted root file to be used to authenticate trading partners.
Procedure
| Name |
|---|
|
TLS_AES_256_GCM_SHA384 |
|
TLS_AES_128_GCM_SHA256 |
|
TLS_CHACHA20_POLY1305_SHA256 |
|
TLS_AES_128_CCM_SHA256 |
|
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 |
|
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 |
|
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA |
|
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 |
|
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 |
|
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA |
|
TLS_ECDHE_ECDSA_WITH_RC4_128_SHA |
|
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA |
|
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 |
|
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 |
|
TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA |
|
TLS_ECDHE_ECDSA_WITH_NULL_SHA |
|
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 |
|
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 |
|
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA |
|
TLS_ECDHE_RSA_WITH_RC4_128_SHA |
|
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA |
|
TLS_ECDHE_RSA_WITH_NULL_SHA |
|
TLS_RSA_WITH_AES_256_GCM_SHA384 |
|
TLS_RSA_WITH_AES_256_CBC_SHA256 |
|
TLS_RSA_WITH_AES_256_CBC_SHA |
|
TLS_RSA_WITH_AES_128_GCM_SHA256 |
|
TLS_RSA_WITH_AES_128_CBC_SHA256 |
|
TLS_RSA_WITH_AES_128_CBC_SHA |
|
TLS_RSA_WITH_RC4_128_SHA |
|
TLS_RSA_WITH_RC4_128_MD5 |
|
TLS_RSA_WITH_3DES_EDE_CBC_SHA |
|
TLS_RSA_WITH_DES_CBC_SHA |
|
TLS_RSA_WITH_NULL_SHA256 |
|
TLS_RSA_WITH_NULL_SHA |
|
TLS_RSA_WITH_NULL_MD5 |
| The following are marked as deprecated and security warnings are issued when enabled. |
|
TLS_ECDHE_ECDSA_WITH_RC4_128_SHA |
| TLS_ECDHE_RSA_WITH_RC4_128_SHA |
| TLS_ECDHE_ECDSA_WITH_NULL_SHA |
| TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA |
| TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA |
|
TLS_RSA_WITH_NULL_MD5 |
| TLS_ECDHE_RSA_WITH_NULL_SHA |
| TLS_RSA_WITH_RC4_128_SHA |
| TLS_RSA_WITH_RC4_128_MD5 |
| TLS_RSA_WITH_3DES_EDE_CBC_SHA |
| TLS_RSA_WITH_DES_CBC_SHA |
| TLS_RSA_WITH_NULL_SHA256 |
| TLS_RSA_WITH_NULL_SHA |
Customize Remote Node Records
After you configure the .Local node record, Connect:Direct Secure Plus enables the protocol and parameters that you configured for the local node for all remote node records. If all trading partners use the protocol and configuration defined in the .Local node record, you are now ready to begin using Connect:Direct Secure Plus.
However, even when a trading partner uses the same protocol as the one defined in the .Local node record, you may need to customize remote node records for the following configurations:
- Using a unique certificate file to authenticate a trading partner—During a TLS session, a certificate enables the PNODE to authenticate the SNODE. You identified a certificate in the .Local node record. If you want to use a unique certificate to authenticate a trading partner, you must identify this information in the remote node record.
- Using a self-signed certificate file to authenticate a trading partner—During a TLS session, a certificate enables the PNODE to authenticate the SNODE. If you want to use a self-signed certificate to authenticate a trading partner, you must identify this information in the remote node record.
- —Client authentication requires that the SNODE validate the PNODE. If you want to enable client authentication, activate this feature in the remote node record.
- Activating common name authentication—If you want another layer of security, you can activate the ability to validate the certificate common name by specifying the common name expected to be in the identity certificate received, either by the PNODE from the SNODE, or, when client authentication is enabled, by the SNODE from the PNODE.
- Identifying the cipher suite used by a trading partner—When configuring the TLS protocol, you enable cipher suites that are used to encrypt the transmitted data. When communicating with a trading partner, you and the trading partner must use the same cipher suite to encrypt data. If the trading partner does not enable a cipher suite that is enabled in your configuration, communication fails. If necessary, enable cipher suites in the remote node record.
Configuring a Remote Node Record
About this task
Before you can configure the .Remote node record, you must either import your existing certificates or create and configure a PKCS12 Key Store. For additional information, see Import Existing Certificates or Create PKCS12 Key Store in the documentation library.
Configure the Remote node record with the protocol used by most of your trading partners. Because remote node records can use the attributes defined in the Remote node record, defining the Remote node record with the most commonly used protocol saves time. After you define the protocol in the Remote node record, all remote nodes default to that protocol. Also, identify the trusted root file to be used to authenticate trading partners.
To configure the local node, refer to the Local Node Security Feature Definition Worksheet that you completed for the Remote node record security settings and complete the following procedure:
Procedure
Validating the Configuration
Perform this procedure to ensure that the nodes have been properly configured. The validation process checks each node to ensure that all necessary options have been defined and keys have been exchanged. Perform the following steps to validate the Secure+ parameters file:
Procedure
Configure External Authentication in the .SEAServer Record
About this task
At installation, a record named .SEAServer is created in the parameters file, which enables Connect:Direct Secure Plus to interface with External Authentication Server during TLS sessions to validate certificates. External Authentication Server properties are configured in this record and enabled/disabled in the local and remote node records.
Procedure
Configure Strong Password Encryption
This feature uses strong encryption to encrypt all Connect:Direct Process data stored on disk in the Connect:Direct work area while a Process is on the TCQ. This feature is enabled by default.
Disabling Strong Password Encryption
Complete the procedure below to disable Strong Password Encryption:
Procedure
Enabling Strong Password Encryption
Complete the procedure below to enable Strong Password Encryption:
Procedure
Resetting Passwords
If the Strong Password Encryption key stored in the .Password file is out of sync with the Strong Password Encryption key used to encrypt the passwords, you must reset all Strong Password Encryption passwords.
About this task
The .Password file can get out of sync if one of the following occurs:
- You restore the .Password file from a backup—The .Password file is updated each time the IBM Connect:Direct server is started, so the backup will probably not contain the current parameters.
- The .Password file is deleted—The .Password file is recreated as needed, so the Strong Password Encryption key used to encrypt the passwords no longer exists.
- The .password file is corrupt—The Strong Password Encryption Key used to encrypt the passwords is not accessible.
Complete the procedure below to reset the passwords:
Procedure
- Stop the IBM Connect:Direct server.
- Delete the <cdinstall>/ndm/secure+/nodes/.Password file.
- Start the IBM Connect:Direct server.
- Manually delete all Processes in the TCQ. Refer to the IBM Connect:Direct for UNIX User Guide for command syntax and parameter descriptions for the delete Process and flush Process commands.
Decryption Failure
If the process KQV file fails decryption at startup or during runtime, the server places the Process in the HOLD/Error queue to raise the visibility of the error.