Enabling security for the cluster management console using a self-signed certificate
Configure security for the cluster management console using a self-signed certificate for testing purposes.
Before you begin
- The $JAVA_HOME environment variable must be set correctly on the host where the WEBGUI service is running.
- You must be a cluster administrator.
- You must ensure that the clock settings on the server and client are identical. Otherwise, errors may occur.
Tip: To automatically enable
security for the cluster management console, see Enabling security with the security tool.
Use the security
tool generate security server certificates to encrypt information, and
then configuring components to use those certificates for security.
The security tool provides both of these functions.
About this task
Follow these steps if you want to complete these tasks:
- Enable security for the first time (in other words, if you disabled security during installation by setting DISABLESSL=Y).
- Use your own self-signed certificate that will replace the default one generated when security is enabled during installation.
When security is enabled for the cluster management console web service (WEBGUI), a trust relationship between the server and the client is established by sending a server certificate to the client. The client validates the certificates that are signed by the self-signed Platform Computing CA Root. This self-signed certificate can be used only for testing purposes. For your production environment, use a properly chained certificate that is issued or signed by a trusted certificate authority. By default WEBGUI uses the TLSv1.2 protocol.
Important: You must use the same security
setting for the cluster management console and the
RESTful web servers. If you enable security for one, you must also
enable security for the other; if you disable
security for one, security must be
disabled for the other as well. This setting also takes effect for cloud bursting with host factory. Ensure that security for all
these functions is configured consistently in the cluster; without a uniform configuration, errors
occur. When security is uniformly
enabled, you can use different certificates and keys as required.
Note: On a local file system, files must be generated on all management hosts.
On a shared file system, the files need to be generated on a shared file system location that all
management hosts can access. Also, the subjectAltName (SAN) field must contain all management
hosts.
Procedure
Results
You can now securely access the cluster management console over TLS in your development environment.