Securing the bwagent REST API
The bwagent REST API can be secured via authentication and roles. The bwagent REST API server can be secured with SSL access.
Enabling Authentication for the bwagent REST API Using the JAAS Property File
Authentication for the bwagent REST API is implemented using the JAAS property file login module. Different login module implementations can be used. For more information, see the Jetty documentation at eclipse.org.
Procedure
Authorizing Access to the REST API by Role
Importing LDAP SSL certificate in the cacerts keystore file
To connect the bwagent to the LDAP Over SSL server, ensure that the server certificate is imported into the cacerts keystore file.
Procedure
-
Navigate to
BW_Home\ tibcojre64\1.8.0\lib\security
# To List Existing Certificates use command : BW_Home\tibcojre64\1.8.0\lib\security>keytool -list -keystore cacerts Enter keystore password: changeit Keystore type: JKS Keystore provider: SUN Your keystore contains 5 entries verisignclass2g2ca [jdk], Aug 25, 2016, trustedCertEntry, Certificate fingerprint (SHA1): B3:EA:C4:47:76:C9:C8:1C:EA:F2:9D:95:B6:CC:A0:08:1B:67:EC:9D digicertassuredidg3 [jdk], Aug 25, 2016, trustedCertEntry, Certificate fingerprint (SHA1): F5:17:A2:4F:9A:48:C6:C9:F8:A2:00:26:9F:DC:0F:48:2C:AB:30:89 verisignuniversalrootca [jdk], Aug 25, 2016, trustedCertEntry, Certificate fingerprint (SHA1): 36:79:CA:35:66:87:72:30:4D:30:A5:FB:87:3B:0F:A7:7B:B7:0D:54 digicerttrustedrootg4 [jdk], Aug 25, 2016, trustedCertEntry, Certificate fingerprint (SHA1): DD:FB:16:CD:49:31:C9:73:A2:03:7D:3F:C8:3A:4D:7D:77:5D:05:E4 verisignclass1g3ca [jdk], Aug 25, 2016, trustedCertEntry, Certificate fingerprint (SHA1): 20:42:85:DC:F7:EB:76:41:95:57:8E:13:6B:D4:B7:D1:E9:8E:46:A5 identrustpublicca [jdk], Aug 25, 2016, trustedCertEntry, E:\BW\6.4.0\V11\tibcojre64\1.8.0\lib\security> #### Import LDAP SSL Certificates to cacerts: BW_Home\tibcojre64\1.8.0\lib\security>keytool -import -keystore cacerts -file <certName>.der Enter keystore password: changeit Owner: CN=bwin2k8r264b_52, OU=Directory, O=ASF, C=US Issuer: CN=ApacheDS, OU=Directory, O=ASF, C=US Serial number: 15ac649f77e Valid from: Sun Mar 12 23:10:20 PDT 2017 until: Mon Mar 12 23:10:20 PDT 2018 Certificate fingerprints: MD5: A4:25:84:6C:63:51:C5:A2:EB:D5:69:2A:74:EE:D3:31 SHA1: F0:9D:0A:26:E3:86:61:CB:62:3F:1F:40:5A:31:F3:BC:0C:C9:C0:B0 SHA256: 82:43:35:95:55:A6:CC:36:BB:C8:9A:6E:9D:55:FF:69:C1:7C:30:B3:EC:79:DA:3E:98:A9:F2:B6:5C:48:B8:28 Signature algorithm name: SHA1withRSA Version: 1 Trust this certificate? [no]: yes Certificate was added to keystore #### Check if the certificate was imported. The number of keystore entries should increase by 1. BW_Home\tibcojre64\1.8.0\lib\security>keytool -list -keystore cacerts Enter keystore password: Keystore type: JKS Keystore provider: SUN Your keystore contains 6 entries verisignclass2g2ca [jdk], Aug 25, 2016, trustedCertEntry, Certificate fingerprint (SHA1): B3:EA:C4:47:76:C9:C8:1C:EA:F2:9D:95:B6:CC:A0:08:1B:67:EC:9D digicertassuredidg3 [jdk], Aug 25, 2016, trustedCertEntry, Certificate fingerprint (SHA1): F5:17:A2:4F:9A:48:C6:C9:F8:A2:00:26:9F:DC:0F:48:2C:AB:30:89 verisignuniversalrootca [jdk], Aug 25, 2016, trustedCertEntry, Certificate fingerprint (SHA1): 36:79:CA:35:66:87:72:30:4D:30:A5:FB:87:3B:0F:A7:7B:B7:0D:54 digicerttrustedrootg4 [jdk], Aug 25, 2016, trustedCertEntry, Certificate fingerprint (SHA1): DD:FB:16:CD:49:31:C9:73:A2:03:7D:3F:C8:3A:4D:7D:77:5D:05:E4 verisignclass1g3ca [jdk], Aug 25, 2016, trustedCertEntry, Certificate fingerprint (SHA1): 20:42:85:DC:F7:EB:76:41:95:57:8E:13:6B:D4:B7:D1:E9:8E:46:A5 identrustpublicca [jdk], Aug 25, 2016, trustedCertEntry, Certificate fingerprint (SHA1): BA:29:41:60:77:98:3F:F4:F3:EF:F2:31:05:3B:2E:EA:6D:4D:45:FD utnuserfirstobjectca [jdk], Aug 25, 2016, trustedCertEntry, BW_Home\tibcojre64\1.8.0\lib\security>
Copyright © Cloud Software Group, Inc. All rights reserved.