![]() |
Copyright © Cloud Software Group, Inc. All Rights Reserved |
Before you can set up the configuration for SSL, you should install the Apache server with SSL enabled. See Configuring Mutual SSL Authentication.
1. Ensure that mod_ssl module is available in the Apache HTTP server installation.
2. Enable the mod_ssl module as follows:
a.
b. Uncomment the following directive in the httpd.conf file, if commented. If this directive does not exist, add it in the file:where APACHE_ROOT is the actual path of the Apache HTTP server installation which must be SSL enabled.
3. SSLCertificateFile "Name_of_Server_public_certificate"SSLCertificateKeyFile "Name_of_Server_private_key"SSLCACertificateFile Name_of_CA_Certificate
b. Set the Listen directive if you want to change the default port value for SSL requests:Listen listening_port_value
c.
4. Import the CA certificate as specified in the SSLCACertificateFile directive of the Apache Server configuration.Before you start configuring mutual authentication and authorization, see Prerequisites for Mutual SSL Setup.
• Apache HTTP server with mod_ssl module. Refer to the TIBCO API Exchange Gateway readme for the Apache server version information. Verify that you have set it up as specified in Installing Apache HTTP Server.To use the mod_ssl module with Apache HTTP server, you must ensure the following:
• OpenSSL is installed on the Apache server's host computer.
1. Ensure that the mod_ssl module is available and enabled on the Apache HTTP server installation. To enable the mod_ssl module, follow theser steps:
a.
b. Uncomment the following directive in the httpd.conf file, if commented. If this directive does not exist, add it in the file:where APACHE_ROOT is the actual path of the Apache HTTP server installation which must be SSL enabled.
2. SSLCertificateFile "Name_of_Server_public_certificate"SSLCertificateKeyFile "Name_of_Server_private_key"SSLCACertificateFile Name_of_CA_Certificate
• The value of SSLVerifyDepth is set to 1 as you are doing only one level of authentication. You have configured only one CA which is the root CA.
b. Set the Listen directive if you want to change the default port value for the SSL requests:Listen listening_port_value
• You can access the machine using the http://<machine-name>:443/../..when the default port as 443 is used.
•
Ensure that you have copied the private key and the server’s digital certificate in the directories specified in the SSLCertificateFile and SSLCertificateKeyFile directives.
3.
4. Import the CA certificate as specified in the SSLCACertificateFile directive of the Apache Server configuration.
When you invoke a secure connection to the Apache server for the first time using HTTP/S transport, the browser displays a message indicating that the server presented is an untrusted certificate. Accept the certificate by clicking Yes and the following message should be displayed: "it works!".
1.
Table 17: SSL Directives For example, /etc/apache2/ssl.crt For example, /etc/apache2/ssl.crt/cacert-bundle.pem
b. Navigate to Tools > Options on the browser menu.
c. Select Advanced tab in the new window.
d. Select Security tab in the new dialog.
e.
f. Click Import and follow the wizard to import the file.
h. Navigate to Tools > Internet Options on the browser menu.
i. Select Content tab in the new dialog window.
j.
k. Click Import and follow the wizard to import the file.
1.
2. Add the following line to enable the mod_headers module:LoadModule headers_module APACHE_HOME/modules/mod_headers.so
3. Set RequestHeader directives as follows:
8. To test this configuration setup, enter the following URL to submit a ping operation request:
1. Start the Config UI. See Starting GUI for details.
3. Click the PARTNER tab.
4. Add a new partner. See Partners for details.
Specifies the client’s identity that the Apache HTTP server forwards in the SerialNumber HTTP header of requests that are submitted by this partner. This can either be the certificate’s serial number or the subject distinguished name as used for the digital certificate.Partner Serial Number: /C=US/ST=California/L=Palo Alto/O=Cloud Software Group, Inc./OU=ActiveMatrix Service Gateway/CN=ASG Demo Client01/emailAddress=asgclient01@tibasg.co.pd Partner Issuer CA: /C=US/ST=California/O=Cloud Software Group, Inc./OU=ActiveMatrix Service Gateway/CN=TIBCO ASG Certificate Authority/emailAddress=admin@tibasg.co.pd
Partner Serial Number and Partner Issuer CA fields contain distinguished names as defined by the X.509 standard. The X.509 standard defines the fields, field names, and abbreviations used to refer to the fields.
6. Click the Partner Operations tab.
7.
b. Enter the following URL to submit a ping operation request:
c. Verify that you receive ASG is alive response from TIBCO API Exchange Gateway on the web browser.
![]() |
Copyright © Cloud Software Group, Inc. All Rights Reserved |