Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Table of Contents

Introduction

Kiuwan on premises On-Premises fosters secure connections by providing a default installation environment where most communications are done under a secure protocol.

By default, Kiuwan on premises On-Premises services connections use:

...

In order to provide a default installation configuration that enables secure protocols on most communications channels, Kiuwan on premises On-Premises comes with a set of certificates and keystores for the default configured domain (kiuwan.onpremise.local).

...

Provided certificates and keystores

Kiuwan on premises On-Premises installation tool (kiuwan-cluster) provides a number of files to allow secure communications between containers. These files are located in kiuwan-cluster distributions under the ssl folder.

...

LocationFileFormatContentPurposeExpiration date
ssl/cacacert.pemRSA 4096 bits SHA256The CA certificate that signed Kiuwan on premises On-Premises domain certificateAllows Kiuwan servers to provide the CA that signed their certificates2029/10/13
ssl/kiuwan.onpremise.localdomaincert.pemRSA 4096 bits SHA256The Kiuwan on premises On-Premises domain certificateAllows Kiuwan servers to identify themselves2029/10/13

...

LocationFileFormatContentPurpose
ssl/cacakey.pemRSA 4096 bits PKCS #8The provided CA private keyAllows signing certificates with the provided CA
ssl/kiuwan.onpremise.localdomainkey.pemRSA 4096 bits PKCS #8The Kiuwan on premises On-Premises domain private keyAllows encrypting traffic for the provided domain

...

Using certificates using the provided CA or your own CA

Kiuwan on premises On-Premises installater (kiuwan-cluster) contains a handy tool for creating certificates both with the provided CA or your own CA.

...

PropertyDefault valueMeaning
java.keystore.password The password to set to the generated Java keystore
java.truststore.password The password to set to the generated Java truststore
ssl.ca.password The password to set to the generated CA (only applies when generating a new custom CA). The set password will be used when signing certificates as well
ssl.countryUSCountry, state, locality, organization or organization unit to set both to the subject of the CA certificate (in case of you are generating a new custom CA) and to the subject of the specified domain signing request
ssl.statemystate
ssl.localitymylocality
ssl.organizationmycompany
ssl.organization.unitmyorganizationunit
ssl.company.domainmycompany.comCompany domain to set to the subject's Common Name (CN) of the CA certificate (in case of you are generating a new custom CA)
ssl.subject.alt.names

DNS:kiuwan.onpremise.local[:443,:3306,:6379]

DNS:wildflykiuwan-f[1-2][:8143,:8443]

DNS:wildflykiuwanContainer-f[1-2][:8143,:8443]

DNS:mysqlkiuwan[:3306]

DNS:mysqlkiuwanContainer[:3306]

DNS:redis_0000[1-6][:6379]

Subject Alternative Names (SANs) that will be set to the specified domain certificate. These are needed in order to be able to share the same certificate between different services of the Kiuwan on premises On-Premises infrastructure.

Step 1: set the CA to use when signing your certificates

...

Using certificates signed by a trusted CA

Note that Kiuwan on premises On-Premises installation tool does not automate this process as it may be different between organizations based on their security policies.

The following table shows the files that Kiuwan on premise On-Premises needs:

FileWhere does it come from?How can I get it?
domainkey.pemYou have to generate this fileUse a SSL tool to generate it
cacert.pemYour CA will provide this fileYour CA will send this file to you after a CSR (Certificate Signing Request)
domaincert.pemYour CA will provide this fileYour CA will send this file to you after a CSR (Certificate Signing Request)
domainkeystore.jksYou have to generate this fileUse your JRE's keytool program to generate it
truststore.jksProvided by the installation toolIt is stored in [INSTALLER_DIR]/ssl/truststore/truststore.jks

...

The following step is to run the deploy-user-content.sh script to let the installer deploy your certificates to the persistent volumes. Note that once this is done and depending on your installation needs, the following steps may change. Please refer to the Installation guide page for more information.

Adding the provided or a custom CA to Kiuwan

...

On-Premises clients

Kiuwan on On-Premises installer tool provides default certificates for the default host name, signed by a supplied CA (Certificate Authority).

...

If you choose to sign your domain's certificate with the provided CA, a new CA created using kiuwan-certool.sh or your own CA, internet browsers and other clients accessing your Kiuwan on premises On-Premises installation will not recognize it as a trusted CA by default. You will get error messages like this one:

...

In order to make your browser trust the supplied certificates, you will need to add this CA to your browser, and Java clients that access your Kiuwan on premises On-Premises installation:

  • Fixefox, Chrome, Edge: import cacert.pem by using the tools provided by the browsers.
  • Java clients (Kiuwan for developers Eclipse, Kiuwan for developers JetBrains, Jenkins, KLA, etc): add the provided cacert.pem to the JRE keystore used by the client. Please refer to the official documentation of your JRE distribution about the Java keytool program.
  • Windows clients (Kiuwan for developers VisualStudio): import cacert.pem by using the tools provided by Windows (certmgr.msc).
  • Multiplatform clients (Kiuwan for developers VisualStudioCode): import cacert.pem by using the tools provided by your OS.