You can use the Secure Sockets Layer (SSL) protocol for all network communication between clients and servers in your BusinessObjects Enterprise deployment.
To set up SSL for all server communication you need to perform the following steps:
To set up SSL protocol for your server communication, use the SSLC command line tool to create a key file and a certificate file for each machine in your deployment.
sslconfig
command line tool to do the configuration.
SSLC.exe
command line tool.The SSLC tool is installed with your BusinessObjects Enterprise software. (On Windows, for example, it is installed by default in C:\Program Files\Business Objects\BusinessObjects Enterprise 11.5\win32_x86
.)
sslc req
This command creates two files, a Certificate Authority (CA) certificate request (cacert.req
) and a private key (privkey.pem
).
sslc rsa
This command creates the decrypted key, cakey.pem
.
sslc x509
This command creates a selfcacert.pem
, that expires after 365 days. Choose the number of days that suits your security needs.
sslc.cnf
file, stored in the same folder as the SSLC command line tool. Perform the following steps based on settings in the sslc.cnf
file.cakey.pem
and cacert.pem
files in the directories specified by sslc.cnf
file's certificate
and private_key
options.By default, the settings in the sslc.cnf
file are:
certificate = $dir/cacert.pem
private_key = $dir/private/cakey.pem
sslc.cnf
file's database
setting. Note: By default, this file is $dir/index.txt
. The file can be empty.
sslc.cnf
file's serial
setting. Ensure that this file provides an octet
Note: To ensure that you can create and sign more certificates, choose a large even hexadecimal number, such as 11111111111111111111111111111111.)'
sslc.cnf
file's new_certs_dir
setting.sslc req
The certificate and key files generated are placed under the current working folder.
copy privkey.pem server.key
sslc ca
This command creates the servercert.pem
file, which contains the signed certificate.
sslc x509
sslc x509
Note: The CA certificate (cacert.der
) and its corresponding private key (cakey.pem
) need to be generated only once per deployment. All machines in the same deployment must share the same CA certificates. All other certificates need to be signed by the private key of any of the CA certificates.
passphrase
used for decrypting the generated private key.After you create keys and certificates for each machine in your deployment, and store them in a secure location, you need to provide the Central Configuration Manager (CCM) and your web application server with the secure location.
Note: Make sure you provide the directory for the machine that the server is running on.
DcertDir
-=d:\ssl
DtrustedCert
-=cacert.der
DsslCert
-=clientcert.der
DsslKey
-=client.key
Dpassphrase
-=passphrase.txt
The following table shows the descriptions that correspond to these examples:
Example | Description |
---|---|
Trusted certificate file. If specifying more than one, separate with semicolons. | |
sslconfig
tool from the command line and follow the configuration steps. Business Objects http://www.businessobjects.com/ Support services http://www.businessobjects.com/services/support/ Product Documentation on the Web http://support.businessobjects.com/documentation/ |