Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Steps

Table of Contents
excludeSteps

...

In a cluster like this example below:


FQDNInternal IPExternal IP
Front-Endaccount.mydomain.com10.0.0.190.100.110.120
Back-End Node 1back-end-1.mydomain.com10.1.0.1<none>
Back-End Node 2back-end-2.mydomain.com10.1.0.2<none>


In the different configuration modes, SSL Certificates would be configured as shown in the following table



Front-End Terminated SSLSSL Pass-ThroughFront-End Terminated SSL With Back-End SSL
Front-End Certificate DNcn=account.mydomain.com<no SSL certificate>cn=account.mydomain.com
Back-End Node 1 Certificate DN<no SSL certificate>cn=account.mydomain.comcn=back-end-1.mydomain.com
Back-End Node 2 Certificate DN<no SSL certificate>cn=account.mydomain.comcn=back-end-2.mydomain.com

Unencrypted back-end

A) Terminate SSL to the Reverse Proxy

...


C) Encrypt traffic separately between Front-End and Back-End servers.

These scripts will generate self-signed SSL certificates that uses each host's IP address in the cn-field.

On the Master Node, run config-wildfly-domain-cert-master.sh

...

If you plan to use back channel connections from Ubisecure CustomerID over SSL encrypted connections, you will have to add each server's public key to the Server JRE's cacerts file. You can find the cacerts file under ${JREJAVA_HOME}/lib/security/cacerts. Once you have downloaded the server's public key, you can add it to the key store with the following commands: 

Code Block
languagetext
cd ${JREJAVA_HOME}/lib/security
${JAVA_HOME}/bin/keytool -importcert -trustcacerts -alias "<descriptive alias here>" -keystore cacerts -storepass changeit -file /path/to/certificate.cer

...