Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Current »

There are three ways to configure SSL.

  1. Front-End Terminated SSL
    1. Drawbacks: 
      1. If an untrusted party penetrates the internal network/DMZ the traffic is susceptible to eavesdropping
  2. SSL Pass-Through
    1. Drawbacks: 
      1. Setting the sticky-bit on the reverse proxy may prove impossible and this may preclude additional reverse proxy functionality .
      2. You will not be able to set headers, such as X-Forwarded-For, so you will lose the clients' IP address information.
  3. Front-End Terminated SSL With Back-End SSL
    1. This is the recommended method


In a cluster like this example below:


FQDNInternal IPExternal IP
Front-Endaccount.mydomain.com10.0.0.190.100.110.120
Back-End Node 1back-end-1.mydomain.com10.1.0.1<none>
Back-End Node 2back-end-2.mydomain.com10.1.0.2<none>


In the different configuration modes, SSL Certificates would be configured as shown in the following table



Front-End Terminated SSLSSL Pass-ThroughFront-End Terminated SSL With Back-End SSL
Front-End Certificate DNcn=account.mydomain.com<no SSL certificate>cn=account.mydomain.com
Back-End Node 1 Certificate DN<no SSL certificate>cn=account.mydomain.comcn=back-end-1.mydomain.com
Back-End Node 2 Certificate DN<no SSL certificate>cn=account.mydomain.comcn=back-end-2.mydomain.com


Terminate SSL to the Reverse Proxy

If you decide to leave the Back-End traffic unsecured, there's nothing to do in respect to WildFly configuration, just configure your Reverse Proxy accordingly.

Generally about SSL on Back-End Servers

The process of configuring SSL on the Back-End server nodes is two phased:

  1. Put a server certificate in a keystore
  2. Register keystore to WildFly

For the first phase we have provided scripts that will generate self-signed certificates, which can be used for only testing purposes but should be avoided in production. 

Pass-Through SSL

Run the config-wildfly-domain-cert-backend.cmd script on the master node, then copy the generated keystore.pfx file over to the slave node to the same path. The keystore.pfx file will be generated in the path %WILDFLY_HOME%\domain\configuration\keystore.pfx.

cd /D %PROGRAMFILES%\ubisecure\customerid\tools
config-wildfly-domain-cert-backend.cmd

Encrypt traffic separately between Front-End and Back-End servers.

These scripts will generate self-signed SSL certificates that uses each host's IP address in the cn-field.

On the Master Node, run config-wildfly-domain-cert-master.cmd

cd /D %PROGRAMFILES%\ubisecure\customerid\tools
config-wildfly-domain-cert-master.cmd

On the Slave node, run config-wildfly-domain-cert-slave.cmd

cd /D %PROGRAMFILES%\ubisecure\customerid\tools
config-wildfly-domain-cert-slave.cmd

In this configuration - and depending on your Front-End Server - you may have to separately configure your Front-End Server(s) to trust the Back-End servers' certificates.

Keystore is registered to WildFly in the next step.

Securing other Back-End connections

Ubisecure CustomerID can be configured to make calls to third-party software during the user registration workflows. Typically data entered by the user is verified against a CRM or other backend service to determine which access rights a user should be automatically given based on an existing service agreement.

If you plan to use back channel connections from Ubisecure CustomerID over SSL encrypted connections, you will have to add each server's public key to the Server's cacerts file: %JAVA_HOME%\lib\security\cacerts. Once you have downloaded the server's public key, you can add it to the key store with the following commands:

%JAVA_HOME%\bin\keytool.exe -importcert -trustcacerts -alias "<descriptive alias here>" -cacerts -storepass changeit -file C:\path\to\certificate.cer

These commands can also be run at a later stage when third-party backend services are added to user registration workflows.



  • No labels