You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: appliance_hardening_guide/_topics/db_ssl.md
+39-40
Original file line number
Diff line number
Diff line change
@@ -10,59 +10,43 @@ The appliance image ships with a default SSL certificate and it is recommended t
10
10
11
11
For more information, see [Generating SSL Certificates for Your Appliance and Database](#generating-ssl-certificates-for-your-appliance-and-database).
12
12
13
-
14
13
-`/var/www/miq/vmdb/certs/server.cer` - Signed or self-signed certificate for the database appliance.
15
-
16
14
-`/var/www/miq/vmdb/certs/server.cer.key` - Private key for server certificate.
17
15
18
-
-`/var/www/miq/vmdb/certs/root.crt` - The root CA certificate used to sign the CA certificate for the {{ site.data.product.title_short }} database. You can either use a self-signed certificate or a certificate that is signed by a trusted CA to generate your root certificate.
19
-
20
16
It is also recommended to stop all {{ site.data.product.title_short }} services before configuring the database to use SSL.
21
17
18
+
#### Configure SSL on the database appliance
19
+
22
20
To configure SSL on the database appliance:
23
21
24
22
1. Log in as `root` to the appliance where the database resides.
25
23
26
24
2. Stop the `evmserverd` and `postgresql` services:
The database appliance now accepts only connections from connecting appliances that use SSL. The following procedure sets up connecting appliances to communicate to the database by using SSL. Use this procedure for each connecting appliance:
83
69
84
70
1. Log in as `root` to the connecting appliance.
85
71
86
-
2.Create the `.postgresql` directory in your `root` user home directory.
72
+
2.Copy the root certificate file from the database to the operating system's list of valid certificates:
The standard `manageiq.properties` should already have the `PGSSLROOTCERT` defined.
107
+
The above command adds an entry to `manageiq.properties` if it is not already present.
109
108
110
109
Complete this procedure for each external appliance. This enhances the security of all database transactions in your {{ site.data.product.title_short }} infrastructure.
0 commit comments