Manage security and certificates in Web Services Proxy
For security in the Web Services Proxy, you can specify an SSL port designation and you can manage certificates. Certificates identify website owners for secure connections between clients and servers.
Enable SSL
The Web Services Proxy uses Secure Sockets Layer (SSL) for security, which is enabled during installation. You can change the SSL port designation in the wsconfig.xml file.
-
Open the wsconfig.xml file, located at:
-
(Windows) — C:\Program Files\NetApp\SANtricity Web Services Proxy
-
(Linux) — /opt/netapp/santricity_web_services_proxy
-
-
Add or change the SSL port number, similar to the following example:
<sslport clientauth="request">8443</sslport>
When the server is started with SSL configured, the server looks for the keystore and truststore files.
-
If the server does not find a keystore, the server uses the IP address of the first detected non-loopback IPv4 address to generate a keystore and then add a self-signed certificate to the keystore.
-
If the server does not find a truststore, or the truststore is not specified, the server uses the keystore as the truststore.
Bypass certificate validation
To support secure connections, the Web Services Proxy validates the storage systems' certificates against its own trusted certificates. If needed, you can specify that the proxy bypass that validation before connecting to the storage systems.
-
All storage system connections must be secure.
-
Open the wsconfig.xml file, located at:
-
(Windows) — C:\Program Files\NetApp\SANtricity Web Services Proxy
-
(Linux) — /opt/netapp/santricity_web_services_proxy
-
-
Enter
true
in thetrust.all.arrays
entry, as shown in the example:<env key="trust.all.arrays">true</env>
-
Save the file.
Generate and import a host management certificate
Certificates identify website owners for secure connections between clients and servers. To generate and import Certificate Authority (CA) certificates for the host system where the Web Services Proxy is installed, you can use API endpoints.
To manage certificates for the host system, you perform the following tasks using the API:
-
Create a certificate signing request (CSR) for the host system.
-
Send the CSR file to a CA, and then wait for them to send you the certificate files.
-
Import the signed certificates to the host system.
You can also manage certificates in the Unified Manager interface. For more information, see the online help available in Unified Manager. |
-
Log in to the interactive API documentation.
-
Go to the drop-down menu in the upper right and then select v2.
-
Expand the Administration link and scroll down to the /certificates endpoints.
-
Generate the CSR file:
-
Select POST:/certificates, and then select Try it out.
The web server regenerates a self-signed certificate. You can then enter information in the fields to define the common name, organization, organization unit, alternate ID, and other information used to generate the CSR.
-
Add the required information in the Example values pane to generate a valid CA certificate, and then execute the commands.
Do not call POST:/certificates or POST:/certificates/reset again, or you must regenerate the CSR. When you call POST:/certificates or POST:/certificates/reset, you are generating a new self-signed certificate with a new private key. If you send a CSR that was generated before the last reset of the private key on the server, the new security certificate does not work. You must generate a new CSR and request a new CA certificate. -
Execute the GET:/certificates/server endpoint to confirm that the current certificate status is the self-signed certificate with the information added from the POST:/certificates command.
The server certificate (denoted by the alias
jetty
) is still self-signed at this point. -
Expand the POST:/certificates/export endpoint, select Try it out, enter a file name for the CSR file, and then click Execute.
-
-
Copy and paste the
fileUrl
into a new browser tab to download the CSR file, and then send the CSR file to a valid CA to request a new web server certificate chain. -
When the CA issues a new certificate chain, use a certificate manager tool to break out the root, intermediate, and web server certificates, and then import them to the Web Services Proxy server:
-
Expand the POST:/sslconfig/server endpoint and select Try it out.
-
Enter a name for the CA root certificate in the alias field.
-
Select false in the replaceMainServerCertificate field.
-
Browse to and select the new CA root certificate.
-
Click Execute.
-
Confirm that the certificate upload was successful.
-
Repeat the CA certificate upload procedure for the CA intermediate certificate.
-
Repeat the certificate upload procedure for the new web server security certificate file, except in this step, select true on the replaceMainServerCertificate drop-down.
-
Confirm that the web server security certificate import was successful.
-
To confirm that the new root, intermediate, and web server certificates are available in the keystore, run GET:/certificates/server.
-
-
Select and expand the POST:/certificates/reload endpoint, and then select Try it out. When prompted, whether you want to restart both controllers or not, select false. ("True" applies only in the case of dual array controllers.) Click Execute.
The /certificates/reload endpoint usually returns a successful http 202 response. However, the reload of the web server truststore and keystore certificates does create a race condition between the API process and the web server certificate reload process. In rare cases, the web server certificate reload can beat the API processing. In this case, the reload appears to fail even though it completed successfully. If this occurs, continue to the next step anyway. If the reload actually failed, the next step also fails.
-
Close the current browser session to the Web Services Proxy, open a new browser session, and confirm that a new secure browser connection to the Web Services Proxy can be established.
By using an incognito or in-private browsing session, you can open a connection to the server without using any saved data from previous browsing sessions.
Login lockout feature
Configurable through the REST API only, you can limit the number of login attempts for the embedded and proxy Web Services. Based on your settings, the lockout feature will be enabled once the number of login attempts for the Web Services is exceeded.
-
Log in to the interactive API documentation.
-
Go to the drop-down menu in the upper right and then select v2.
-
Click the GET:/settings/lockout endpoint to retrieve the lockout settings.
-
Click the POST:/settings/lockout endpoint, and then click Try it out to configure the lockout settings.