Skip to main content
SnapCenter software

Configure Certificate-based authentication

Contributors netapp-soumikd

Certificate-based authentication enhances security by verifying the identity of both the SnapCenter Server and plug-in hosts, ensuring secure and encrypted communication.

Enable Certificate-based authentication

To enable certificate-based authentication for SnapCenter Server and the Windows plug-in hosts, run the following PowerShell cmdlet. For the Linux plug-in hosts, the certificate-based authentication will be enabled when you enable the two-way SSL.

  • To enable client certificate-based authentication:

    Set-SmConfigSettings -Agent –configSettings @{"EnableClientCertificateAuthentication"="true"} -HostName [hostname]

  • To disable client certificate-based authentication:

    Set-SmConfigSettings -Agent –configSettings @{"EnableClientCertificateAuthentication"="false"} -HostName [hostname]`

Export Certificate Authority (CA) certificates from SnapCenter Server

You should export the CA certificates from the SnapCenter Server to the plug-in hosts using the Microsoft management console (MMC).

Before you begin

You should have configured the two-way SSL.

Steps

  1. Go to the Microsoft management console (MMC), and then click File > Add/Remove Snapin.

  2. In the Add or Remove Snap-ins window, select Certificates and then click Add.

  3. In the Certificates Snap-in window, select the Computer Account option, and then click Finish.

  4. Click Console Root > Certificates - Local Computer > Personal > Certificates.

  5. Right-click on the procured CA certificate, which is used for SnapCenter Server and then select All Tasks > Export to start the export wizard.

  6. Perform the following actions in the wizard.

For this option…​ Do the following…​

Export Private Key

Select No, do not export the private key, and then click Next.

Export File Format

Click Next.

File Name

Click Browse and specify the file path to save the certificate, and click Next.

Completing the Certificate Export Wizard

Review the summary, and then click Finish to start the export.

Note Certificate based authentication is not supported for SnapCenter HA configurations and SnapCenter Plug-in for VMware vSphere.

Import CA certificate to the Windows plug-in hosts

To use the exported SnapCenter Server CA certificate, you should import the related certificate to the SnapCenter Windows plug-in hosts using the Microsoft management console (MMC).

Steps

  1. Go to the Microsoft management console (MMC), and then click File > Add/Remove Snapin.

  2. In the Add or Remove Snap-ins window, select Certificates and then click Add.

  3. In the Certificates Snap-in window, select the Computer Account option, and then click Finish.

  4. Click Console Root > Certificates - Local Computer > Personal > Certificates.

  5. Right-click on the folder “Personal”, and then select All Tasks > Import to start the import wizard.

  6. Perform the following actions in the wizard.

For this option…​ Do the following…​

Store Location

Click Next.

File to Import

Select the SnapCenter Server certificate that ends with .cer extension.

Certificate Store

Click Next.

Completing the Certificate Export Wizard

Review the summary, and then click Finish to start the import.

Import CA Certificate to the UNIX plug-in hosts

You should import the CA certificate to the UNIX plug-in hosts.

About this task

  • You can manage the password for SPL keystore, and the alias of the CA signed key pair in use.

  • The password for SPL keystore and for all the associated alias password of the private key should be same.

Steps

  1. You can retrieve SPL keystore default password from SPL property file. It is the value corresponding to the key SPL_KEYSTORE_PASS.

  2. Change the keystore password: $ keytool -storepasswd -keystore keystore.jks

  3. Change the password for all aliases of private key entries in the keystore to the same password used for the keystore: $ keytool -keypasswd -alias "<alias_name>" -keystore keystore.jks

  4. Update the same for the key SPL_KEYSTORE_PASS in spl.properties` file.

  5. Restart the service after changing the password.

Configure root or intermediate certificates to SPL trust-store

You should configure the root or intermediate certificates to SPL trust-store. You should add the root CA certificate and then the intermediate CA certificates.

Steps

  1. Navigate to the folder containing the SPL keystore: /var/opt/snapcenter/spl/etc.

  2. Locate the file keystore.jks.

  3. List the added certificates in the keystore: $ keytool -list -v -keystore keystore.jks

  4. Add a root or intermediate certificate: $ keytool -import -trustcacerts -alias <AliasNameForCerticateToBeImported> -file /<CertificatePath> -keystore keystore.jks

  5. Restart the service after configuring the root or intermediate certificates to SPL trust-store.

Configure CA signed key pair to SPL trust-store

You should configure the CA signed key pair to SPL trust-store.

Steps

  1. Navigate to the folder containing the SPL’s keystore /var/opt/snapcenter/spl/etc.

  2. Locate the file keystore.jks`.

  3. List the added certificates in the keystore: $ keytool -list -v -keystore keystore.jks

  4. Add the CA certificate having both private and public key. $ keytool -importkeystore -srckeystore <CertificatePathToImport> -srcstoretype pkcs12 -destkeystore keystore.jks -deststoretype JKS

  5. List the added certificates in the keystore. $ keytool -list -v -keystore keystore.jks

  6. Verify that the keystore contains the alias corresponding to the new CA certificate, which was added to the keystore.

  7. Change the added private key password for CA certificate to the keystore password.

    Default SPL keystore password is the value of the key SPL_KEYSTORE_PASS in spl.properties file.

    $ keytool -keypasswd -alias "<aliasNameOfAddedCertInKeystore>" -keystore keystore.jks`

  8. If the alias name in the CA certificate is long and contains space or special characters ("*",","), change the alias name to a simple name: $ keytool -changealias -alias "<OrignalAliasName>" -destalias "<NewAliasName>" -keystore keystore.jks`

  9. Configure the alias name from the keystore located in spl.properties file. Update this value against the key SPL_CERTIFICATE_ALIAS.

  10. Restart the service after configuring the CA signed key pair to SPL trust-store.

Export SnapCenter certificates

You should export the SnapCenter certificates in .pfx format.

Steps

  1. Go to the Microsoft management console (MMC), and then click File > Add/Remove Snap-in.

  2. In the Add or Remove Snap-ins window, select Certificates and then click Add.

  3. In the Certificates snap-in window, select the My user account option, and then click Finish.

  4. Click Console Root > Certificates - Current User > Trusted Root Certification Authorities > Certificates.

  5. Right-click the certificate that has the SnapCenter Friendly Name, and then select All Tasks > Export to start the export wizard.

  6. Complete the wizard, as follows:

    In this wizard window…​ Do the following…​

    Export Private Key

    Select the option Yes, export the private key, and then click Next.

    Export File Format

    Make no changes; click Next.

    Security

    Specify the new password to be used for the exported certificate, and then click Next.

    File to Export

    Specify a file name for the exported certificate (you must use .pfx), and then click Next.

    Completing the Certificate Export Wizard

    Review the summary, and then click Finish to start the export.