You can use the Secure Sockets Layer (SSL) protocol for all network communication between clients and servers in your BusinessObjects Enterprise deployment.
To set up SSL for all server communication you need to perform the following steps:
To set up SSL protocol for your server communication, use the SSLC command line tool to create a key file and a certificate file for each machine in your deployment.
sslconfig command line tool to do the configuration.
SSLC.exe command line tool.The SSLC tool is installed with your BusinessObjects Enterprise software. (On Windows, for example, it is installed by default in C:\Program Files\Business Objects\BusinessObjects Enterprise 11.5\win32_x86.)
sslc req
This command creates two files, a Certificate Authority (CA) certificate request (cacert.req) and a private key (privkey.pem).
sslc rsa
This command creates the decrypted key, cakey.pem.
sslc x509
This command creates a selfcacert.pem, that expires after 365 days. Choose the number of days that suits your security needs.
sslc.cnf file, stored in the same folder as the SSLC command line tool. Perform the following steps based on settings in the sslc.cnf file.cakey.pem and cacert.pem files in the directories specified by sslc.cnf file's certificate and private_key options.By default, the settings in the sslc.cnf file are:
certificate = $dir/cacert.pem
private_key = $dir/private/cakey.pem
sslc.cnf file's database setting. Note: By default, this file is $dir/index.txt. The file can be empty.
sslc.cnf file's serial setting. Ensure that this file provides an octet
Note: To ensure that you can create and sign more certificates, choose a large even hexadecimal number, such as 11111111111111111111111111111111.)'
sslc.cnf file's new_certs_dir setting.sslc req
The certificate and key files generated are placed under the current working folder.
copy privkey.pem server.key
sslc ca
This command creates the servercert.pem file, which contains the signed certificate.
sslc x509
sslc x509
Note: The CA certificate (cacert.der) and its corresponding private key (cakey.pem) need to be generated only once per deployment. All machines in the same deployment must share the same CA certificates. All other certificates need to be signed by the private key of any of the CA certificates.
passphrase used for decrypting the generated private key.After you create keys and certificates for each machine in your deployment, and store them in a secure location, you need to provide the Central Configuration Manager (CCM) and your web application server with the secure location.
Note: Make sure you provide the directory for the machine that the server is running on.
DcertDir
-=d:\ssl DtrustedCert
-=cacert.der DsslCert
-=clientcert.der DsslKey
-=client.key Dpassphrase
-=passphrase.txt
The following table shows the descriptions that correspond to these examples:
| Example | Description |
|---|---|
Trusted certificate file. If specifying more than one, separate with semicolons. | |
sslconfig tool from the command line and follow the configuration steps. | Business Objects http://www.businessobjects.com/ Support services http://www.businessobjects.com/services/support/ Product Documentation on the Web http://support.businessobjects.com/documentation/ |