<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Certificate Management on</title><link>https://docs.protegrity.com/10.1/docs/cmg/</link><description>Recent content in Certificate Management on</description><generator>Hugo</generator><language>en</language><atom:link href="https://docs.protegrity.com/10.1/docs/cmg/index.xml" rel="self" type="application/rss+xml"/><item><title>Certificates in the ESA</title><link>https://docs.protegrity.com/10.1/docs/cmg/cmg_ch_certificates_in_esa/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/10.1/docs/cmg/cmg_ch_certificates_in_esa/</guid><description>&lt;p>Digital certificates are used to encrypt online communication and authentication between two entities. For two entities exchanging sensitive information, the one that initiates the request for exchange can be called the client. The one that receives the request and constitutes the other entity can be called the server.&lt;/p>
&lt;p>The authentication of both the client and the server involves the use of digital certificates issued by the trusted Certificate Authorities (CAs). The client authenticates itself to a server using its client certificate. Similarly, the server also authenticates itself to the client using the server certificate. Thus, certificate-based communication and authentication involves a client certificate, server certificate, and a certifying authority that authenticates the client and server certificates.&lt;/p></description></item><item><title>Certificates in DSG</title><link>https://docs.protegrity.com/10.1/docs/cmg/cmg_ch_certificates_in_dsg/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/10.1/docs/cmg/cmg_ch_certificates_in_dsg/</guid><description>&lt;p>During the install process of DSG, a series of self-signed SSL Certificates are generated. You may use it in a non-production environment. It is recommended to use your own certificate for production use.&lt;/p>
&lt;p>To view the certificates:&lt;/p>
&lt;ol>
&lt;li>
&lt;p>On the ESA/DSG Web UI, navigate to &lt;strong>Cloud Gateway&lt;/strong> &amp;gt; &lt;strong>3.3.0.0{build_number}&lt;/strong> &amp;gt; &lt;strong>Transport&lt;/strong> &amp;gt; &lt;strong>Certificate/Key Material&lt;/strong>.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>On the &lt;em>Certificate/Key Material&lt;/em> screen, view the certificates.&lt;/p>
&lt;/li>
&lt;/ol>
&lt;p>When you install a DSG node, the following types of certificates and keys are generated:&lt;/p></description></item><item><title>Replicating Certificates in a Trusted Appliance Cluster</title><link>https://docs.protegrity.com/10.1/docs/cmg/cmg_replicating_certificates_tac/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/10.1/docs/cmg/cmg_replicating_certificates_tac/</guid><description>&lt;p>The following figure illustrates the replication of certificates between two ESAs in a TAC.&lt;/p>
&lt;p>&lt;img src="https://docs.protegrity.com/10.1/docs/images/cmg_replicating_certificates_TAC.jpg" alt="Replicating Certificates in TAC" title="Replicating Certificates in TAC">&lt;/p>
&lt;p>The figure depicts two ESAs in a TAC. The ESA1 contains the server and the client certificates. The certificates in ESA1 are signed by CA1. The Protectors communicate with ESA1 to retrieve the client certificate.&lt;/p>
&lt;blockquote>
&lt;p>&lt;strong>Note:&lt;/strong> The &lt;strong>Subject&lt;/strong> attribute for the server certificates is &lt;strong>CN=&amp;lt;hostname&amp;gt;&lt;/strong> and that of the client certificate is &lt;strong>CN= Protegrity Client&lt;/strong>.&lt;/p></description></item><item><title>Insight Certificates</title><link>https://docs.protegrity.com/10.1/docs/cmg/cmg_logstore_arch/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/10.1/docs/cmg/cmg_logstore_arch/</guid><description>&lt;p>The default certificates provided are signed using the system-generated Protegrity-CA certificate. However, after installation custom certificates can be used. Ensure that all the certificates are signed by the same CA as shown in the following diagram.&lt;/p>
&lt;p>&lt;img src="https://docs.protegrity.com/10.1/docs/images/cmg_plugcertificates_map.jpg" alt="" title="Insight Certificates">&lt;/p>
&lt;p>Update the certificates in the following order:&lt;/p>
&lt;ol>
&lt;li>Audit Store Cluster certificate&lt;/li>
&lt;li>Audit Store REST certificate&lt;/li>
&lt;li>PLUG client certificate for Audit Store&lt;/li>
&lt;li>Analytics client certificate for Audit Store&lt;/li>
&lt;/ol>
&lt;p>The various certificates used for communication between the nodes with their descriptions are provided here. The passphrase for the certificates are stored in the &lt;em>/etc/ksa/certs&lt;/em> directory.&lt;/p></description></item><item><title>Validating Certificates</title><link>https://docs.protegrity.com/10.1/docs/cmg/cmg_validating_certificates/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/10.1/docs/cmg/cmg_validating_certificates/</guid><description>&lt;h2 id="verifying-the-validity-of-a-certificate">Verifying the validity of a certificate&lt;/h2>
&lt;p>You can verify a client or a server certificate using the following commands:&lt;/p>
&lt;pre>&lt;code>```

openssl verify -CAfile /etc/ksa/certificates/CA.pem /etc/ksa/certificates/client.pem
openssl verify -CAfile /etc/ksa/certificates/CA.pem /etc/ksa/certificates/ws/server.pem

```

If the client or server certificate is signed by the provided CA certificate, then the certificate is valid. The message **OK** appears.
&lt;/code>&lt;/pre>
&lt;h2 id="verifying-the-purpose-of-a-certificate">Verifying the purpose of a certificate&lt;/h2>
&lt;p>You can verify if the certificate is a client, a server, or a CA certificate using the following command:&lt;/p></description></item></channel></rss>