JBoss Community Archive (Read Only)

Latest WildFly Documentation

SSL Configuration using Elytron Subsystem

This document provides information how to configure mod_cluster subsystem to protect communication between mod_cluster and load balancer using SSL/TLS using Elytron Subsystem.

Overview

Elytron subsystem provides a powerful and flexible model to configure different security aspects for applications and the application server itself. At its core, Elytron subsystem exposes different capabilities to the application server in order centralize security related configuration in a single place and to allow other subsystems to consume these capabilities. One of the security capabilities exposed by Elytron subsystem is a Client ssl-context that can be used to configure mod_cluster subsystem to communicate with a load balancer using SSL/TLS.

When protecting the communication between the application server and the load balancer, you need do define a Client ssl-context in order to:

  • Define a trust store holding the certificate chain that will be used to validate load balancer's certificate

  • Define a trust manager to perform validations against the load balancer's certificate

Defining a Trust Store with the Trusted Certificates

To define a trust store in Elytron you can execute the following CLI command:

[standalone@localhost:9990 /] /subsystem=elytron/key-store=default-trust-store:add(type=JKS, relative-to=jboss.server.config.dir, path=application.truststore, credential-reference={clear-text=password})

In order to successfully execute the command above you must have a application.truststore file inside your JBOSS_HOME/standalone/configuration directory. Where the trust store is protected by a password with a value password. The trust store must contain the certificates associated with the load balancer or a certificate chain in case the load balancer's certificate is signed by a CA.

We strongly recommend you to avoid using self-signed certificates with your load balancer. Ideally, certificates should be signed by a CA and your trust store should contain a certificate chain representing your ROOT and Intermediary CAs.

Defining a Trust Manager To Validate Certificates

To define a trust manager in Elytron you can execute the following CLI command:

[standalone@localhost:9990 /] /subsystem=elytron/trust-manager=default-trust-manager:add(algorithm=PKIX, key-store=default-trust-store)

Here we are setting the default-trust-store as the source of the certificates that the application server trusts.

Defining a Client SSL Context and Configuring mod_cluster Subsystem

Finally, you can create the Client SSL Context that is going to be used by the mod_cluster subsystem when connecting to the load balancer using SSL/TLS:

[standalone@localhost:9990 /] /subsystem=elytron/client-ssl-context=modcluster-client-ssl-context:add(trust-manager=default-trust-manager)

Now that the Client ssl-context is defined you can configure mod_cluster subsystem as follows:

[standalone@localhost:9990 /] /subsystem=modcluster/mod-cluster-config=configuration:write-attribute(name=ssl-context, value=modcluster-client-ssl-context)

Once you execute the last command above, reload the server:

[standalone@localhost:9990 /] :reload

Using a Certificate Revocation List

In case you want to validate the load balancer certificate against a Certificate Revocation List (CRL), you can configure the trust-manager in Elytron subsystem as follows:

[standalone@localhost:9990 /] /subsystem=elytron/trust-manager=default-trust-manager:write-attribute(name=certificate-revocation-list.path, value=intermediate.crl.pem)

To use a CRL your trust store must contain the certificate chain in order to check validity of both CRL list and the load balancer`s certificate.

A different way to configure a CRL is using the Distribution Points embedded in your certificates. For that, you need to configure a certificate-revocation-list as follows:

/subsystem=elytron/trust-manager=default-trust-manager:write-attribute(name=certificate-revocation-list)

Using Online Certificate Status Protocol

In case you want to validate the certificate using Online Certificate Status Protocol (OCSP), you can configure the trust-manager in Elytron subsystem as follows:

[standalone@localhost:9990 /] /subsystem=elytron/trust-manager=default-trust-manager:write-attribute(name=online-certificate-status, value={})

This will configure the trust-manager to validate all (non-root) certificates against OCSP responder defined in Authority Info Access extension of validated certificates.

If you want to use your local OCSP responder for validation of all certificates, use:

[standalone@localhost:9990 /] /subsystem=elytron/trust-manager=default-trust-manager:write-attribute(name=online-certificate-status.responder, value="http://example.com/ocsp-responder")

If your responder does not have OCSP responder certificate signed by CA of validated certificates, you will need to add its certificate into key-store and reference it in the OCSP attribute:

[standalone@localhost:9990 /] /subsystem=elytron/trust-manager=default-trust-manager:write-attribute(name=online-certificate-status.key-store, value=ocsp-truststore)

In case of need, you can enable OCSP cache too:

[standalone@localhost:9990 /] /subsystem=elytron/trust-manager=default-trust-manager:write-attribute(name=online-certificate-status.cache-enabled, value=true)
[standalone@localhost:9990 /] /subsystem=elytron/trust-manager=default-trust-manager:write-attribute(name=online-certificate-status.cache-max-age, value=600000)
[standalone@localhost:9990 /] /subsystem=elytron/trust-manager=default-trust-manager:write-attribute(name=online-certificate-status.cache-max-entries, value=100)
JBoss.org Content Archive (Read Only), exported from JBoss Community Documentation Editor at 2020-03-13 13:33:41 UTC, last content change 2018-08-10 09:54:41 UTC.