Add DNS Resolution for CA Profile
The Certificate Management Protocol (CMP) request generated by the IdAM to the product PKI and/or CA is made via the Trust Service Adapter (TSA) network (default IP address 192.168.5.93). As IdAM version 1.0.0 does not currently include DNS (Domain Name Server) resolution on the TSA, establishing a connection via HTTPS to the PKI requires a TLS certificate on the PKI side (webserver, gateway, or proxy), allowing verification against the IP address instead of the DNS name.
The following covers how to extend the TSA to allow using server certificates with DNS names in the Common Name (CN).
- The change of the installation is limited exclusively to the TSA subsystem and is installed in the overlay operating system via a so-called additive. That is, the changed files of the system are stored in an archive file on the boot partition and are played over the original version at the earliest possible time during any future boot process.
- The process causes a service interruption lasting several minutes.
- Applying the patch requires no reconfiguration of the set process in the Sequence Controller.
Prerequisites
The following is required before you start.
- SSH access to the Sequence Controller network.
- IPv4 address of the DNS server in the TSA network.
- A patch file name
dnspatch.ta
r.
xz
and checksum:SHA256:6f9ea8d8ca5b4c4d8390319b60eff3a92eac2b5d77546cb263a9ef078a01e7ec
. To generate the dnspatch.tar.xz manually, copy the following command into a shell.Click to expand the patch file generation command...To generate the dnspatch.tar.xz manually, copy the following command (until EOF) into a shell. Once run, you will find the file dnspatch.tar.xz in your current directory. cat | base64 -d > dnspatch.tar.xz << EOF /Td6WFoAAATm1rRGAgAhARYAAAB0L+Wj4Hf/CeVdADecCto0aoe1SCl83t8TE7a4v NiVyP0J3qcMusjltN6nN8MBYOiV+ZESqlqUAJfy1oHoa6FqAtGlEZDAs+0XaVmGD8 Cx2LQQ4+PsUX/pWd3itPslzrZG2WQBUmc1drTYPY8oRU11B/XbhQc1ya13ujROJcP lcYrYORwW+euj6KL4Cvlc5viLf3VeCKMa0gHfRDloX12h2v9MoD0yLaNPrz/tFekC hI4AisIMDJrOPu56HbCtos1fMzdgh+7S3o0KVEUg3ycD5ZvpxNfZEzl1vGQKJAYSI dgP6fDxvbK2QmSomGYod78FDIeFniRyZsy0xK+0QsAujmHxUvE+DtNgBSSsevpBmX RL7AQQJ1wFBX884HNoyb6an0DfmTktEC3s+X3Lin+kDhK9yPk0R3VFXOmQNZf7nUl nKsvVDeIhTpbpzmSA3AKCn7WCH9Is2KSAXf7/rqHK4LIaT41UscQ89PV5FZjrgCRl Q8t/W3lvY/9BrDTE1xBQQScX12cmgUMHhRVK2WgPOgs5+So6bg9t4eaFejX3G46rw lCEHN3QZ/cD7qpDXcKamUqvMEMK1RSgDOas/u90IKbfOkwp8c1XmAZEn7BvK6CH4A cJ5egwkwf2ihbuDUqVFi+gQmnI6aZe/+4Yh6zm+kyNtsuBLc6jxeBwqQStZVsdJiv AnfLQxeXOR17SdviLU1oedb/6Z8q1nI71uqkowtNaWSSNOLidd65qpgjqPeYpe+T8 MfjCgv7KgZtGb6vuvAjAGtjZs++94sIPD5rRLct5dorVodC2G82Kz3iOmXxmWPliD 2tqhOFNJPW0GjK5959oYhiAorZSvxnXdQokwlCD6FMjUWUhoVOALVPcSeLwtua65b ICdeTWnaXdh5gZsmZL4WiE0R3EGP7l82He3EdLG9mZNjG6AfZXXlGFALjE/JaK3NG e/GrKvpbevDNBz26keHJn7Kg+uLKhCgOLrVAZVCZMzYPZ1D9rqVDb+kAlGVMEbfY9 q5AzDBwac9/QZuQjS61Z60E2dtpDpQCB7xtRd8Ps8ZGiSya7HQXHouSW7M5qXLB1P ef7RYG4R0Q2zxQZGiBYYuvIkXe0riUTr9LVDtZNibWPY/098C/pDflOIPrEV+Sm4N jvzK9u6ySXoQylSVkkioUh8rLQ+Y3HoOaChPP4blbqWhaRiC3W10DhMzeilW4J9va XOdd3fAhrTu6tOwDsE210QpP3PtBNeyGnhSNBvOrBErkeRZZQPnsjkDU7wiMbgyMp BKdxq+RWQzemSBl8YQ66a0YlhQYR5C0UzOPTYjeMBqEdist0vWCrfzQQAfjXx6pok BiirkzKTVXT9SDjvelk2xgkvnaru+6kibBCUTmjawSYMI6u+Hlkp+koR2h1/94aO0 quLKO69hD+kAwySFgtLyiaRp1aHTSSFto83AyVm1g+P4PN4brP/rNiFGLyDM96/yZ Q+8a89f/wfonR4W+HkCZ+m2JBS2bKTYTHQ61j4iM2Ytlr5uNdaRmwMBQ52j20GKR1 UqXip9Iwu5cOuXf90qWgGcmBjXzSAFi3/EY/1fwWDw/WSiiS0lpckVV6QsGRX/sFn zIfy/kDsMgkECI07ZM1iAvHeOmrrMQgq9W23Vu5bCwFtdylWBaKj1rv59VVD/c9S5 oIWVvNgf/O3fN5z3VbhNGpegEweCvH3r0ZL/qi4ztRNg+8EqVB4WYaEuXsxab5JAt xL72TGVsaOENa9LwvAie6Qrw8uhmRcvgbR89R9Z5v9Q1ZiB9rGkUhvvYaSPjSNDMw Ql0ekzqiHd1iKET0bWjwL+zX9KnXsqNZophCvvH1lBxnRt5SdvMap+eQO+FlAFKzB 1JVUoEtVkpR9c5RnP+yDH10VezKRws2f81Y6gu2JPWyhm9xtUiMFtvyGAuJt4YqMk iXY0Fo7Kw38Ti1Tmcv/9UcOu70cEWxHGpFpc+v/fw7/0/bca4KTdyoL4JxKwOc4aR QrUqKA8Js+dcYfRvoZDBH/LKGEFixPlGNJWbOXhW9cLSy3TCp6ZWW9jb09KX7DmOg sdGEbqmUz6DvuL52by14hXoKFz2e0lUaeIaFplKWaVqw/kUfOcE16UO1IUo3tlujW sAEcTTWT+ahhPdc3zzDw6HLP2d64clz0p2m+dHPd2HAJ3dhDhAbmy9g46ydocWPL2 aXSlFljBW/L+16z8MQ9iEoQiNts1dgIuHFTutoVy260SAQvSiQ8VNrNC28m8fpD2X +HyjYJWJ0FqtIUnhhEJ0d/ANuVa04KYzTfukDYxQmDXBHyeMDmq1JbFZabkdF9+j0 wH1wtwYS5IdEcXYQtyR0W0D51vIHAlgjmD45iEaKZ5UxFCTk4vnZapD0Szb4XVquT kYdTdc5OavohTfYQNbm78P+DwKsqAAk3UJOISFAeFj4chPUcpZiENdG1Am5J3UK51 vg9p6NqPsjR3ApRBeiwaOGRU2efvNtIie0ml1W0lWK6ZWkl0Oguvb01jW3I3SixeL V5xDlcP9eyZyHRzKtcgZbGOfcdZEfZSIP67ZW7RFz0LSleIdxCaYEyP+gWu5mvmLH /J7uWLJPS3isx5JKJSSSd0x9fZVzgFkbEWO3q194Ud/6q+1ITqQFWbbjT69NC9HuI 7C18CW396dGdouADEm70Phx83TnUOsUqQPz9xX8aaDKBnJ6NOFqBPORNx9Hw0CRbr Mn/ffURQRu2y7RZKzz/GBZNFBNy5i4Hojl/06fR3HrgSPSYMRKhoCgnqT5j1JFvAa V2pXZYYGxzvTzy2cDB+AD9y8xxjfzISuTUj+lu3kTuGTu3KeeRSQGXapjO7ghHt3h PvUQyB8tf9FfKVVTFDfwc7Eqb584VBH92l/NU6h4qRkNkWohOy4vvJjkXqCjHUSh/ R2jap+4KNSygKaxQEI6I294nFuSRqtEiXdMLtTCWMrrEsIxg89Nq6lf7dVkk7ViG0 Tj88bJvhH4WWGsTQTTA6/I80CJk0vmRboFzpfLBN+jLvc3vzwVU8UAYMY/o4xrVCh OUSx6OapSF0dHyaesPPfrOKAbWTDXXhgr47oYOAiPvIoi3fJWvlXmpL8Mz8esyA3r X/j2fcTOylV9xdhlX3s/wARo5C9xa0R+VLjgT/t5Irb8iTYgKVJ3y0tQN4ba5yOpM v3LoE6yLKhdybXRCC44FJYEmYp3kGGGyyuHhSSNvNCuknBebDaEet7Z4zSwndG/bD kB16OBq+4WfNIAjb9b8PEDd72O3f89kJfcd8vwjGvO53PXt0FuetxJmru2XL+aYTX 0DzLy6Za71S6WL31pku8UgVARu1vzBFeMabxHLkOcqW7QrDmlS5oPc+DvIJaGAOnn yCSL2Xp0XoZJbN4DpCpI8VhClj2XC4mNewryOQAAAAAAiRytmN1YIdUAAYEUgPABA EjWX8KxxGf7AgAAAAAEWVo= EOF
TEXT
Add DNS Resolution for CA Profile
To add DNS resolution for the CA profile:
- SSH to the TSA and access the Sequence Controller according to the following:
$ ssh idam@192.168.5.92 # default Password 'PrimeKey' $ sudo su - # get root privilege $ ssh - /root/.ssh/id_* root@100.127.255.4 # login to TSA; new prompt like: root@TrustServiceAdapter/100.127.255.4 [ ~ ]$
TEXT - Mount boot partition:
$ mount /dev/vda1 /mnt && ls -al /mnt # mount boot partition; out should look like this: root@TrustServiceAdapter/100.127.255.4 [ ~ ]$ mount /dev/vda1 /mnt && ls -al /mnt total 36 drwxr-xr-x 7 root root 4096 Sep 29 17:53 . drwxr-xr-x 21 root root 440 Sep 29 18:01 .. drwxr-xr-x 2 root root 4096 Sep 29 17:53 1 drwxr-xr-x 2 root root 4096 Sep 29 17:53 2 drwxr-xr-x 3 root root 4096 Sep 29 17:53 boot drwx------ 2 root root 16384 Sep 29 17:53 lost+found drwxr-xr-x 3 root root 4096 Sep 29 17:58 rw root@TrustServiceAdapter/100.127.255.4 [ ~ ]$
TEXT - Update the GRUB configuration:
$ vi /mnt/boot/grub/grub.cfg please change line: linux /1/vmlinuz-tsa console=tty0 console=ttyS0 ram=aram osarch=1/OS.tar.xz HWversion=2.0 rootdelay=5 root=UUID=bd5fcd23-5d9b-4343-b0da-9a419af0997a rw to linux /1/vmlinuz-tsa console=tty0 console=ttyS0 ram=aram osarch=1/OS.tar.xz HWversion=2.0 rootdelay=5 root=UUID=bd5fcd23-5d9b-4343-b0da-9a419af0997a rw additive=1/dnspatch.tar.xz and change : linux /2/vmlinuz-tsa console=tty0 console=ttyS0 ram=aram osarch=2/OS.tar.xz HWversion=1.0.0 rootdelay=5 root=UUID=6fb486c2-49b6-4773-a0c6-ac552fab3a6d rw to linux /2/vmlinuz-tsa console=tty0 console=ttyS0 ram=aram osarch=2/OS.tar.xz HWversion=1.0.0 rootdelay=5 root=UUID=6fb486c2-49b6-4773-a0c6-ac552fab3a6d rw additive=2/dnspatch.tar.xz # store file
TEXT - Generate a *.tar.xz file by copying the Base64 command block form above to your shell.
# copy file to mnt points enter command: $ cp dnspatch.tar.xz /mnt/1/dnspatch.tar.xz $ cp dnspatch.tar.xz /mnt/2/dnspatch.tar.xz # verify checksum sha256sum /mnt/1/dnspatch.tar.xz /mnt/2/dnspatch.tar.xz # result both times: 6f9ea8d8ca5b4c4d8390319b60eff3a92eac2b5d77546cb263a9ef078a01e7ec
TEXT - Release partition:
$ umount /mnt && ls -al /mnt # out should look like this: root@TrustServiceAdapter/192.168.5.93 [ ~ ]$ umount /mnt && ls -al /mnt total 0 drwxr-xr-x 2 root root 40 Sep 4 13:32 . drwxr-xr-x 21 root root 440 Oct 1 14:41 .. root@TrustServiceAdapter/192.168.5.93 [ ~ ]$
TEXT - Set DNS, for example, if you are using DNS Server Quad9 with the IP address 9.9.9.9, then add:
echo "nameserver 9.9.9.9" >/etc/resolv.conf
TEXTecho "nameserver 9.9.9.9" >/etc/resolv.conf echo "nameserver 149.112.112.112" >>/etc/resolv.conf
TEXT - Store the system configuration:
writeConfig.sh
TEXT - Reboot the TSA subsystem:
reboot
CODE - Complete the DNS resolution change by adding the DNS name in the CA profile by activating HTTPS in the CA Profile and enter the DNS Name as URL, see CA Configuration.