You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: product_docs/docs/pem/10/certificates/regenerating_agent_certificates.mdx
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,17 +6,17 @@ redirects:
6
6
---
7
7
8
8
!!! Important
9
-
These steps are automatically performed by default when the certificates are nearing expiry.
10
-
These instructions are provided for completeness incase you need to manually regenerate the PEM certificates and keys.
9
+
PEM performs these steps by default when the certificates are nearing expiry.
10
+
These instructions are provided for completeness in case you need to manually regenerate the PEM certificates and keys.
11
11
!!!
12
12
13
13
You need to regenerate the agent certificates and key files:
14
-
- If the PEM server certificates are regenerated
15
-
- If the PEM agent certificates are near expiring
14
+
- If the PEM server certificates are regenerated.
15
+
- If the PEM agent certificates are near expiring.
16
16
17
17
You must regenerate a certificate and a key for each agent interacting with the PEM server and copy it to the agent.
18
18
19
-
Each agent has a unique identifier that's stored in the pem.agent table of the pem database. You must replace the certificate and key files with the certificate or key files that corresponds to the agent's identifier.
19
+
Each agent has a unique identifier that's stored in the pem.agent table of the `pem` database. You must replace the certificate and key files with the certificate or key files that correspond to the agent's identifier.
20
20
21
21
Prerequisites:
22
22
- PEM server has certificates.
@@ -66,9 +66,9 @@ To generate a PEM agent certificate and key file pair:
66
66
67
67
Where `-req` indicates the input is a CSR. The `-CA` and `-CAkey` options specify the root certificate and private key to use for signing the CSR.
68
68
69
-
Before generating the next certificate and keyfile pair, move the `agent.key` and `agent.crt` files generated in the steps 2 and 4 on their respective PEM agent host.
69
+
Before generating the next certificate and key-file pair, move the `agent.key` and `agent.crt` files generated in steps 2 and 4 on their respective PEM agent host.
70
70
71
-
6. Change the permission on the new `agent<ID>.crt` and `agent<ID>.key`file:
71
+
6. Change the permission on the new `agent<ID>.crt` and `agent<ID>.key`files:
Where `-subj` is provided as per your requirements. You define `CN`asthe hostname/domain name of the PEM server host.
108
+
Where `-subj` is provided as per your requirements. You define `CN`as the hostname/domain name of the PEM server host.
109
109
110
-
1. Use the `openssl x509` command to sign the CSR and generate a server certificate. Move the `server.crt` to the data directory of the backend database server:
110
+
1. Use the `openssl x509` command to sign the CSR and generate a server certificate. Move `server.crt` to the data directory of the backend database server:
| MFA_ENABLED | Set to `true` to enable the two-factor authentication. Default value is `false`. |
20
+
| MFA_ENABLED | Set to `true` to enable two-factor authentication. Default value is `false`. |
21
21
| MFA_FORCE_REGISTRATION | Set to `true` to ask the users to register forcefully for the two-factor authentication methods at login. Default value is `false`. |
22
22
| MFA_SUPPORTED_METHODS | Set to `email` to use the email authentication method (send a one-time code by email) or `authenticator` to use the TOTP-based application authentication method. |
23
23
| MFA_EMAIL_SUBJECT | Set to the subject of the email for email authentication. Default value is `<APP_NAME> - Verification Code`. |
@@ -28,7 +28,7 @@ To use the email authentication method, you need to configure mail server settin
28
28
29
29
PEM server can send an email using either the SMTP configurations saved in the PEM configuration or using Flask-Mail.
30
30
31
-
To send the email verification code using the internal SMTP configuration from the PEM configuration, set the parameter `MAIL_USE_PEM_INTERNAL` to `True`. If set to `False`, the following mail configuration is used to send the code on the user-specified email address:
31
+
To send the email verification code using the internal SMTP configuration from the PEM configuration, set the parameter `MAIL_USE_PEM_INTERNAL` to `True`. If set to `False`, the following mail configuration is used to send the code to the user-specified email address:
Copy file name to clipboardExpand all lines: product_docs/docs/pem/10/considerations/authentication_options/configuring_the_pem_server_to_use_kerberos_authentication.mdx
+15-15Lines changed: 15 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,17 +13,17 @@ You can configure Kerberos authentication for the PEM server. The Kerberos serve
13
13
- PEM server (PEM web server and PEM backend database server)
14
14
- Client machine
15
15
16
-
For example, if the realm on Kerberos server is `edbpem.org`, then you can set the Kerberos server hostname to `Krb5server.edbpem.org`, the PEM server hostname to `pem.edbpem.org`, and the client's hostname to `pg12.edbpem.org`.The convention is to use the DNS domain name as the name of the realm.
16
+
For example, if the realm on Kerberos server is `edbpem.org`, then you can set the Kerberos server hostname to `Krb5server.edbpem.org`, the PEM server hostname to `pem.edbpem.org`, and the client's hostname to `pg12.edbpem.org`.The convention is to use the DNS domain name as the name of the realm.
17
17
18
18
## 1. Install Kerberos, the PEM server, and the PEM backend database
19
19
20
-
Install Kerberos on the machine that functions as the authentication server. Install the PEM server on a separate machine. For more information, see [Installing the PEM Server](../../installing/).
20
+
Install Kerberos on the machine that functions as the authentication server. Install the PEM server on a separate machine. For more information, see [Installing the PEM server](../../installing/).
21
21
22
-
Install the PEM backend database (Postgres/EDB Postgres Advanced Server) on the same machine as the PEM server or on a different one. For more information, see the Installation steps on [EDB Docs website](https://www.enterprisedb.com/docs).
22
+
Install the PEM backend database (Postgres/EDB Postgres Advanced Server) on the same machine as the PEM server or on a different one. For more information, see the installation steps on [EDB Docs website](https://www.enterprisedb.com/docs).
23
23
24
24
## 2. Add principals on Kerberos server
25
25
26
-
Add the principals for the PEM web application deployed under an Apache web server (HTTPD/Apache2) and the PEM Backend Database Server (PostgreSQL/EDB Postgres Advanced Server).
26
+
Add the principals for the PEM web application deployed under an Apache web server (HTTPD/Apache2) and the PEM backend database server (PostgreSQL/EDB Postgres Advanced Server).
@@ -109,7 +109,7 @@ Restart the database server to reflect the changes:
109
109
systemctl restart <POSTGRES_SERVICE_NAME>
110
110
```
111
111
112
-
`POSTGRES_SERVICE_NAME` is the service name of the Postgres (PostgreSQL/EDB Postgres Advanced Server) database, for example, `postgresql-13` for PostgreSQL 13 database on a `RHEL` or Rocky Linux platforms.
112
+
`POSTGRES_SERVICE_NAME` is the service name of the Postgres (PostgreSQL/EDB Postgres Advanced Server) database, for example, `postgresql-13` for PostgreSQL 13 database on a `RHEL` or Rocky Linux platform.
113
113
114
114
## 5. Obtain and view the initial ticket
115
115
@@ -125,10 +125,10 @@ $ kinit <USERNAME@REALM>
125
125
$ klist
126
126
```
127
127
128
-
It displays the principal along with the Kerberos ticket.
128
+
These commands display the principal along with the Kerberos ticket.
129
129
130
130
!!! Note
131
-
The `USERNAME@REALM` specified here must be a database user having the pem_admin role and CONNECT privilege on `pem` database.
131
+
The `USERNAME@REALM` specified here must be a database user having the pem_admin role and CONNECT privilege on the `pem` database.
132
132
133
133
## 6. Configure the PEM server
134
134
@@ -158,13 +158,13 @@ If the PEM server uses Kerberos authentication:
158
158
159
159
- All the authenticated user principals are appended with the realm (USERNAME@REALM) and passed as the database user name by default. To override the default, in the `config_local.py` file, add the parameter `PEM_USER_KRB_INCLUDE_REALM` and set it to `False`.
160
160
161
-
- Restart the Apache server
161
+
- Restart the Apache server:
162
162
163
163
```shell
164
164
sudo systemctl restart <SERVICE_NAME>
165
165
```
166
166
167
-
- Edit the entries at the top of `pg_hba.conf` to use the gss authentication method, and reload the database server.
167
+
- Edit the entries at the top of `pg_hba.conf` to use the gss authentication method, and reload the database server:
168
168
169
169
```shell
170
170
host pem +pem_user <ip_of_pem_server>/32 gss
@@ -178,25 +178,25 @@ If the PEM server uses Kerberos authentication:
178
178
`POSTGRES_SERVICE_NAME` is the service name of the Postgres (PostgreSQL/EDB Postgres Advanced Server) database, for example, `postgresql-13` for PostgreSQL 13 database on a `RHEL` or Rocky Linux platforms.
179
179
180
180
!!! Note
181
-
If you're using PostgreSQL or EDB Postgres Advanced Server 12 or later, then you can specify connection type as `hostgssenc` to allow only gss-encrypted connection.
181
+
If you're using PostgreSQL or EDB Postgres Advanced Server 12 or later, you can specify the connection type as `hostgssenc` to allow only gss-encrypted connections.
182
182
183
183
184
184
## 7. Browser settings
185
185
186
-
Configure the browser on the client machine to access the PEM web client to use the Spnego/Kerberos.
186
+
Configure the browser on the client machine to access the PEM web client to use Spnego/Kerberos.
187
187
188
188
For Mozilla Firefox:
189
189
190
190
1. Open the low-level Firefox configuration page by loading the `about:config` page.
191
191
1. In the search box, enter `network.negotiate-auth.trusted-uris`.
192
-
1. Double-click the `network.negotiate-auth.trusted-uris` preference and enter the hostname or the domain of the web server that's protected by Kerberos HTTP SPNEGO. Separate multiple domains and hostnames with a comma.
192
+
1. Double-click the `network.negotiate-auth.trusted-uris` preference and enter the hostname or the domain of the web server that's protected by Kerberos HTTP SPNEGO. Separate multiple domains and hostnames with commas.
193
193
1. In the search box, enter `network.negotiate-auth.delegation-uris`.
194
-
1. Double-click the `network.negotiate-auth.delegation-uris` preference and enter the hostname or the domain of the web server that's protected by Kerberos HTTP SPNEGO. Separate multiple domains and hostnames with a comma.
194
+
1. Double-click the `network.negotiate-auth.delegation-uris` preference and enter the hostname or the domain of the web server that's protected by Kerberos HTTP SPNEGO. Separate multiple domains and hostnames with commas.
195
195
1. Select **OK**.
196
196
197
197
For Google Chrome on Linux or MacOS:
198
198
199
-
- Add the `--auth-server-whitelist` parameter to the `google-chrome` command. For example, to run Chrome from a Linux prompt, run the`google-chrome` command as follows:
199
+
- Add the `--auth-server-whitelist` parameter to the `google-chrome` command. For example, to run Chrome from a Linux prompt, use this`google-chrome` command:
Copy file name to clipboardExpand all lines: product_docs/docs/pem/10/considerations/authentication_options/configuring_the_pem_server_to_use_windows_kerberos_server.mdx
The Windows Active Directory domain service works with hostnames and not with IP addresses. To use single sign-on in PEM Server using Active Directory domain services, configure the following machines with hostnames using the DNS:
8
+
The Windows Active Directory domain service works with hostnames and not with IP addresses. To use single sign-on in PEM server using Active Directory domain services, configure the following machines with hostnames using the DNS:
9
9
10
10
- Windows server (domain controller)
11
11
- PEM server (PEM web server and PEM backend database server)
@@ -33,15 +33,15 @@ Create users in Active Directory of the Windows server to map with the HTTP serv
33
33
34
34
1. Enter the user details.
35
35
36
-
1.Give the password and make sure to clear **User must change password at next logon**. Also select **User cannot change password** and **Password never expires**.
36
+
1.Enter the password and make sure to clear **User must change password at next logon**. Also select **User cannot change password** and **Password never expires**.
37
37
38
38
1. Review the user details.
39
39
40
40
1. On the PEMServer Web Properties dialog box, add the users as members of the Domain Users group:
41
41
42
42

43
43
44
-
1. Create the user (for example, pemserverdb) in Active Cirectory of the Windows server to map with the Postgres service principal for the PEM backend database.
44
+
1. Create the user (for example, pemserverdb) in Active Directory on the Windows server to map with the Postgres service principal for the PEM backend database.
45
45
46
46
## 3. Extract key tables from Active Directory
47
47
@@ -98,7 +98,7 @@ Extract the key tables for the service principals and map them with the respecti
98
98
99
99
## 4. Configure the PEM backend database server
100
100
101
-
Add the key table location in the `postgresql.conf` file.
101
+
Add the key table location in the `postgresql.conf` file:
In the `config_setup.py` file, configure `PEM_DB_HOST` and check that the value of `PEM_AUTH_METHOD` is set to `'kerberos'`.
163
+
In the `config_setup.py` file, configure `PEM_DB_HOST` and check that the value of `PEM_AUTH_METHOD` is set to `'kerberos'`:
164
164
165
165
```shell
166
166
$ sudo vim <PEM_INSTALLATION_DIRECTORY>/share/web/config_setup.py
167
167
PEM_DB_HOST=`pem.edbpem.internal`
168
168
```
169
169
170
-
Configure `HOST` in the `.install-config` file.
170
+
Configure `HOST` in the `.install-config` file:
171
171
172
172
```shell
173
173
$ sudo vim <PEM_INSTALLATION_DIRECTORY>/share/.install-config
@@ -186,7 +186,7 @@ Restart the Apache server:
186
186
sudo systemctl restart <SERVICE_NAME>
187
187
```
188
188
189
-
Edit the entries at the top in `pg_hba.conf` to use the gss authentication method. Then reload the database server.
189
+
Edit the entries at the top in `pg_hba.conf` to use the gss authentication method. Then reload the database server:
190
190
191
191
```shell
192
192
host pem +pem_user <ip_of_pem_server>/32 gss
@@ -200,11 +200,11 @@ Edit the entries at the top in `pg_hba.conf` to use the gss authentication metho
200
200
`POSTGRES_SERVICE_NAME` is the service name of the Postgres (PostgreSQL/EDB Postgres Advanced Server) database, for example, `postgresql-13` for PostgreSQL 13 database on RHEL or Rocky Linux platforms.
201
201
202
202
!!! Note
203
-
You can't specify the connection type as `hostgssenc`. Windows doesn't support gssencrypted connection.
203
+
You can't specify the connection type as `hostgssenc`. Windows doesn't support gss-encrypted connections.
204
204
205
205
## 7. Browser settings
206
206
207
-
Configure the browser on the client machine to access the PEM web client to use the Spnego/Kerberos.
207
+
Configure the browser on the client machine to access the PEM web client to use Spnego/Kerberos.
208
208
209
209
For Mozilla Firefox:
210
210
@@ -217,7 +217,7 @@ For Mozilla Firefox:
217
217
218
218
For Google Chrome on Linux or MacOS:
219
219
220
-
- Add the `--auth-server-whitelist` parameter to the `google-chrome` command. For example, to run Chrome from a Linux prompt, run the`google-chrome` command as follows:
220
+
- Add the `--auth-server-whitelist` parameter to the `google-chrome` command. For example, to run Chrome from a Linux prompt, use this`google-chrome` command:
0 commit comments