SSL Communications

This section describes how to handle SSL communications between the different components of the architecture.

For purposes of confidentiality and data integrity, communication between the different components of the architecture can be secured using SSL V3.

The minimum versions of components that support SSL are:

Only communications between the UVMS nodes and with an external database cannot be secured by SSL.

Architecture

The architecture can be represented as follows:

Figure 10 : Architecture SSL

In this architecture: each server

Each client and each server must have confidence in the certificate authority that signed the certificate.

Certificates

Server certificate:

Originally X509 certificates were generated for a specific hostname. The name of the machine is defined in the "Security Principal" field of the certificate.

For example:

CN=frwpmdev13.automic.com,O=AUTOMIC Software GmbH,L=PARIS,C=FR

However it's possible to define a certificate that is valid for several domains, for example to reduce the cost of the certificates.

CA Certificate:

Certificate chains can be managed by adding additional CA certificates.

Operation

All certificates delivered to servers on the same declared UVMS must be signed by the same certificate authority.

All certificates must be the Web Server type.

It is assumed that all client applications (UVC standalone or webstart, UVMS commands and Reporter commands) trust the same certificate authority.

When a client communicates with an SSL server, it must trust the certificate authority that signed the certificate:

Certificates with limited validity must be removed before their expiration in order not to disrupt communications and new certificates shall be installed.

As of version 6.10.41, documentation new updates are posted on the Broadcom Techdocs Portal.
Look for Dollar Universe.