Enable Transport Security

Enable Transport Security

To enable transport security (SSL) in the dab:Exporter server you need to have a PKCS#12 (PFX) file. This file must be imported in the certificate store on the server where the dab:Exporter server is installed and the user running the dab:Exporter Windows service has to have access to this certificate. Moreover you have edit the dab:Exporter server configuration file. Furthermore all clients have to trust this or a superior certificate in order for the clients to connect to the dab:Exporter server using transport security.

Reuse Analytic Exchange by Galvanize certificate

If there is an Analytic Exchange by Galvanize installation on the same computer on which the dab:Exporter is installed you can reuse the certificate of Analytic Exchange by Galvanize. In order to reuse the certificate you have to convert it into the PKCS#12 format.

Open a Command Prompt as administrator by searching for cmd.exe

Click on Yes

Change to the bin directory of a Java installation (JRE or JDK). Typical locations for Java installations with Analytic Exchange by Galvanize are (please note that the version numbers might differ)

  • C:\Program Files (x86)\ACL Software\JDK\jdk1.8.0_101\jre\bin
  • C:\Program Files (x86)\ACL Software\JRE\jre1.8.0_121\bin

Enter following command

keytool.exe -importkeystore -srckeystore KEYSTORE_FILE_LOCATION -srcstoretype JKS -srcstorepass PASSWORD -destkeystore PKCS_12_FILE.pfx -deststoretype PKCS12 -deststorepass PASSWORD

KEYSTORE_FILE_LOCATION: default c:\acl\app\keystores\mykeystore

PASSWORD: can be obtained from the server.xml (default: c:\ACL\App\Tomcat\conf)

PKCS_12_FILE: In this manual c:\certs\exporter is used

Import certificates

The first steps are identical for the certificates which have to be installed on the server and on the client. Later they differ in which type of certificate has to be installed.

Open the Microsoft Management Console by searching for mmc.exe

Click in the User Account Control dialogue Yes

Click on File and then Add/Remove Snap-in…

Scroll to Certificates and klick on Add >

Select Computer account and klick on Next >

Click on Finish

Click on OK

Server (PFX) certificate

This certificate must only be imported on the computer on which the dab:Exporter Server is installed!

Open the Certificates node and right click on Personal. There you have to select All Tasks and then Import…

Click on Next

Click on Browse…

Navigate to the location where the certificate is stored. Then change the file filter to Personal Information Exchange (*.pfx; *.p12)

Select the certificate and click on Open

Click on Next

Enter the password for the private key and click on Next

Ensure that the certificate store is set to Personal and click on Next

Click on Finish

Accept the dialogue with OK

Server certificate (CER) self-signed or custom CA

This certificate must be imported on every computer where the dab:Exporter Client is installed as well as on the dab:Exporter Server!

Open the Certificates node and right click on Trusted Root Certification Authorities. Then select All Tasks and click on Import…

Click on Next

Click on Browse…

Select the folder in which the certificate is located, select the certificate and click on Open

Click on Next

Ensure that Trusted Root Certification Authorities is selected and click on Next

Then click on Finish

Click on OK

Set certificate access for dab:Exporter Server

In the Microsoft Management Console add the certificate snap-in for the Local Computer. Then open the Certificates and Personal node and select Certificates. On the middle screen right click on the server certificate and select All Tasks and then click on Manage Private Keys…

Click on Add…

Enter the name of the user of the dab:Exporter Windows Service (default NETWORK SERVICE). Click on Check Names and then on OK

Click on Apply and then on OK

Configure dab:Exporter Server for Transport Security

To enable transport security you need to change entries in the file dabExporter.Core.dll.config which is located in the installation directory of the dab:Exporter server (default C:\Program Files (x86)\dabGmbH\dabExporter 3.2\Server).

You need to change the value of UseTransportSecurity to true and enter the thumbprint of the certificate in CertificateThumbprint.

<?xml version="1.0" encoding="utf-8" ?>
<configuration>
<appSettings>
<add key="ConfigFolder" value="%public%/dabgmbh/dabexporter 3.2/data"/>
<add key="LogFolder" value="%public%/dabgmbh/dabexporter 3.2/log"/>
<add key="WorkingFolder" value="%public%/dabgmbh/dabexporter 3.2/work"/>
<add key="BindTo" value="0.0.0.0"/>
<add key="ApiPort" value="1588"/>
<add key="MessagingPort" value="1589"/>
<add key="UseTransportSecurity" value="true"/>
<add key="CertificateThumbprint" value="77299757ffa2aeaeea7523d5878cc461a8029911"/>
<add key="UseCustomServiceThrottling" value="false"/>
<add key="MaxConcurrentSessions" value="100"/>
<add key="MaxConcurrentCalls" value="32"/>
<add key="MaxConcurrentInstances" value="132"/>
</appSettings>
</configuration>

The value of the certificate thumbprint must only contain visible characters, i.e. no whitespaces!
For the changes to take effect you have to restart the dab:Exporter Windows Service.

Obtain Thumbprint of certificate

In the Microsoft Management Console add the certificate snap-in for the Local Computer. Then open the Certificates and Personal node and select Certificates. On the middle screen right click on the server certificate and select Open

In the certificate window select the Details tab, scroll down Thumbprint and select it. The complete thumbprint is shown in the box below and can be copied to the clipboard.


How did we do?


Powered by HelpDocs (opens in a new tab)

Powered by HelpDocs (opens in a new tab)