Go to primary content
Siebel CRM Siebel Security Guide
Siebel Innovation Pack 2016, Rev. A
E24814-01
  Go to Documentation Home
Home
Go To Table Of Contents
Contents
Go To Index
Index

Previous
Previous
 
Next
Next
    View PDF

About Certificates and Key Files Used for TLS Authentication

When you configure TLS authentication for a Siebel Enterprise, Siebel Server, or SWSE, you specify parameter values that indicate the names of certificate files, certificate authority files, and private key files on the computers that host these components. The certificate files you use for this purpose can be issued by and obtained from third-party certificate authorities. Certificate authority files identify the third-party certificate authority who issued the certificate.

Certificate files must adhere to the following requirements:

Certificate files and private key files are typically installed on each computer that hosts a component or module for which you configure TLS, such as a Siebel Server or SWSE. You do not have to authenticate or encrypt communications between components on the same computer. For information on installing certificate files, see "Installing Certificate Files".

About Supported Values for Certificate Encryption Keys

A certificate authority certifies ownership of the public and private key pairs that are used to encrypt and decrypt TLS communications. Messages are encrypted with the public key and decrypted with the private key. The certificate key size refers to the size, in bits, of the encryption key provided with the certificate.

In general, for TLS authentication for a Siebel Enterprise, Siebel Server, or SWSE, Siebel Business Applications support certificates that use an encryption key size of 1024 bits. If you require a higher encryption key size, for example, 2048 or 4096 bits, then you must use Siebel Strong Encryption.

The size of the certificate key supported depends on the components for which you are configuring TLS communications. Table 4-1 shows the certificate key sizes supported for communications between different components in a Siebel Business Applications deployment.

Table 4-1 Encryption Key Sizes Supported For TLS Certificates

TLS Communication Type Supported Key Size

TLS communications using SISNAPI.

Communications between the Siebel Server and the Web server (SWSE), and between Siebel Servers.

1024-bit certificate keys only are supported by default.

To use certificate key sizes larger than 1024 bits, for example, 2048-bit or 4096-bit keys, you must follow the instructions in "Increasing the Certificate Key Sizes Supported For SISNAPI Communications".

TLS communications between Web clients and the Web server.

The acceptable protocols and key sizes are determined by the underlying operating system and Web server software. In most cases, these systems support larger private key sizes.

TLS communications between developer clients (including Siebel Tools) and components in the Siebel environment.

1024-bit certificate keys only are supported.

TLS communications between the Siebel Server and the Siebel database.

The key size supported is determined by the third-party database used and database client software.

TLS communications between Siebel security adapters and external directory servers.

These connections can support larger bit sizes for certificate keys.

TLS communications for Web services.

Web services support up to 4096-bit certificate keys.


Increasing the Certificate Key Sizes Supported For SISNAPI Communications

For TLS authentication for Siebel Enterprise, Siebel Server, or SWSE communications, Siebel Business Applications support certificates that use an encryption key size of 1024 bits. If you want to use certificates with larger encryption key sizes, for example, certificates that use 2048-bit or 4096-bit encryption keys, then perform the steps in the following procedure.

To increase the certificate key sizes supported for SISNAPI communications 

  1. Navigate to the directory where the Siebel Strong Encryption (SSE) files were installed on the Siebel Server, Siebel Gateway Name Server, or the Web server:

    • Web server

      • Windows: \SWEAPP_ROOT\BIN\SSEP

      • UNIX: SWEAPP_ROOT/BIN/SSEP

      where SWEAPP_ROOT is the Siebel Web Server Extension installation directory.

    • Siebel Server or Siebel Gateway Name Server

      • Windows: COMPONENT_ROOT\BIN\SSEP

      • UNIX: COMPONENT_ROOT/LIB/SSEP

      where COMPONENT_ROOT is either the Siebel Server installation directory or the Gateway Name Server installation directory.

    For additional information, see "Implementing Siebel Strong Encryption".

  2. Copy the sslcnapi128 file from the SSEP directory to the directory where the sslcnapi file is located on the Siebel Server, Gateway Name Server, or the Web server as appropriate. The sslcnapi file is located as follows:

    • Web server

      • Windows: SWEAPP_ROOT\BIN\sslcnapi.dll

      • UNIX: SWEAPP_ROOT/BIN/sslcnapi.so

    • Siebel Server or Gateway Name Server

      • Windows: component\BIN\sslcnapi.dll

      • UNIX: component/lib/libsslcnapi.so

  3. Rename the sslcnapi128 file to either sslcnapi or libsslcnapi to replace the existing sslcnapi file.