The Security Proxy Server provides token-based access control and encrypted network traffic to and from user workstations. This article walks through the steps configure and deploy secure sessions using the Security Proxy.
Steps at a glance:
Use the automated installer to install and configure the Security Proxy Server. The Security Proxy can be installed on a different machine. Refer to the Management and Security Server Installation Guide for detailed steps.
NOTE: If you are not able to use the automated installer, contact Support for guidance.
Be sure to check the Security Proxy Server’s System Requirements and the Performance and Scaling Requirements.
Next step: Configure and Start the Security Proxy Server.
The Security Proxy Server must be configured to establish trust with the Management and Security Server (MSS). Use the Security Proxy Wizard to manage your Security Proxy settings and certificates.
Specifically, the Security Proxy Wizard:
generates or imports the certificate used to authenticate the Security Proxy Server.
sets up a server.properties file that contains information about each security proxy connection.
imports the certificate from the Administrative Server -- if you are using authorization to determine access levels.
NOTE:If you installed the Security Proxy using the automated installer, the Security Proxy Server is configured and started, and you can skip to Import the Security Proxy certificates.
Run the Security Proxy Wizard later to change settings or manage certificates.
Start the Security Proxy Wizard, according to where you installed the product.
On Windows: run [MssServerInstall]\securityproxy\bin\SecurityProxyServerWizard.exe
On Linux or UNIX:
The Security Proxy Wizard requires an X11 window to display its graphical interface. Use the console of an X window or an X session, and open a terminal window.
Run the executable:
[MssServerInstall]/securityproxy/bin/SecurityProxyServerWizard
The wizard opens with the Status tab in focus. Choose whether to open an existing server.properties file or to create a new one for this Security Proxy server.
Refer to the Help on each tab for more information.
On the Trusted Certificates tab, Import the Management and Security Server certificate.
On the Proxies tab, Add or Modify a proxy.
On the Security Proxy Certificates) tab, Generate or Import a security proxy certificate.
Return to the Proxies tab and click Export Settings to export the settings to the Administrative Server.
Specify or accept the default Administrative Server, Port, and Context. Click Export.
To verify that the server.properties is configured, return to the Status tab.
Click Exit to close the wizard and save your settings. You may need to restart the Security Proxy service.
To make changes to the Security Proxy settings later, simply re-run the Security Proxy Wizard.
Next step: Start the Security Proxy Server.
If the automated installer was used to install the Security Proxy on the same machine as the Administrative Server, the Security Proxy Server has been started. Continue with 3. Import the Security Proxy certificates.
If a non-automated installation method was used, you must start the Security Proxy Server.
After a server.properties file is configured for the Security Proxy Server, start the Security Proxy Server:
On Windows
Or, run: [MssServerInstall]\securityproxy\bin\MssSecurityProxy.exe
To start or stop the service, open Windows Control Panel > Administrative Tools > Services, and select Security Proxy.
Note: When the automated installter is used, you can choose to install the servlet runner as a Windows service, in which case the servlet runner starts automatically.
On UNIX and Linux
For UNIX and Linux platforms, you can start and stop the service at run level changes using the method that is appropriate to your platform. Use -start and -stop parameters for the security proxy.
Or, run: [MssServerInstall]/securityproxy/bin/MssSecurityProxy
Note: When the automated installer is used, a link to the services is created in
/etc/init.d
Command line options
You can use these commands on all platforms to start and stop the Security Proxy:
securityproxy -start
securityproxy -stop
securityproxy -status
To install as a service:
Change to your MSS install directory.
Then use a parameter.
On Windows:
On Linux or UNIX:
Use the daemon appropriate to your platform for installing or uninstalling the servlet runner as a service.
MssSecurityProxy start
Note: The administrator must configure init scripts to start the Security Proxy server on startup.
Next step: Import the Security Proxy certificates.
When the Security Proxy and terminal sessions are configured to run in FIPS-approved mode, all connections are made using security protocols and algorithms that meet FIPS 140-2 standards.
The updated cryptomodules (since Management and Security Server 12.4 SP1) require a new setting for FIPS-approved mode. You must manually edit the Security Proxy properties file to run in FIPS-approved mode.
If you are upgrading from a version that used fipsMode=approved, the new property is not automatically enabled and must be manually configured.
Open mss\securityproxy\conf\server.properties.
In the FIPS 140-2 Mode section, add or set the fipsApprovedMode= setting to on:
fipsApprovedMode=on
Restart the Security Proxy server.
Once the Security Proxy is installed and configured, open Management and Security Server to import the Security Proxy settings.
Open the Administrative Console > Configure Settings - Security Proxy panel.
Click +Import and enter the required information. See Help for assistance.
To delete a Security Proxy server, check its box, and click Action > Delete.
Next step: Create Secure Sessions.
After the trust relationship is set between the Management and Security Server and Security Proxy, you can create secure sessions for your users.
In Administrative Console, open Manage Sessions, and click + Add.
Select your Product (and Session type, if needed), and enter a Session name.
Launch the session.
As administrator, open the Connection Setup (or Connection Settings) dialog. You may need to Disconnect first.
NOTE:The dialog labels vary, depending on your emulator product. Refer to the product documentation for details.
Click the option to Use TLS/SSL security.
Choose TLS v1.2, TLSv1.1, or TLS v1. (If you upgraded from a version that used TLS 1.0-1.2, all three are checked.)
(The versions may be listed as TLS 1.2, TLS 1.0.)
Check Use Security proxy.
Select a Security proxy server and a Proxy port for this session.
Enter the Destination host and the Destination port.
If you check End-to-end encryption, the connection between the Security Proxy and the host will use TLS. Otherwise, that connection is not encrypted.
Click OK. Close the session, and click Save/Exit to send the settings to the Management and Security Server.
Next step: Assign Secure Sessions.
Now you can enable user access to the secure sessions.
In the Administrative Console, open Assign Access.
Search for and click the user or group who should have access to the secure session.
Check the Session that is configured to use the Security Proxy.
Click Apply.
Deploy sessions to users.
Next step: After the sessions have been opened and used, you can Run Reports to view the activity.
In the Administrative Console, open Run Reports - Security Proxy to view the activity from your Security Proxy servers. See the Run Reports - Security Proxy Server Reports Help for more information.
When you upgrade Management and Security Server, note these requirements for the Security Proxy.
The <major>.<minor> version of the Security Proxy must be the same as Management and Security Server.
Be sure to download the upgraded Security Proxy activation file and run it with the automated installer. Or, install the activation file and activate the server. Refer to the Management and Security Server Installation Guide.
If Security Proxy is installed when you upgrade from Management and Security Server 12.4 to a later version (including updates and service packs), complete these steps to be sure the Security Proxy server is synchronized with the MSS Administrative Server.
After you upgrade:
Open the Security Proxy Wizard (from the Start menu).
On the Proxies tab, review the configuration for each port, and click Save.
Note the Cipher Suites and Certificates:
Multiple cipher suites of the same key type can use the same certificate.
Management and Security Server automatically selects the certificate to use with the associated cipher suite. The selection is based on longest expiration date and other properties. For example:
To select a different certificate for a particular port:
Click the Proxies tab > Modify.
Note (or change) the selected cipher suites.
Select an RSA certificate or DSA certificate for that type of cipher suite. Click OK.
On the Proxies tab, click Save.
Click Export > Settings > Export to send the settings to the MSS Administrative Server.
Management and Security Server Technical Resources
Management and Security Server Installation Guide
Security Proxy Wizard (Open from the Start menu)
Management and Security Server Administrative Console - Help: