ISR Certificates
Many ISR services are configured for more secure requests via HTTPS, including:
- ISR Dashboard
- ISR FACE
- Recorder REST Webservice
- Converter REST Webservice
- RSS Java API
To access these services, the clients you use must have either public keys or certificates, which are generated at installation time, or negotiated through a public key exchange. Public keys and certificates can be found in the locations described below.
Public Key Location | Description | Key Technology |
---|---|---|
/opt/isr/security/keys/rss_cert.pem
|
Certificate for ISR components to connect to RSS REST services | OpenSSL SHA256 RSA Key/ X509 Self-signed certificate |
/opt/isr/security/keys/isr.key
|
Private key for ISR component communications | N/A |
/opt/isr/security/keys/israpi-public.key
|
Public certificate for ISR API | Java keytool created RSA Key/Certificate |
/opt/isr/security/keys/tomcat.keystore
|
Keystore for ISR Java applications on the RSS | N/A |
Public Key Location | Description | Key Technology |
---|---|---|
/opt/isr/security/keys/puma.crt
|
Certificate file | OpenSSL DES3 RSA Key/ X509 Self-signed certificate |
/opt/isr/security/keys/isr.key
|
Private key for ISR component communications | N/A |
Public Key Location | Description | Key Technology |
---|---|---|
/opt/isr/security/keys/face-public.key
|
Public key for FACE HTTPS clients | Java keytool created RSA Key/Certificate |
/opt/isr/security/keys/tomcat.keystore
|
Keystore for ISR Java applications on FACE | N/A |
/opt/isr/security/keys/isr.key
|
Private key for ISR component communications | N/A |
Imported Certificates for Secure Communications
Component | Public Key Location | Description |
---|---|---|
Dashboard | /opt/isr/security/keys/israpi-public.key.<RSS
host IP>
|
Imported RSS API public key for Dashboard RSS API requests Imported RSS Converter and Recorder process public keys |
FACE | opt/isr/security/keys/israpi-public.key.<RSS
host IP>
|
Imported RSS API public key for FACE RSS API requests Imported RSS Converter and Recorder process public keys |
Signing Keys
Many ISR services utilize self-signed keys which are generated during installation. For better security, Oracle recommends that keys are signed by a Certificate Authority (CA). You must generate a certificate signing request (CSR) and use it to request a signed certificate from a CA. The certificates described in "Imported Certificates for Secure Communications" are self-signed when you install them. You must replace these with certificates signed by a certified Certificate Signing Authority (CSA).To obtain these properly signed certificates, you must generate a Certificate Signing Request (CSR).
- Run /opt/isr/configIsr.sh from the Linux command line.
- Choose the 'k' Manage ISR Keys option.
- Choose the 'c' Create Certificate Signing Request(s) option.
- Follow the instructions for creating a CSR.
CSRs are created in the
/opt/isr/security/keys/
directory.
Once you have generated a CSR, you must send it to a CSA for signing and install and replace the temporary self-signed certificate created during installation.
- Run /opt/isr/configIsr.sh from the Linux command line.
- Choose the 'k' Manage ISR Keys option.
- Choose the 'i' Import a signed certificate option.
- Follow the instructions for importing your CA signed certificate.
Note:
If a CA-signed ISR API Face certificate has not been received, in bundled form, by the CA authority, then each signed certificate issued by the CA (for example, root certificates, intermediate certificates, and issued API Face signed certificates) must be manually imported using the below commands.keytool -import -file root.cert -alias root -keystore /opt/isr/security/keys/tomcat.keystore
The following command imports received intermediate certificates to
the tomcat keystore:
keytool -import -file intermediate1.cert -alias intermed1 -keystore /opt/isr/security/keys/tomcat.keystore
The following command imports received ISRAPI/Face certificates to
the tomcat keystore:
keytool -import -file CASigned_ISRAPI.cert -alias israpi-key -keystore /opt/isr/security/keys/tomcat.keystore
Or:
keytool -import -file CASigned_Face.cert -alias face-key -keystore /opt/isr/security/keys/tomcat.keystore
Additional CSR Details
keytool -certreq -alias <alias> -keyalg RSA -file <alias>.csr -keystore /opt/isr/security/keys/tomcat.keystore
The following shows the general format for using openssl to create a CSR:
openssl req -out <alias>.csr -key /opt/isr/security/keys/<keyfile> -new
Examples of Generating ISR Component CSRs
This section provides examples of generating ISR component CSRs.
- RSS Services Certificate
openssl req -out rss.csr -key /opt/isr/security/keys/rss_key.pem -new
- ISR API Certificate
keytool -certreq -alias israpi-key -keyalg RSA -file israpi.csr -keystore /opt/isr/security/keys/tomcat.keystore
- Dashboard Certificate
openssl req -out dash.csr -key /opt/isr/security/keys/server.key -new
- FACE API Certificate
keytool -certreq -alias face-key -keyalg RSA -file face.csr -keystore /opt/isr/security/keys/tomcat.keystore