13 Integrating Hardware with Oracle Web Services Manager
Integrating OWSM with required hardware delivers high-performance security for scenarios that rely on compute-intensive cryptographic operations, such as those imposed by transport-layer and message-layer protection policies.
This chapter includes the following sections:
13.1 Using Hardware Security Modules With OWSM
Hardware security modules (HSM) are certified to operate with Oracle Advanced Security. These modules provide a secure way to store keys and off-load cryptographic processing. OWSM supports the SafeNet Luna SA HSM, which you can install and configure.
The following sections explain this further:
13.1.1 Understanding SafeNet Luna SA With OWSM for Key Storage
SafeNet Luna SA is a network-attached HSM featuring cryptographic processing and hardware key management for applications. Luna SA is designed to protect critical cryptographic keys across a wide range of security applications.
Some key advantages of using Luna SA with OWSM are:
-
Network shareability
-
Most secure with keys always in hardware
-
FIPS validated
Note:
You must contact your SafeNet representative to obtain certified hardware and software to use with Oracle Advanced Security.
By default, OWSM uses the Keystore Service (KSS) for key storage. Keys and certificates required by OWSM for cryptographic operations are fetched from a keystore file. When Luna SA is available in-network, it can be leveraged by OWSM for key storage purposes and cryptographic operations.
13.1.2 About Installing and Configuring the Luna SA HSM Client
You need to install the Luna SA HSM client on the host that has a running instance of OWSM so that it can communicate with an available Luna SA HSM network.
However, this section does not cover Luna SA client installation, nor does it cover
the Luna SA network installation and setup, which are out of scope for this document.
Instead, you should refer to the Luna SA documentation for those instructions, at
http://www.safenet-inc.com/Products/Detail.aspx?id=2147483853&terms=search
.
Before installing the Luna SA HSM client, verify the following checklist:
-
You already have Luna SA installed and available in you network.
-
You are logged in as root or as a user that has installation permission.
-
You have a Luna SA client installation CD or software image.
-
You have all required passwords for Luna SA, including an administrator password and a partition password.
Note:
You must contact your SafeNet representative to obtain the hardware security module, and to acquire the necessary library.
These tasks must be performed before you can use a Luna SA hardware security module with OWSM.
13.1.3 Configuring the JRE Used By OWSM
After installing the Luna SA client, you need to configure the JRE that will be used by the OWSM setup.
You must perform the following steps:
13.1.4 Logging On to Luna SA
Before you can use Luna SA with OWSM, you must log on to the Luna SA server. This is an one-time process that creates a Luna log-in session on the client machine and the session remains active until the client or server machine is rebooted, or when someone explicitly logs out of the Luna session.
You must use the salogin
utility to log in. The salogin
utility establishes a connection between the client and the HSM partition for a particular application. It takes an application ID as an argument. This application id consists of two parts: a high and a low ID.
Before invoking the salogin
utility, you need to add an entry to the Chrystoki.conf
file, which registers the application ID. The Chrystoki.conf
file is usually found in the /etc/
directory. This is also a one-time process.
13.1.5 Copying Keys and Certificates to Luna SA
You need to move all keys and certificates to Luna SA, if the keys and certificates are currently in a KSS or JKS keystore. You can use the cmu
script provided by LunaSA for importing keys and certificates.
-
The
cmu importKey
command imports an RSA|DSA private key from a file onto an HSM. (Supports PKCS12(RSA), PKCS8(RSA/DSA), or PKCS1(RSA)). -
The
cmu import
command imports an X.509 certificate from a file onto an HSM.
Note:
The cmu
script imports from a file. Therefore, before you can import the keys and certificates into Luna SA, you must first export them to a file from a KSS or JKS keystore.
13.2 About Configuring OWSM for Oracle SPARC T5 and SPARC T4 Cryptographic Acceleration
You can configure OWSM to take advantage of cryptographic acceleration capabilities of Oracle SPARC T5 and SPARC T4 processor-based servers.
OWSM supports the use of Oracle SPARC T5 and SPARC T4 processor-based servers, which eliminate the need for third-party security hardware by integrating computing, security, and I/O on a single chip. Deploying OWSM on Oracle SPARC T5 and SPARC T4 based servers transparently leverages the SPARC T5 and T4 processor based cryptographic capabilities. This delivers high-performance security for scenarios that rely on compute-intensive cryptographic operations, such as those imposed by transport-layer and message-layer protection policies. This section applies only to users who are running Oracle SPARC T5 and T4 processor-based servers running Oracle Solaris 10 8/11 or later.
The following topics are described:
13.2.1 Terms You Need to Understand
There are certain terms that you need to understand to configure OWSM for cryptographic acceleration.
Refer to the white paper described in Additional Reading for Cryptographic Acceleration for a complete discussion of these terms.
-
PKCS#11 token — A token that generically refers to all the hardware and software tokens that implement the PKCS#11 API. The PKCS#11 API is an RSA standard for integrating hardware cryptographic accelerators, cryptographic tokens (for example, SCA-6000), and smart cards.
A software based PKCS#11 token is a PKCS#11 token implemented entirely in software (for example, Solaris PKCS11 Softtoken.)
-
Solaris Cryptographic Framework — The Solaris Cryptographic Framework (SCF) library plays a vital role in providing application access to hardware-assisted cryptographic acceleration provided by Oracle T-series processors and Hardware Security Modules (HSM), including the Oracle Sun Crypto Accelerator 6000 PCIe Card (SCA-6000) and third-party HSMs. SCF is based on PKCS#11 standard interfaces and provides a set of cryptographic services for kernel-level and user-level consumers to perform cryptographic operations.
13.2.2 Overview of Oracle SPARC T5 and SPARC T4 Hardware Assisted Cryptographic Acceleration
The Oracle SPARC T5 and SPARC T4 processors are part of Oracle's SPARC T-series processors family, which combines multiprocessing at the processor core level and hardware multithreading inside of each core with an efficient instruction pipeline to enable Chip Level Multi-Threading (CMT).
These processors present a unique "System-on-a-Chip" design principle that incorporates specialized features such as on-chip/on-core cryptographic acceleration, 10 Gigabit Ethernet networking, and hardware-enabled virtualization capabilities. Each core of the Oracle SPARC T5 and SPARC T4 processors contains a Stream Processing Unit (SPU) to perform processing of cryptographic operations at the same clock speed as the core. The SPU is designed to achieve wire-speed encryption and decryption on the processor's 10 GbE ports.
Configuring and deploying OWSM on Oracle SPARC T5 and SPARC T4 based servers delivers high performance by leveraging the on-core cryptographic instructions to perform computationally intensive cryptographic operations as part of web service security transactions using SSL and WS-Security mechanisms. For example, all message protection policies are computationally intensive.
OWSM makes use of SPARC T5 and SPARC T4 processor based cryptographic acceleration in the following scenarios:
-
Transport-level security, as described in Configuring Transport-Level Security for Cryptographic Acceleration.
The SPARC T5 and SPARC T4 processor on-core cryptographic acceleration capabilities can be accessed in a variety of ways by the OWSM deployment, depending on the applied security scenarios and its requirements. The availability of Oracle Ucrypto provider features and the Sun PKCS#11 interfaces in the Java Cryptography Extension (JCE) framework enable OWSM and WebLogic Server to take advantage of hardware-assisted cryptographic acceleration of SSLv3/TLSv1 and WS-Security-based cryptographic workloads.
With the release of JDK7 update 4, Oracle introduced Oracle Ucrypto provider, which provides a specialized interface that bypasses PKCS#11 and automatically leverages hardware-assisted cryptographic acceleration capabilities of Oracle's SPARC T4 and SPARC T5 (or newer) processors. In a typical JDK7 installation (JDK7u4 or later) on Oracle Solaris 11 (SPARC), the Java Runtime Environment is preconfigured to make use of the Oracle Ucrypto provider by default. This enables the Java and Oracle WebLogic Server-hosted applications and XML web services to automatically delegate their cryptographic-intensive operations processed via Oracle Solaris Cryptographic Framework using Oracle SPARC T5- and SPARC T4-based on-core cryptographic instructions.
In JDK6, the Java PKCS#11 interfaces help to off-load and accelerate the compute-intensive cryptographic workloads of SSL/TLS protocols by leveraging the on-core cryptographic instructions of SPARC T5 and SPARC T4 processors.
-
Message-level security, as described in Configuring Message-level Security for Cryptographic Acceleration.
Message-level security builds on cryptographic operations that support Web Services security standards such as WS-Security, WS-SecurityPolicy, and WS-Trust.
In particular, web services security makes use of public-key encryption, digital signature (for example, RSA, DSA and ECC), bulk encryption (for example, AES, 3DES, and DES) and message digest (for example, SHA-1, SHA-2, and MD5) functions intended for supporting XML encryption, XML digital signature and related cryptographic operations.
OWSM implements a dedicated PKCS#11 interface to delegate cryptographic operations (via SCF) to on-core cryptographic instructions of SPARC T4 processor.
13.2.3 Configuring Transport-Level Security for Cryptographic Acceleration
You can configure cryptographic acceleration for transport-level security.
Perform the following tasks to configure cryptographic acceleration for transport-level security:
13.2.4 Configuring Message-level Security for Cryptographic Acceleration
You can configure cryptographic acceleration for message-level security.
To configure the cryptographic acceleration for message-level security:
13.2.5 Additional Reading for Cryptographic Acceleration
Certain whitepapers are a definitive source for cryptographic acceleration information for using Oracle SPARC T-series processor based servers. These whitepapers cover many additional pertinent topics such as Solaris Cryptographic Framework components, using Solaris Kernel SSL (KSSL), Apache Web Server, Oracle Database Transparent Data Encryption and performance characteristics.
Refer to the following whitepapers for more information:
-
For information on using high-performance security on SPARC T5 and SPARC M5 servers, refer to the whitepaper "High-Performance Security for Oracle WebLogic Server Applications Using Oracle's SPARC T5 and SPARC M5 Servers", which is available at
http://www.oracle.com/technetwork/articles/systems-hardware-architecture/security-weblogic-t-series-168447.pdf
. -
For information on OWSM deployments on Oracle SPARC T-series processor based servers, refer to the whitepaper "High Performance Security For Oracle Database and Fusion Middleware Applications using SPARC T4", which is available at
http://www.oracle.com/technetwork/server-storage/sun-sparc-enterprise/documentation/o12-021-t4security-1577047.pdf
.