6.6

Table Of Contents
c To congure the correct cipher suites, run the following commands:
sed -i "/^[^#]*cluster-ssl-ciphers/ c\cluster-ssl-
ciphers=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256" /usr/lib/vmware-
vcops/user/conf/gemfire.properties
sed -i "/^[^#]*cluster-ssl-ciphers/ c\cluster-ssl-
ciphers=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256" /usr/lib/vmware-
vcops/user/conf/gemfire.native.properties
sed -i "/^[^#]*cluster-ssl-ciphers/ c\cluster-ssl-
ciphers=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256" /usr/lib/vmware-
vcops/user/conf/gemfire.locator.properties
Repeat this step for each node.
d Navigate to the administrator user interface at URL/admin.
e Click Bring Online.
Enabling TLS on Localhost Connections
By default, the localhost connections to the PostgreSQL database do not use TLS. To enable TLS, you have to
either generate a self-signed certicate with OpenSSL or provide your own certicate.
To enable TLS on localhost connections to PostgreSQL, complete the following steps:
1 “Generate or Provide Your Own Self-Signed Certicate with OpenSSL,” on page 24
2 “Install the Certicate for PostgreSQL,” on page 24
3 “Enable TLS on PostgreSQL,” on page 25
Generate or Provide Your Own Self-Signed Certificate with OpenSSL
Localhost connections to the PostgreSQL database do not use TLS. To enable TLS, you can generate your
own self-signed certicate with OpenSSL or provide your own certicate.
n
To generate a self-signed certicate with OpenSSL, run the following commands:
openssl req -new -text -out cert.req
openssl rsa -in privkey.pem -out cert.pem
openssl req -x509 -in cert.req -text -key cert.pem -out cert.cert
n
To provide your own certicate, complete the following steps:
n
Modify the ownership of the CAcerts.crt le to postgres.
n
Edit the postgresql.conf le to include the directive ssl_ca_file = 'CAcerts.crt.
If you are using a certicate with a CA chain, you must add a CAcerts.crt le containing the
intermediate and root CA certicates to the same directory.
Install the Certificate for PostgreSQL
You must install the certicate for PostgreSQL when you enable TLS on localhost connections to
PostgreSQL.
Procedure
1 Copy the cert.pem le to /storage/db/vcops/vpostgres/data/server.key.
2 Copy the cert.cert le to /storage/db/vcops/vpostgres/data/server.crt.
3 Run the chmod 600 /storage/db/vcops/vpostgres/data/server.key command.
Secure Configuration
24 VMware, Inc.