Options for secure communications
The various options for secure communications between NightWatchman and WakeUp components.
For example:
NightWatchman Management Center Console
NightWatchman Management Center Console service
NightWatchman Management Center Web service
NightWatchman Management Center Report Console (Web reports)
WakeUp Console
WakeUp server
Web WakeUp
Enterprise View
1E NightWatchman Agent
Tachyon Agent with the WakeUp module enabled.
Summary of how communications are encrypted and secured
A summary of how communications are encrypted and secured is:
Communication type | Implementation |
---|---|
Proprietary communications between WakeUp agents and WakeUp server | Proprietary communications are used between WakeUp agents and WakeUp server, which supports encryption, using the ENCRYPTIONLEVEL or USEFIPS settings. By default, EncryptionLevel is disabled (0), but can be configured to use either full encryption (2) which uses RC2 or FIPS (3) which uses AES256. |
HTTP | WakeUp server supports only HTTP when it registers with and queries the NightWatchman Web service. |
HTTPS | Must be used by all components, except for the WakeUp server which can only use HTTP to communicate with the NightWatchman Web service. |
HTTP/S | Is used by:
Additionally, HTTP/S uses SSL/TLS and requires a server (SSL) certificate. |
Websites using SSL/TLS | Can be configured to require a client authentication certificate, which requires a matching server certificate. |
FIPS compliance |
|
|
|
Windows implementation of TLS | Remote NightWatchman Consoles communicate with the NightWatchman Console service using Windows implementation of TLS which is encrypted. |
| |
SQL communications | The NightWatchman Console Service account, and application pools used by NightWatchman Web reports, Web WakeUp and Enterprise View Websites use SQL to update and query the NightWatchman database. SQL communications uses default Windows integrated trusted authentication. |
Configuring the NightWatchman Management Center Web service, report console and Web WakeUp
NightWatchman Management Center Web service, report console and Web WakeUp are assumed to be installed under the same Website using the same HTTPS port number (default is 443). Configuration of IIS and certificates are beyond the scope of this discussion.
To configure the Website to use secure communications:
Install certificates to the certificate stores on the Web server.
Optionally, deploy the client authentication certificate to clients.
On the IIS Web server, ensure the default Website uses the default binding for HTTP port 80. Alternatively, disable the default Website and create a new one using HTTP port 80.
Install the NightWatchman Management Center Web service (AFWebService) and Report Console components using default settings for IIS ports and host headers.
Install Web WakeUp using the default settings for IIS port and host header.
After installation, add an HTTPS binding that uses the server (SSL) certificate. The HTTP binding must be kept for the Website used by AFWebService in order to support WakeUp server's HTTP requirement.
Deploy the 1E Agent using the
SECUREREPORTINGSERVER
property with optional use ofCERTISSUER
orCERTSUBJECT
andENCRYPTIONLEVEL
orUSEFIPS
properties.
HTTPS and SSL
HTTPS encrypts communications and uses an SSL certificate issued by an external certification authority (CA) or by a server that acts as a CA on your Windows domain.
If you use HTTPS:
It must be used by all components (the NightWatchman Web service, WakeUp server and 1E Agent) - the exception is the NightWatchman Report console and Web WakeUp which can use HTTP instead, but it makes sense for all to use HTTPS
Server components using HTTPS must be installed under the same Website, using an HTTPS binding (including port) that uses the server (SSL) certificate, the SSL certificate must be imported into the Web server before it can be used, you cannot install components with different host headers under the same or separate Websites on one Web server - the ability to use multiple host headers requires a server (SSL) certificate that supports all the names.
If you need a mixture of HTTPS and HTTP, the NightWatchman Report console and Web WakeUp can be installed in on separate Website with an HTTP binding and host header, if a host header is required for HTTPS, the server (SSL) certificate must support this requirement and the CN used in the certificate must match the fully qualified host header.
Configure the 1E Agent to use HTTPS with the
SECUREREPORTINGSERVER
property (see Agent configuration), the NightWatchman and WakeUp components will use HTTPS for reporting and for policy retrieval.
Client certificate authentication
In addition to HTTPS and SSL, the SSL configuration of the Web server can optionally be configured to request a client certificate. The client certificate is installed on all clients. The server prompts the client for a valid client authentication certificate for mutual authentication.
The 1E Agent must be configured to use HTTPS as above, and either CERTISSUER
or CERTSUBJECT
properties, (see Agent configuration). The NightWatchman and WakeUp components iterate through their local certificate store to match a certificate by issuer or by subject to send back to the server when challenged. The server validates the CA in the certificate before initiating the connection.
Specific items that must be taken into account when setting up client certificates for authentication are:
Items for consideration | Description |
---|---|
Required certificates | To enable secure channel communications the server requires an SSL certificate. For client authentication, a client authentication certificate is required in each of the client's certificate store and a matching certificate from the same certification authority is required in the server certificate store. |
Locating certificates on the client certificate store | Certificates must be located either in the Third Party Root Certification Authorities or Trusted Root Certification Authorities stores. |
Multiple certificates with the same Subject and Issued By fields | We recommend you only define a single certificate for a particular Subject and Issued By fields although you can define multiple certificates with the same Subject and Issued By fields. NightWatchman clients and WakeUp Agents will only return the first certificate found matching the Subject and Issued By fields. |
Revoking certificates | Trust is based on the CA certificate entries in the Web server's Trusted Root Certification Authorities machine certificate store. When you revoke a certificate, remove them from the server certificate store. |
Agent configuration
Agent | Configuration |
---|---|
HTTPS and SSL | Specify the |
HTTPS, SSL and client certificate authentication | To use |
ENCRYPTIONLEVEL or FIPS |
|
msiexec /i 1ENightWatchmanEAgent-x64.msi ENCRYPTIONLEVEL="2" /qn msiexec /i WakeUpSvr.msi ENCRYPTIONLEVEL="2" /qn
If FIPS compliance is required, use the USEFIPS
settings instead. FIPS overrides the use of ENCRYPTIONLEVEL
, therefore only one of these properties is set, not both. When using FIPS, all WakeUp and NightWatchman components must be configured identically, mixed settings are not possible.
msiexec /i 1ENightWatchmanAgent-x64.msi USEFIPS="1" /qn msiexec /i WakeUpSvr.msi USEFIPS="1" /qn Msiexec /i NightWatchmanManagementCenter.msi USEFIPS="TRUE" /qn
Summary of installer properties
Component | Installer property |
---|---|
NightWatchman Management Center | |
WakeUp server | |
Web WakeUp | None |
1E NightWatchman Agent |