Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The JS7 - Profiles hold settings that are specific for a user account and that are controlled by the user. 

The JS7 - Security Architecture suggest to operate suggests that the JOC Cockpit in is operated with one of the following security levels:

  • Security Level Low
    • Inventory objects are automatically signed with the

...

    • Private Key that is stored with the root account.
    • Signing is automatically applied when performing the Deploy operation.
    • The Profile page for Signature Key Management is available only for

...

...

    • Private Key that is stored with the current user's account.
    • Signing is automatically applied when performing the Deploy operation.
    • The Profile page for Signature Key Management is available individually for any user

...

...

    • A Profile page for Signature Key Management is not available.

The article is intended for a security-aware audience that is technically familiar with digital key management. JS7 supports both X.509 and PGP certificates, the following descriptions are focused on the use of X.509 Certificates.

Profile Page

The Profile page is accessible from the user menu of an account in the upper right upper hand corner of any JOC Cockpit view:

...

The Profile page offers a number of sub-views. The following section explains describes the Signature Key Management sub-view.

...

The Signature Key Management sub-view offers allows configuration of the following settings:

Image Added

Image Removed

CA Certificate

  • A CA Certificate is required to verify the user account's private key and certificate for digital signing when performing deployments.
    • This includes to check that the user account's certificate is signed with the given CA Certificate or a later CA Intermediate Certificate.
    • This includes to check expiration dates of certificates.
  • If an X.509 CA Certificate (Root CA Certificate or Intermediate CA Certificate) is assigned then the certificate's subject is displayed.
  • Operations for CA Certificates include to
    • view the CA Certificate by use of the Image Removed icon,
    • update the CA Certificate by use of the Image Removed icon,
    • Import the CA Certificate by use of the Image Removed icon.

View CA Certificate

...

Image Removed

Update CA Certificate

Keys and Certificates

User accounts have to be equipped with a Private Key and Certificate issued for digital signing in order to deploy scheduling objects to Controllers and Agents:

  • If a user's Certificate is signed by a Certificate Authority then it is sufficient to rollout the CA Certificate to the Controller and Agent instances to which the user should be entitled to deploy scheduling object such as workflows.
  • If a user's Certificate is self-issued then the Certificate has to be rolled out to the Controller and Agent instances to which the user should be entitled to perform deployments.

Users have options about the issuer of Private Keys and Certificates:

  • Use of the built-in JS7 Certificate Authority
    • The JOC Cockpit provides the option of digitally signing a user account's public key from its built-in CA, see JS7 - Certificate Authority
    • Users can generate a Private/Public Key pair and make the JS7 Certificate Authority sign their Public Key to a Certificate in a single operation.
  • Use of an external Certificate Authority
    • If an external CA is to be used then users have to create a Certificate Signing Request (CSR) outside of the JOC Cockpit and make their external CA sign this request. The resulting certificate can be added to the user's Profile in JOC Cockpit. For details see JS7 - How to create X.509 Signing Certificates.
  • If users do not operate a CA or do not dispose of certificates then they can continue to use the default Private Key and Certificate that ship with the JOC Cockpit.
    • In this situation by default only the root account can be used to deploy scheduling objects such as workflows which suggests operating the JOC Cockpit for Security Level Low as the root account's Private Key and Certificate will be used for signing deployments by any user accounts.
    • The Security Level Medium means that each user account has to be equipped with a Private Key and Certificate.

Operations for the user account's Private Key and Certificate include:

  • viewing the Private Key and Certificate using the Image Added icon,
  • updating the Private Key and Certificate using the Image Added icon,
  • importing the Private Key using the Image Added icon,
  • generating the Private Key using the Image Added icon.

View Key and Certificate

The user account's Private Key and Certificate for digital signing is displayed like this:

Image Added

Update Key and Certificate

A user account's Private Key and Certificate can be created by an external CA and A CA Certificate can be updated by pasting from the clipboard like this:

Image RemovedImage Added

Import

...

Key

A CA Certificate user account's Private Key can be created by externally and can be imported from a file like this:

Image Removed

Keys and Certificates

  • x

View Key


Image Added


Note that an X.509 Certificate matching the user account's Private Key has to be signed by a CA and has to be added by using the Update Key and Certificate operation as explained above.

Generate Key

A The user account's private key and certificate for digital signing is displayed Private Key and optionally the Certificate can be generated like this:

Image Removed

The user's key and certificate can

Update Key

...



Image Added


Use of Key Algorithms

  • When choosing Key Algorithm PGP or RSA then only a Private Key will be created.
    • Note that an X.509 Certificate matching the user account's Public Key is signed by an external CA and has to be added by using the Update Key and Certificate operation as explained above.

  • When choosing Key Algorithm ECDSA then a Private Key is created and a CA-signed Certificate is created if the JS7 Certificate Authority is in use.

...