Configuration
Suggest editsImplementing Thales CipherTrust Manager with EDB Postgres Advanced Server 15.2 and above or EDB Postgres Extended 15.2 and above requires the following components:
Note
The EDB Postgres Advanced Server version 15.2 and above and EDB Postgres Extended Server version 15.2 and above, products will be referred to as EDB Postgres distribution. The specific distribution type will be dependent upon customer need or preference.
- EDB Postgres Distribution (15.2 or later)
- Thales CipherTrust Manager
- Pykmip
- Python
Prerequisites
- A running EDB Postgres distribution.
- Thales CipherTrust Manager installed and deployed per your environment.
Check/Install Python on Server
Many Unix-compatible operating systems such as macOS and some Linux distributions have Python installed by default as it is included in a base installation.
To check your version of Python on your machine, or to see if it is installed, simply type python3
and it will return the version. You can also type ps -ef |grep python
to return a python running process.
If you run a check and find that your system does not have Python installed, you can follow the docs and download it from Python.org. Simply select your specific OS and download and install on your system.
Install Pykmip
Once you have your EDB Repository installed on your server, you can then install the Pykmip utility that is needed.
- As
root
user issue theinstall python3-pykmip
command, for our example we have a RHEL8 server so it would bednf install python3-pymkip
.
The output should look something like:
Configure Thales CipherTrust Manager for your EDB Postgres Distribution
Follow the steps outlined below to create the required certificates after you have successfully gotten Thales CipherTrust Manger up and running.
Login to Thales CipherTrust Manager and Create User
A user needs to be created for future authentication when creating a key on Thales CipherTrust Manager with EDB Postgres distribution. It verifies the username and password against the Thales CipherTrust Manager internal database.
Login to the Thales CipherTrust Manager UI.
Navigate to the Access Management section and select
Users
.Select
Add Users
and provide the required information:
- Username
- Password
Click on
Add User
.Click on the
...
beside the user you just created and select the View/Edit option.Click on
Expand All
and select/add the following groups for the user:
Key Admins
Key Users
All Clients
The user that you created now has the appropriate settings and permissions to create and download certificates in Thales.
Create and Download Certificates on Thales CipherTrust Manager
You will need ca.pem
, key.pem
and cert.pem
certificates generated in Thales CipherTrust Manager for your KMIP server and pykmip.conf file.
Download the CA Certificate
The local CA Certificate is provided by default and the below steps will show you how to access and download it for your pykmip.conf file.
Navigate to CA on the left-hand side and click on
Local
to be taken to the Local Certificate Authorities page.Click on the
...
on the far right side and clickDownload
.For your download change the name from
Certificate.pem
toca.pem
. Keep track of where you downloaded your certificate as you will need it later.
Create and Download the Key.pem and Cert.pem Certificates
These are the other two certificates you will need for your KMIP server and pykmip.conf file.
Navigate back to the Thales CipherTrust Manager main page.
On the main page, select
KMIP
from options under Products.Click on
Client Profile
and selectAdd Profile
.Give the profile a name and select
Save
. In our example we usednewtestprofile
.Click on
Registration Token
and selectNew Registration Token
.Click on
Begin
and then follow the below steps to configure your token:
- Give the token a name, in our example
edbnewtoken2
- Select
local CA
- Select the Client Profile you created above, in our example
newtestprofile
- Select
Create Token
- Copy the Token that was created
- Click on
Done
Navigate to Registered Clients and select
Add Client
.Give the Client a name.
Paste the token that you copied above into the
Registration Token
box and then pressSave
. This will generate the final two certificates.Click on
Save Private Key
and click onSave Certificate
, to download the final two certificates. Make sure to note their downloaded location for later.
You are now ready to use Thales CipherTrust Manager and your EDB Postgres distribution with TDE for key management.
Could this page be better? Report a problem or suggest an addition!