Secure Global Desktop 4.40 Administration Guide > Security > Securing Connections Between SGD Servers
In a standard installation, the data transmitted between the SGD servers in an array (including data sent from the SGD administration tools) is not encrypted. Secure Global Desktop Administrators can secure the connections between array members using the Secure Sockets Layer (SSL). Using SSL for these connections ensures the integrity of the data as follows:
Using SSL in this way is known as secure intra-array communication.
Using secure intra-array communication means that each SGD server in the array has to have a valid X.509 certificate that has been signed by a trusted certificate authority (CA).
As the X.509 certificates used for secure intra-array communication are used only internally by SGD, the primary SGD server in the array acts as the CA. The primary has a self-signed CA certificate and a private key. All servers in the array have a copy of the primary's CA certificate in a trusted certificate store (the truststore).
All servers in the array (including the primary) have an X.509 certificate and a private key. The X.509 certificate is signed with the primary's CA certificate and contains a common name (CN) which is the peer DNS name of the SGD server. As these certificates are created using a self-signed CA certificate, they cannot be used to secure any other SGD-related connection. These certificates are referred to as server peer certificates to distinguish them from other types of X.509 certificates.
When one SGD server in the array connects to another (including when using an administration tool), the SGD server being connected to presents its server peer certificate as part of the SSL negotiation. The connecting server evaluates the certificate and checks the following:
If the certificate is valid, a secure connection is established.
When you enable secure intra-array communication, SGD automatically generates and distributes the CA and server peer certificates to the members of the array. Whenever there is a change in the array structure, SGD automatically updates the CA and server peer certificates. The following table summarizes what happens:
Array Change | Action |
---|---|
Server joins the array |
|
Server leaves the array |
|
New primary server appointed |
|
Administrators can use the tarantella security peerca --show
command to
view certificates in the truststore. The truststore contains the primary CA certificate.
You must enable secure intra-array communication from the command line.
Only detach one server at a time, using the following command:
# tarantella array detach --secondary server
You can tell that this has happened when the tarantella status
command returns the same result
when you run it on each SGD server in the array.
Use the following command on each server:
# tarantella config edit --tarantella-config-security-peerssl-enabled 1
Only add one server at a time. When you add a sever you are prompted to trust the primary server's CA certificate.
# tarantella array join --primary primary_server
You are prompted to trust the primary server's CA certificate and the fingerprint of the certificate displays.
On the primary server, use the following command to display the fingerprint for the primary server's CA certificate.
# tarantella security peerca --show
Check that the certificate fingerprints match. This is important as it verifies that the secondary is communicating with the genuine primary server.
Wait for the array change to be copied to all members of the array before adding any more servers.
You can tell that this has happened when the tarantella status
command returns the same result
when you run it on each SGD server in the array.
Copyright © 1997-2007 Sun Microsystems, Inc. All rights reserved.