Database
IBM Db2

Configure TLS certificates for mutual authentication

7min

Before KMIP connections between IBM Db2 and the can occur, both parties must establish a mutual trust relationship by validating their respective digitally signed certificates. This section shows how to create X.509 certificates for IBM Db2 and the KMIP connection pair on the , which they use for TLS communication.

Create the CA

1

Log in to the application interface with the default Admin users.

2

Go to PKI > Certificate Authorities and select [ Add CA ].

3

Specify a Name for the CA, then select [ OK ].

4

Right-click the new certificate container and select Add Certificate > New Certificate.

5

Change the Preset drop-down option to Classic and set the Common Name value to Root.

6

On the Basic Info tab, leave the settings set to the default values.

7

On the V3 Extensions tab, set the Profile to Certificate Authority and select [ OK ] to save.

Create and configure the TLS certificate

To create and configure the TLS certificate for the KMIP connection pair on the , perform the following tasks:

  1. Generate a private key.
  2. Construct a CSR.
  3. Sign the KMIP connection pair.
  4. Export the certificates.
  5. Configure the KMIP connection pair.

Generate a private key

1

Go to Administration > Configuration and double-click Network Options. On the TLS/SSL Settings tab, select the Connection drop-down option and select the KMIP connection pair.

2

Enable the KMIP connection pair if it is not already enabled.

3

Uncheck Use System/Host API SSL Parameters if it is selected.

4

In the User Certificates section, select [ Edit ] next to PKI keys.

5

Select [ Generate ] to create a new PKI key pair.

6

Select [ Yes ] and bypass the warning about SSL not being functional until new certificates are imported.

7

On the PKI Parameters window, leave all settings set to the default values and select [ OK ].

The Application Public Keys window should now show that the PKI key pair is Loaded.

Construct a Certificate Signing Request (CSR)

1

On the Application Public Keys window, select [ Request ].

2

On the Subject DN tab, change the Preset drop-down option to Classic and specify the hostname or IP address of the in the Common Name field.

3

On the V3 Extensions tab, set the profile to TLS Server Certificate.

4

On the PKCS #10 Info tab, specify a save location and name for the CSR file and select [ OK ].

5

When prompted that the certificate signing request was successfully written to the specified location, select [ OK ].

6

Select [ OK ] in the Application Public Keys window and select [ OK ] in the main Network Options window.

Sign the KMIP connection pair CSR

1

Go to the PKI > Certificate Authorities menu. Right-click the Root CA certificate and select Add Certificate > From Request.

2

In the file browser, find and select the KMIP connection pair CSR.

Certificate information should populate in the Create X.509 From CSR window.

3

Leave all settings set to the default values and select [ OK ] to save.

The signed KMIP connection pair certificate should display now under the Root CA certificate in the CA tree.

Export all certificates in the CA tree

1

Right-click each certificate in the certificate tree and select Export > Certificate(s).

2

On the Export Certificate window for each of them, change the encoding to PEM and specify a save location for the file.

Configure the KMIP connection pair to use the signed certificate and CA chain

1

Go to the Administration > Configuration menu and double-click Network Options. On the TLS/SSL Settings tab, select the Connection drop-down option and select the KMIP connection pair.

2

In the User Certificates section, select [ Edit ] next to Certificates.

3

In the Certificate Authority window, right-click the KMIP SSL CA X.509 certificate container and select [ Import ].

4

In the Import Certificates window, select [ Add ] at the bottom of the window. In the file browser, select both the root CA certificate and the signed KMIP connection pair certificate and select [ Open ].

The certificates should now display in the Verified section of the Import Certificates window.

5

Select [ OK ] to save.

It should now say Signed loaded next to Certificates in the User Certificates section of the Network Options window.

6

Select [ OK ] to save and finish.