This procedure is optional. If your HPE OneView appliance is configured in CNSA mode, you must also configure your
external repository.
Prerequisites
You have a computer or virtual machine running Linux to generate the required certificates.
You have
set up the Windows FIPS repository.
You have installed Windows Server 2016 or later versions. In Windows Server 2012 or earlier versions, TLS 1.2 cipher suites are not available.
Procedure
-
Generate the required certificates for the Windows web server using OpenSSL that is installed on a computer or virtual machine running Linux.
Obtain and install OpenSSL.
yum install openssl
Set
CN to
FQDN. Enter the command
ping -a IP_ADDR to get the FQDN of the server.
Set
subjectAltName with DNS and IP address of the web server.
openssl genrsa -out key.pem 3072
openssl req -subj "/CN=<FQDN or IP address>/C=US/ST=CA/L=PA/O=HPE/OU=Org" -sha384 -new -key key.pem -out \
certreq.csr -reqexts SAN -config <(cat /etc/pki/tls/openssl.cnf <(printf "\n[SAN]\nsubjectAltName=DNS:<FQDN>,\
IP:<IP address>\nkeyUsage=digitalSignature,keyEncipherment,dataEncipherment\nbasicConstraints=CA:FALSE"))
openssl req -x509 -sha384 -key key.pem -out cert.pem -nodes -days 3650 -extensions v3_req -in certreq.csr \
-config <(cat /etc/pki/tls/openssl.cnf <(printf "\n[v3_req]\nsubjectAltName=DNS:<FQDN>,IP:<IP address> \
\nkeyUsage=digitalSignature,keyEncipherment,dataEncipherment\nbasicConstraints=CA:FALSE"))
-
Create the
pfx file that has the public and private key.
openssl pkcs12 -export -out cert.pfx -inkey key.pem -in cert.pem
-
To import the
pfx file into the IIS web server, perform the following steps:
- Open IIS Manager.
- On the home page of IIS Manager, select
.
- Select the
pfx file and enter the password.
Write down the password that you entered.
- Select
Default web site from the connections panel, and in the
Actions pane, select
Bindings.
- Click
Add, and from the
Type drop-down list, select
https. The default port assigned is
443.
-
Restart the IIS web server.
-
Connect to the web server using a browser. If you used a self-signed certificate, you will see a certificate error. To proceed, accept the certificate exception.
-
To set the Windows server mode to CNSA, perform the following steps:
- Open the
Run application and enter the
gpedit.msc command.
The
Local Group Policy Editor opens.
- In
Local Group Policy Editor, select
.
- Open
SSL Cipher Suite Order.
- Select
Enabled, and add the suites.
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_256_GCM_SHA384,TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
- Restart the OS.