The SBC EMA is enhanced to interface with the common certificate pool using the EMA TLS Profile. The certificates used for HTTPS are exported from the database to the local disk space, and then the EMA TLS Profile facilitates selecting a certificate from the pool and uploading it to the EMA. Two types of files are supported: p12 and pem. The SBC supports SHA-256 for certificate verification.
You can configure only one EMA TLS Profile at any given time.
You can configure up to 20 client CA certifications (using separate 'set' commands) for an EMA TLS Profile.
PC Java Configuration supports TLS 1.0 only by default. When you disable EmaTlsProfile v1_0, enable the corresponding Java Configuration for TLS support. See the example below for the Windows environment.
After configuring servercert and clientCACert in EmaTlsProfile, an appropriate value must be configured for clientAuthMethod in OAM > EMA to enable client SSL verification.
To enable TLS support in Windows:
% set profiles security EmaTlsProfile <EMA TLS profile name> ClientCaCert <CA certificate name> authClient <false | true> ocspProfileName <OCSP profile name> serverCertName <server certificate> v1_0 <disabled | enabled> v1_1 <disabled | enabled> v1_2 <disabled | enabled> v1_3 <disabled | enabled> ciphersuite <ciphersuite name> % show profiles security EmaTlsProfile <EMA TLS profile name> ClientCaCert <CA certificate name> % delete profiles security EmaTlsProfile <EMA TLS profile name> ClientCaCert <CA certificate name> % show profiles security EmaTlsProfile <EMA TLS profile name> ciphersuite <ciphersuite name> % delete profiles security EmaTlsProfile <EMA TLS profile name> ciphersuite <ciphersuite name>
The EMA TLS Profile parameters are as shown below:
Parameter | Length/Range | Description |
---|---|---|
<EMA TLS Profile name> | 1-23 characters | The name of the EMA TLS Profile. Note: You can configure only one EMA TLS Profile at any given time. |
ClientCaCert | N/A | The name of the EMA-CA certificate associated with this EMA-TLS profile. |
authClient | N/A | Set flag to "true" to force the EMA-TLS client to authenticate itself within TLS.
|
ocspProfileName | N/A | The name of the OCSP profile associated with this EMA-TLS profile. |
serverCertName | N/A | The name of the server certificate associated with this EMA-TLS profile. |
v1_0 | N/A | TLS protocol version 1.0
|
v1_1 | N/A | TLS protocol version 1.1
|
v1_2 | N/A | TLS protocol version 1.2
|
v1_3 | N/A | TLS protocol version 1.3 Enables or disables TLS version 1.3 for incoming TLS connections from RAMP.
|
ciphersuite | N/A | The EMA TLS Ciphersuite choice for this profile. See Supported ciphersuites for the list of supported ciphersuites. |
The following 12 SSL ciphersuites are supported initially in this feature. This list may change in the future based on requirements.
% show profiles security EmaTlsProfile EmaTlsProfile defaultEmaTlsProfile { authClient true; serverCertName defaultSBCCert; v1_0 disabled; v1_1 disabled; v1_2 enabled; v1_3 enabled; ciphersuite AES128-GCM-SHA256 }