How to Enable HTTPS for the Spirion Console
By default, access to the console user interface and communication between clients and the console is configured to occur using HTTP.
It is possible to enable secure HTTPS communication for either or both of these functions.
- The procedure in this article requires IIS to be configured for HTTPS communication.
- Configuring IIS is beyond the scope of this article and Spirion Support.
- Configuration information is available from Microsoft.
NOTE: The IIS website used by Identity Finder Enterprise Console must not use multiple, different host headers.
NOTE: IIS must be configured to ignore client certificates for the Services application.
In This Article
- How Do I Enable HTTPS for the Console Web Application?
- Enabling HTTPS for the Services Web Application
- Endpoint Configuration
- Windows Clients
- Linux Clients
- Mac Clients (link to another KB article)
What Are Some Things I Should Know Before I Enable HTTPS?
- You MUST have access to the Console Server including IIS and the Console Administrator Tool (CAT)
- Configuring IIS is beyond the scope of support of this article and Spirion Support. Configuration information for IIS is available from Microsoft.
- The IIS website used by Spirion Console MUST NOT use multiple/different host headers
- IIS MUST be configured to ignore client certificates for the Services application.
- After enabling HTTPS in the console you may experience some interruption in communication between endpoints and the console due to an unknown certificate. To fix this enable the following setting: IgnoreunknownCA.
- If you are building MSIs when SSL/HTTPS is enabled and you are using a private key then you MUST enable this setting.
- The server name in the certificate must match the server name of the console under the System settings.
- To see this right-click on the start menu on the console server and click System.
- If HTTPS is selected, toggling the HTTP/HTTPS drop-down boxes for the console in the CAT tool cuts off HTTP access to the console
How Do I Enable HTTPS for the Console Web Application?
To enable HTTPS for the console web application, the user interface to perform console functions, perform the indicated configuration steps.
NOTE: Before the Console Administrator Tool (CAT) can be used to enable HTTPS, IIS must be configured with the appropriate HTTPS bindings.
- Launch the Console Administrator Tool by double-clicking on the ConsoleAdministrator executable.
- The default location is:
C:\Program Files\Spirion Console\ConsoleAdministrator\ConsoleAdministrator.exe - If you previously upgraded from Identity Finder to Spirion, the default location is:
C:\Program File\Identity Finder\Identity Finder Console>ConsoleAdministrator>ConsoleAdministrator.exe - On Windows 2008 and later, there may be a UAC dialog prompt as Administrative privileges are required to run the Console Administrator Tool.
- The default location is:
- Select the Web Application Settings tab.
- In the Console Application group, select the appropriate setting for Enabled Protocols depending on your IIS bindings configuration:
- HTTP Only
- HTTPS Only
- HTTP and HTTPS
- If IIS is configured to "Require SSL" for the website or the Console application, then HTTPS Only must be selected.
- Click the Save button.
- Click the Reload button to instruct the IIS server to reload the configuration.
- Click the Test button at the bottom of the dialog.
- In the "Base Console's services address" field, enter:
- https://consoleserver/Console
- where consoleserver is the name or IP address of the enterprise console
- If the Services application is also using HTTPS, enter:
- https://consoleserver/Services
- where consoleserver is the name or IP address of the enterprise console
- If the Services application is not using HTTP, enter:
- http://consoleserver/Services
- where consoleserver is the name or IP address of the enterprise console
- Click the Test button
Enable HTTPS for the Services Web Application
To enable HTTPS for client/console communication, perform the indicated configuration steps.
NOTE: Before the Console Administrator Tool (CAT) can be used to enable HTTPS, IIS must be configured with the appropriate HTTPS bindings.
Procedure:
- Launch the Console Administrator Tool by double-clicking on the ConsoleAdministrator executable.
- The default location is:
C:\Program Files\Spirion Console\ConsoleAdministrator\ConsoleAdministrator.exe - If you previously upgraded from Identity Finder to Spirion, the default location is:
C:\Program File\Identity Finder\Identity Finder Console>ConsoleAdministrator>ConsoleAdministrator.exe
- The default location is:
- Select the Web Application Settings tab.
- In the Services Application group, select the appropriate setting for Enabled Protocols depending on your IIS bindings configuration:
- HTTP Only
- HTTPS Only
- HTTP and HTTPS
- If IIS is configured to "Require SSL" for the website or the Services application, then HTTPS Only must be selected.
- Click the Save button.
- Click the Reload button to instruct the IIS server to reload the configuration.
- Test the SSL configuration by clicking the Test button at the bottom of the dialog.
- In the "Base services address" field, enter https://the-ssl-server-name/Services and click Test.
- Testing the "Base Console's services address" is optional.
Endpoint Configuration
Identity Finder clients have a built-in security feature that prevent them from communicating with any console over HTTPS if the SSL certificate is not trusted.
- The SSL certificate used must be valid and signed by a certificate authority that is trusted by the endpoint.
- Additionally, the URL of the console server, as specified in the server URL setting, must be exactly the same as the server name specified in the certificate.
Windows Clients
Windows clients should not require any additional configuration to utilize the secure connection.
- However, if the SSL certificate is self-signed (e.g., signed by an internal/organizational CA), then the certificate authority must be specified in the trusted root certificate authority contained within the computer certificate store.
- If the certificate is not properly trusted or the console server specified in the server URL setting does not exactly match the server name specified in the certificate, the following errors may appear:
- Errors in the file endpointservice.log:
Exception: Service call failed (Context: RequestGuid. An HTTP processing error occurred). System Error: 12175.Failed to acquire an endpoint id.
- Errors in the client log:
- Identity Finder is configured to communicate with the Enterprise Console but the server specified in the server URL setting cannot be contacted (Unknown Error): https://consoleserver/services All communication with the Enterprise Console will fail.
- Check related Knowledge Base (KB) articles at http://support.identityfinder.com/ for further information.
If the errors above are generated because the CA is untrusted, perform either of the steps below to resolve the issue:
- Add the certificate authority that was used to sign the certificate to the trusted root certificate authority contained within the computer certificate store.
- Allow the client to ignore the fact that the certificate is unknown by configuring the setting Console\ignoreUnknownCA to either:
- "Allow untrusted CA"
- 1 (this may appear as "Enable" depending on the current version of the policy definitions).
- Because communication with the console may not be possible, this setting may need to be manually added in the appropriate location directly to the Windows Registry for current installations.
- If the errors above are generated because the console server specified in the Server URL setting does not exactly match the server name specified in the certificate, perform either of the steps below to resolve the issue:
- Update the server URL setting to use the exact name specified in the certificate.
- Issue a new certificate to use the name specified in the server URL setting.
- If IIS is configured to require or accept client certificates, the following error will appear in the endpointservice.log file:
Exception: Service call failed (Context: RequestGuid. End of file or no input: Operation interrupted or timed out). System Error: 12044.Failed to acquire an endpoint id.
Resolution
To resolve this issue, reconfigure IIS to ignore client certificates for the services application.
It is permissible to require or accept client certificates for the console application so long as the certificate is properly installed on all client systems used to access the console web application.
Linux
Linux clients, like Windows clients, should not require any additional configuration to utilize the secure connection.
- However, if the SSL certificate is self-signed (for example, signed by an internal/organizational CA), then the certificate authority details must be deployed with the Linux installation.
- If the certificate is not properly trusted or the console server specified in the server URL setting does not exactly match the server name specified in the certificate, review the errors listed above in the Windows section.
- If those errors are present a custom SSL certificate will need to be deployed with the Linux installation.
- The following article discusses in detail how to configure SSL for Linux manually:
Mac
Mac clients require several additional deployment steps to utilize the secure connection.
- Configuration details and troubleshooting information is available here: