Integration of Bitglass
This section lists the steps to integrate Bitglass with CipherTrust Manager.
Prerequisites
This section provides the prerequisites for integration of Bitglass with CipherTrust Manager.
Ensure that the CipherTrust Manager is installed and configured. For more details, refer to the CipherTrust Manager Documentation.
Bitglass communicates with the CipherTrust Manager using the KMIP interface. Ensure that the KMIP interface is configured on the CipherTrust Manager. Refer to CipherTrust Manager Administration Guide for details.
IP address of the CipherTrust Manager and port of the KMIP interface must be accessible from the Bitglass system.
CipherTrust Manager recognizes only registered KMIP clients. Ensure that each node of the Bitglass cluster is registered as a KMIP client on the CipherTrust Manager. Refer to KMIP Client Registration for more details.
Ensure that Bitglass has proper license for data at Rest Encryption. To check the license information in Bitglass, navigate to Settings > Software and Licenses > License Information.
Ensure that the required licenses are activated on CipherTrust Manager. For more details, refer to the CipherTrust Manager documentation.
Configuration on CipherTrust Manager
To configure the CipherTrust Manager, you need to perform the following steps:
Creating a User
To create a user, perform the following steps:
Log on to the CipherTrust Manager GUI.
Open the Access Management application.
On the left navigation pane, click Users. The Users page is displayed.
On the Users page, click Add User.
On the Add User page, provide the following details:
Select the required Connection Type
Select the checkbox against the required Allowed Client Type.
Enter Full Name
Enter Username
Enter the desired Password. Re-enter the password in the Password Match field.
Click Add User. The newly created user will now appear on the Users page.
Assigning User to a Group
Perform the following steps to add user to a group:
Navigate to the Users page.
Click the ellipsis button (...) corresponding to the user that you created in the previous step.
Click Edit/View.
Click Group Memberships > Add Group.
In the search bar, enter the desired Group name and select the check box corresponding to it. For example, Key Admins or Key Users.
Click Add Group.
Creating or Adding a CA (Optional)
Note
Creating a CA is an optional step in this integration. However, it is recommended to select the CA carefully, as it will be used throughout the process.
Select the Local CA tab if you want to create a Local CA OR select the External CA tab if you wish to add the External CA.
To create/add a Self-signed local CA, perform the following steps:
Navigate to CA > Local. Select Add Local CA, the Add Local CA page appears.
Provide the required information and click Add Local CA. The created Local CA will appear under Pending CAs section.
Click the ellipsis against the Local CA that you created and select the option Self-sign.
Select a valid duration for the Local CA. Click Save.
To add an external CA, perform the following steps:
Navigate to CA > External. The External Certificate Authorities page appears. Select Add External CA, the Add External Certificate page appears.
Provide the required information.
If you want to upload the external CA, select the File Upload option and click Upload Certificate. Browse and select the required External CA.
OR
Select Text and paste the contents of External Certificate.
Click Add External CA.
Registering a KMIP Client
You can register a KMIP client on the CipherTrust Manager through:
Auto Registration
Manual Registration
Log on to the CipherTrust Manager.
Go to Products > KMIP.
Create Client Profile using the following steps:
Navigate to Client Profile and click Add Profile.
Add a Profile Name.
Click Save. The new profile is created.
Create Registration Token using the following steps:
Go to Registration Token and click New Registration Token > Begin.
Add a Name Prefix.
Specify a Token Lifetime value along with the Client Capacity for the token.
Click Select CA.
Select the CA type as Local/External depending on CA that you created above.
Select the appropriate CA from the dropdown menu and click Select Profile.
Select the Client Profile from the dropdown which you have created in the above step.
Click Create Token.
Copy the value of the Token created and click Done.
Note
If you are using External CA then you can select the external CA that you created and uploaded on the CipherTrust Manager.
Turn ON Auto Registration using the following steps:
Go to Admin Settings > Interfaces.
Click the ellipsis button (...) corresponding to the kmip interface.
Click View/Edit.
On the Interface Detail window, perform the following:
Select the Interface Mode as TLS, verify client cert, user name taken from client cert, auth request is optional.
Select Auto Registration checkbox.
Paste the
Registration Token
.Add the CA (Local or External) to the list of Trusted CAs. The CA will reflect under the dropdown menu of Local/External Trusted CAs depending upon CA that you created above.
Click Update.
Log on to the CipherTrust Manager.
Go to Products > KMIP.
Create Client Profile using the following steps:
Go to Client Profile and click Add Profile.
Add a Profile Name.
Select CN in Username Location in Certificate.
Click Certificate Details.
You can either paste the content of a generated
client.csr
or you can create one, by filling in the required details.Click Save.
Create Registration Token using the following steps:
Go to Registration Token and click New Registration Token > Begin.
Add a Name Prefix.
Specify a Token Lifetime value along with the Client Capacity for the token.
Click Select CA.
Select the CA type as Local/External depending on the CA type that you created above.
Select the appropriate CA from the dropdown menu and click Select Profile.
Select the Client Profile from the dropdown which you have created in the above step.
Click Create Token.
Copy the value of the Token created and click Done.
Note
If you are using External CA then you can select the external CA that you created and uploaded on the CipherTrust Manager.
Go to Registered Clients and click Add Client.
Specify client name and paste the Registration Token that you generated in the above step.
Note
If you are using external CA then you can either upload the file using Upload Certificate option or select the Text option to paste the signed client certificate in the Client Certificate field.
Click Save to save the Client Certificate.
Configuring the KMIP Interface
The KMIP interface can be configured through:
Go to Admin Settings > Interfaces.
On the KMIP Interface, click the ellipsis button (...) and then click View/Edit.
Select the Auto Registration checkbox if you auto-registered your KMIP client and paste the value of the registration token that you created.
Note
By default, the Auto Registration is disabled.
Select the mode as TLS, verify client cert, user name taken from client cert, auth request is optional.
Specify selections for Local CA for Automatic Server Certificate Generation as desired.
Note
Local CA for Automatic Server Certificate Generation should be set to Turn off auto generation from Local CA in case of External CA.
Depending upon the CA that you created above, select an option from the following:
If you are using Local CA then select the CA under Local Trusted CAs
If you are using External CA then select the CA under External Trusted CAs provided you have the external CA that you created and uploaded on the CipherTrust Manager. For more information on creating or uploading CA, refer to Creating or Adding a CA.
Further, you need to configure the following:
Creating Key (using API Playground)
At the top right corner of the main toolbar, click API to go to the API playground.
Click Authenticate on the top right corner. Specify username and password, then click Post.
Note
The session will be valid for 300 seconds. You can also authenticate later if you are unable to perform the following steps within this time frame.
Go to Keys section in the left sidebar. Click Create - Post.
Specify the following content in the body, and click POST. Specify a value equal to or less than 60 characters.
{ "idSize": 60 }
Here idSize:60 will be set to the ID of the key, which will be further used while configuring the policy file of the Bitglass.
Caution
Specifying a value greater than 60 leads to integration failure. To view the list of possible errors, go to the Troubleshooting section.
Updating the Key Attributes
In the CipherTrust Manager UI, go to Keys and click the Key you have created using API.
Ensure that Exportable option is checked.
Select the user created above as the Key Owner.
Click Update.
Configuration on Bitglass
Creating a Key Store
In the Bitglass UI, go to Settings > Encryption.
Click the Add (+) button and specify the following:
Connection name
IP Address of the CipherTrust Manager
Port of the CipherTrust Manager
Username of the CipherTrust Manager. For Example, bitglass
Password of the CipherTrust Manager
Upload the downloaded CA Certificate
Click Create to create a key store.
After performing the above steps, you can check the logs under the CipherTrust Manager. A new connection should be generated under logs.
Creating a Key
In the Bitglass UI, go to Settings > Encryption.
Click the Add (+) button and specify the name.
Select the Key Store that is created in the Creating a Key Store section from the Key Store dropdown.
Click Create to create a key vault.
After creating a key, use the following steps to perform the Rekey operation:
From the Key Vaults, choose the key that is created in the Creating a Key section.
Click Generate New Key and click Continue. A new key will be created.
The status of old key will be Decrypt only
and the new key is Active
.
On the CipherTrust Manager, both the keys (new key and old key) are active. Moreover, you can also check the new key in the logs of the CipherTrust Manager.