To use Cognos product documentation, you must enable JavaScript in your browser.

Configuring Cognos 8 Components to Use a Third-party Certificate Authority

By default, Cognos 8 components use their own certificate authority (CA) service to establish the root of trust in the Cognos security infrastructure. You can configure Cognos 8 components to use another certificate authority, if you already have an existing third-party certificate authority, such as iPlanet or Microsoft, in your reporting environment.

When you configure Cognos 8 components to use a third-party certificate authority, ensure that you specify the same information in both the command line utility tool and in Cognos Configuration.

To configure Cognos 8 components to use your third-party certificate authority, you must

      

generate Cognos security keys and certificate signing requests to use with your third-party CA

      

submit the Cognos security keys and certificates to your third-party certificate authority

      configure Cognos 8 components to use a third-party certificate authority

Generate Keys and Certificate Signing Requests 

Use the command line utility to generate all the keys for the Cognos key stores and to generate the certificate signing requests (CSR).

The following table lists the options for the command-line tool used to generate keys and signing requests.

Command

Description

Main operation mode

 

-c

Create a new CSR

-i

Import a certificate

Operation modifiers

 

-s

Work with the signing identity

-e

Work with the encryption identity

-T

Work with the trust store (only with -i)

Information Flags

 

-d

DN to use for certificate

-r

CSR or certificate file location (depends on mode)

-t

certificate authority certificate file (only with -i)

-p

Key Store password (must be provided)

-a

Key pair algorithm. RSA or DSA.

Default: RSA

-D

Directory location

The following sample values are used:

Property

Value

Signing certificate DN

CN=SignCert,O=MyCompany,C=CA

Encryption certificate DN

CN=EncryptCert,O=MyCompany,C=CA

Key store password

password

Steps
  1. In the c8_location\configuration directory, back up the cogstartup.xml file to a secure location.

  2. Back up the contents of the following directories to a secure location:

  3. Using Cognos Configuration, export the configuration in clear text by doing the following:

  4. Go to the c8_location\bin directory.

  5. Create the certificate signing request for the signing keys by typing the following command:

    On UNIX or Linux, type

    ThirdPartyCertificateTool.sh -c -s -d "CN=SignCert,O=MyCompany,C=CA" -r signRequest.csr -D ../configuration/signkeypair -p password

    On Windows, type

    ThirdPartyCertificateTool.bat c -s -d "CN=SignCert,O=MyCompany,C=CA" -r signRequest.csr -D ../configuration/signkeypair -p password

    Tip: UNIX or Linux filenames are case-sensitive and must be entered exactly as shown.

    You can safely ignore any warnings about logging.

    The command creates the jSignKeystore file in the signkeypair directory, sets the specified password, creates a new keypair and stores it in the keystore, and exports the signRequest.csr file to the c8_location\bin directory.

  6. Create the certificate signing request for the encryption keys by typing the following command:

    On UNIX or Linux, type

    ThirdPartyCertificateTool.sh -c -e -d "CN=EncryptCert,O=MyCompany,C=CA" -r encryptRequest.csr -D ../configuration/encryptkeypair -p password

    On Windows, type

    ThirdPartyCertificateTool.bat -c -e -d "CN=EncryptCert,O=MyCompany,C=CA" -r encryptRequest.csr -D ../configuration/encryptkeypair -p password

    You can safely ignore any warnings about logging.

    The command creates the jEncKeystore file in the encryptkeypair directory, sets the specified password, creates a new keypair and stores it in the keystore, and exports the encryptRequest.csr file to the c8_location\bin directory.

  7. Copy the signRequest.csr and encryptRequest.csr files that were generated in steps 5 and 6 to a directory that is accessible by your third-party certificate authority.

  8. Input the signRequest.csr and encryptRequest.csr files into the third-party certificate authority.

    The certificate authority produces a signing certificate and an encryption certificate.

    For more information, see your third-party CA documentation.

  9. Copy the contents of the signing certificate into a file named signCertificate.cer.

  10. Copy the contents of the encryption certificate into a file named encryptCertificate.cer

  11. Find the root CA certificate for the certificate authority and copy the contents into a file named ca.cer.

  12. Copy ca.cer, signCertificate.cer, and encryptCertificate.cer to c8_location/bin.

    These files must be PEM (Base-64 encoded ASCII) format.

  13. Import the signing certificate from step 10 into the Cognos signing key store by typing the following command:

    On UNIX or Linux, type

    ThirdPartyCertificateTool.sh -i -s -r signCertificate.cer -D ../configuration/signkeypair -p password -t ca.cer

    On Windows, type

    ThirdPartyCertificateTool.bat-i -s -r signCertificate.cer -D ../configuration/signkeypair -p password -t ca.cer

    You can safely ignore any warnings about logging.

    The command reads the signCertificate.cer and ca.cer files in the c8_location\bin directory and imports the certificates from both files into the jSignKeystore file in the signkeypair directory using the specified password.

  14. Import the encryption certificate from step 11 into the Cognos encryption key store by typing the following command:

    On UNIX or Linux, type

    ThirdPartyCertificateTool.sh -i -e -r encryptCertificate.cer -D ../configuration/encryptkeypair -p password -t ca.cer

    On Windows, type

    ThirdPartyCertificateTool.bat -i -e -r encryptCertificate.cer -D ../configuration/encryptkeypair -p password -t cacert.cer

    You can safely ignore any warnings about logging.

    The command reads the encryptCertificate.cer and ca.cer files in the c8_location\bin directory and imports the certificates from both files into the jEncKeystore file in the encryptkeypair directory using the specified password.

  15. Import the CA certificate from step 12 into the Cognos trust store by typing the following command:

    On UNIX or Linux, type

    ThirdPartyCertificateTool.sh -i -T -r ca.cer -D ../configuration/signkeypair -p password

    On Windows, type

    ThirdPartyCertificateTool.bat -i -T -r ca.cer -D ../configuration/signkeypair -p password

    The command reads the ca.cer file and imports the contents into the jCAKeystore file in the signkeypair directory using the specified password.

The certificates are now ready to be configured for Cognos 8.

Configure Cognos 8 Components to Run Within a Third-party Certificate Authority 

You must configure each Cognos computer to use an external certificate authority by setting the appropriate property in Cognos Configuration.

By setting this property, Cognos 8 components assume that all required keys have been generated and vetted by the external certificate authority.

Ensure that the key store locations and password in Cognos Configuration match the ones you typed in the command-line tool.

Steps
  1. Start Cognos Configuration.

  2. In the Explorer window, under Security, Cryptography, click Cognos.

  3. In the Properties window, under Certificate Authority settings property group, click the Value box next to the Use third party CA property and then click True.

    Note: When you set this property to true, all properties for the certificate authority and identity name are ignored.

  4. Configure the following properties to match the ones you typed in the command line utility:

  5. From the File menu, click Save.

  6. If you want to start the Cognos 8 service, from the Actions menu, click Start.

    This action starts all installed services that are not running. If you want to start a particular service, select the service node in the Explorer window and then click Start from the Actions menu.