Enterprise Server Configuration and Transfer Reference / Authentication and Authorization |
This topic assumes you have a signed root certificate or certificate bundle (root certificate with chained or intermediary certificates) from an authorized Certificate Authority to configure on your Aspera transfer server. If you need to request a certificate from a Certificate Authority (CA), see the article How to Generate a Certificate Signing Request (CSR) in the Aspera Support Knowledgebase.
This procedure describes how to install SSL certificates for an Aspera transfer server. The procedure uses three files:
The default filenames and locations can be changed by configuring settings in the transfer server's aspera.conf file, using asconfigurator commands:
# asconfigurator -x "set_http_server_data;cert_file,path/certfile.pem" # asconfigurator -x "set_http_server_data;key_file,path/keyfile.pem" # asconfigurator -x "set_server_data;cert_file,path/certfile.chain"
The commands add the following text to aspera.conf:
<http_server> ... <key_file>path/keyfile.pem</key_file> <!-- key file for asperahttpd --> <cert_file>path/certfile.pem</cert_file> <!-- cert file for asperahttpd --> ... </http_server> <server> ... <cert_file>path/certfile.chain</cert_file> <!-- cert file for asperanoded --> ... </server>
The aspera.conf is located in:
/opt/aspera/etc/aspera.conf
Restart the services asperacentral, asperahttpd, and asperanoded using the following commands:
# service asperacentral restart # service asperahttpd restart # service asperanoded restart
To verify the root certificate and the certificate chain, run the command-line tool openssl to connect to the asperanoded service. For example, assuming you are using the default node port (HTTPS 9092):
# /opt/aspera/bin/openssl s_client -connect myserver:9092
The output returned from this command will show a return value of 0 for success or 1 for failure.
Success: The following sample output shows that verification was successful because verify return is 0.
depth=2 C = US, O = "VeriSign, Inc.", OU = VeriSign Trust Network, OU = "(c) 2006 VeriSign, Inc. - For authorized use only", CN = VeriSign Class 3Public Primary Certification Authority - G5 verify error:num=20:unable to get local issuer certificate verify return:0
Failure: The following sample ouput shows that verification failed because verify return is 1.
depth=0 C = US, ST = California, L = Emeryville, O = IBM, OU = Aspera Inc IT Department, CN = *.asperafiles.com verify error:num=20:unable to get local issuer certificate verify return:1 depth=0 C = US, ST = California, L = Emeryville, O = IBM, OU = Aspera Inc IT Department, CN = *.asperafiles.com verify error:num=27:certificate not trusted verify return:1 depth=0 C = US, ST = California, L = Emeryville, O = IBM, OU = Aspera Inc IT Department, CN = *.asperafiles.com verify error:num=21:unable to verify the first certificate verify return:1
Success: The following example shows a successful verification for one root certificate and two intermediary certificates in the chain:
Certificate chain 0 s:/C=US/ST=California/L=Emeryville/O=IBM/OU=Aspera Inc IT Department/CN=*.asperafiles.com i:/C=US/O=Symantec Corporation/OU=Symantec Trust Network/CN=Symantec Class 3 Secure Server CA - G4 1 s:/C=US/O=Symantec Corporation/OU=Symantec Trust Network/CN=Symantec Class 3 Secure Server CA - G4 i:/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=(c) 2006 VeriSign, Inc. - For authorized use only/CN=VeriSign Class 3 Public Primary Certification Authority - G5 2 s:/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=(c) 2006 VeriSign, Inc. - For authorized use only/CN=VeriSign Class 3 Public Primary Certification Authority - G5 i:/C=US/O=VeriSign, Inc./OU=Class 3 Public Primary Certification Authority
Failure: The following example shows an unsuccessful verification, since only the root certificate is displayed.
Certificate chain 0 s:/C=US/ST=California/L=Emeryville/O=IBM/OU=Aspera Inc IT Department/CN=*.asperafiles.com i:/C=US/O=Symantec Corporation/OU=Symantec Trust Network/CN=Symantec Class 3 Secure Server CA - G4
If verification is unsuccessful, run the following command to inspect your certificate content:
# /opt/aspera/bin/openssl x509 -in certificate.crt -text -noout