Registering Cloudera Navigator Encrypt with Key Trustee Server
Prerequisites
Functioning Navigator Key Trustee Server
After Installing Cloudera Navigator Encrypt on a host, you must register the host with Navigator Key Trustee Server. If you have not yet installed Navigator Key Trustee Server, see Installing Cloudera Navigator Key Trustee Server for instructions.
Key Trustee Server Organization
To register with Key Trustee Server, you must have an existing organization. See Managing Key Trustee Server Organizations for information on creating and viewing organizations on a Key Trustee Server.
Master Password
- If you choose a passphrase (single), it must be between 15 and 32 characters long.
- If you choose passphrase (dual), both must be between 15 and 32 characters long.
- If you choose the RSA option, enter a path to the RSA key file, and if it has RSA passphrase, enter it for this private key.
Registering with Key Trustee Server
After Installing Cloudera Navigator Encrypt on a host, you must register the host with Navigator Key Trustee Server to be able to encrypt and decrypt data. The following section lists the command options for registering your Navigator Encrypt client.
If the TLS certificate is signed by an internal CA that is not publicly recognized, then you must add the root certificate to the host certificate truststore of each Navigator Encrypt client. For details, see Setting Up TLS for Navigator Encrypt Clients.
sudo navencrypt register --server=https://keytrustee01.example.com:11371 --passive-server=https://keytrustee02.example.com:11371 --org=your_keytrustee_org --auth=org_auth_token
Command Option | Explanation |
---|---|
--clientname=my_client_name | User-defined unique name for this client to be used for administration and reports. You can verify your client name in the /etc/navencrypt/keytrustee/clientname file. |
--server=https://keytrustee01.example.com:11371 | Target Active Key Trustee Server for key storage. Replace keytrustee01.example.com:11371 with the hostname and port of the Active Key Trustee Server. The default port is 11371. |
--passive-server=https://keytrustee02.example.com:11371 | Target Passive Key Trustee Server for key storage. Replace keytrustee02.example.com:11371 with the hostname and port of the Passive Key Trustee Server. The default port is 11371. |
--org=your_keytrustee_org | Key Trustee organization name configured by the Key Trustee Server administrator |
--auth=org_auth_token | Organization authorization token, a pre-shared secret by the Navigator Key Trustee Server administrator |
--skip-ssl-check | Skip SSL certificate verification. Use with self-signed certificates on the Navigator Key Trustee Server |
--trustee | Add trustees for retrieval of the master key |
--votes | Configure voting policy for trustees |
--recoverable | Master Key will be uploaded without encrypting it with your local GPG Navigator Key Trustee |
--scheme "<scheme>" | Key Trustee Server scheme that Navigator Encrypt uses for public key operations. Specify "http" or "https". |
--port | Key Trustee Server port that Navigator Encrypt uses for public key operations. |
Registering with Previous Versions of Key Trustee Server
By default, new installations of Navigator Key Trustee Server 5.4.0 use a single HTTPS port for key storage and public key operations. Previous versions and upgrades use separate ports for key storage and public key operations. For backward compatibility, Navigator Encrypt 3.7.0 introduces the --scheme and --port parameters for the navencrypt register command.
sudo navencrypt register --server=https://keytrustee.example.com:443 --org=key_trustee_org --auth=auth_token --scheme "http" --port 80
Navigator Encrypt versions lower than 3.7.0 do not support the --scheme and --port parameters. For these versions of Navigator Encrypt, you must ensure that the Key Trustee Server is configured to use port 443 (HTTPS) for key storage and port 80 (HTTP) for public key operations.
Navigator Encrypt versions lower than 3.8.0 do not support the --passive-server parameter.
Updating Key Trustee Server Ports
The navencrypt register command does not provide the ability to change the ports for existing registrations. If the Key Trustee Server ports are changed, you must update /etc/navencrypt/keytrustee/ztrustee.conf with the new port and scheme parameters (HKP_PORT and HKP_SCHEME, respectively).
{ "LOCAL_FINGERPRINT": "2048R/182AAA838DC300AC334258D8E7F299BFB68A6F6F", "REMOTES": { "kts01.example.com": { "REMOTE_FINGERPRINT": "4096R/AF6400E12DC149799CA8CE6BF1604C34D830DE20", "REMOTE_SERVER": "https://kts01.example.com", "DEFAULT": true, "SSL_INSECURE": false, "PROTOCOL": "json-encrypt" } } }
In this example, the Key Trustee Server (keytrustee.example.com) is using the default configuration of port 443 (HTTPS) for key storage and port 80 (HTTP) for public key operations.
{ "LOCAL_FINGERPRINT": "2048R/182AAA838DC300AC334258D8E7F299BFB68A6F6F", "REMOTES": { "kts01.example.com": { "REMOTE_FINGERPRINT": "4096R/AF6400E12DC149799CA8CE6BF1604C34D830DE20", "REMOTE_SERVER": "https://kts01.example.com:11371", "HKP_PORT": 11371, "HKP_SCHEME": "https", "DEFAULT": true, "SSL_INSECURE": false, "PROTOCOL": "json-encrypt" } } }
Updating Navigator Encrypt for High Availability Key Trustee Server
If you registered a Navigator Encrypt client with a standalone Key Trustee Server, and then configured high availability for Key Trustee Server, you can edit /etc/navencrypt/keytrustee/ztrustee.conf to enable the client to take advantage of the high availability features. The following example shows the contents of ztrustee.conf after adding the required REMOTE_SERVERS entry (changes in bold):
{ "LOCAL_FINGERPRINT": "2048R/182AAA838DC300AC334258D8E7F299BFB68A6F6F", "REMOTES": { "kts01.example.com": { "REMOTE_FINGERPRINT": "4096R/AF6400E12DC149799CA8CE6BF1604C34D830DE20", "REMOTE_SERVER": "https://kts01.example.com:11371", "HKP_PORT": 11371, "HKP_SCHEME": "https", "DEFAULT": true, "REMOTE_SERVERS": ["https://kts01.example.com:11371", "https://kts02.example.com:11371"], "SSL_INSECURE": true, "PROTOCOL": "json-encrypt" } } }
Configuration Files
The installer creates the /etc/navencrypt directory. All configuration settings are saved in this directory. Do not delete any file from /etc/navencrypt. These files provide the necessary information for the Navigator Encrypt application to function properly.
Change Master Key by UUID
$ cat /etc/navencrypt/control { "app": { "name": "navencrypt", "version": "3.5" }, "keys": { "master": { "type": "single-passphrase", "uuid": "qMAKRMdk4HVbhfzR79cp9w92YBmNHJ5nSLhfd8ZVo6L" }, "targets": [] } }
$ sudo navencrypt key --change --new-master-key-uuid=qMAKRMdk4HVbhfzR79cp9w92YBmNHJ5nSLhfd8ZVo6L >> Type your OLD Master key Type MASTER passphrase 1: Type MASTER passphrase 2: Verifying Master Key against Navigator Key Trustee (wait a moment)... OK Changing Master key (wait a moment)... * Setting up EXISTING MASTER key... * Uploading CONTROL content... * Re-encrypting local keys... Master key successfully changed.
<< Cloudera Navigator Encrypt | ©2016 Cloudera, Inc. All rights reserved | Preparing for Encryption Using Cloudera Navigator Encrypt >> |
Terms and Conditions Privacy Policy |