- Log on to the ePO console.
- Go to the Configure Database Settings page:
https://<ePO_server_name>:port/core/config - In the "SSL communication with database server" section, select Always use SSL and require a CA-signed server certificate.
NOTE: The selectable text displayed varies based on the version of ePO installed.
- Verify the certificate validation by clicking Test Connection. The connection response message displays as
"Test failed: Network error IOException: Certificate not verified."
NOTE: Future ePO versions might display this error as"Test failed: Network error IOException: bad_certificate(42)."
- Click Apply.
- For the connection to be successful, the default Java trust store must trust the certificate configured in the SQL Server. To trust a certificate, that certificate needs to be in the trust store. Import the SQL Server certificate into the Java trust store using the following commands:
- ePO 5.10:
CD c:\Program Files (x86)\McAfee\ePolicy Orchestrator\JRE\lib\security
"C:\Program Files (x86)\McAfee\ePolicy Orchestrator\JRE\bin\keytool.exe" -import -alias SOME_UNIQUE_NAME -file CA_CERTIFICATE -keystore cacerts -storetype jks
'SOME_UNIQUE_NAME' is the alias name used to identify the imported certificate in the keystore. CA_CERTIFICATE is the local path to the CA certificate that's used to sign the certificate configured on the SQL Server.
NOTE: The keystore password ischangeit .
Example:"c:\Program Files (x86)\McAfee\ePolicy Orchestrator\JRE\bin\keytool.exe" -import -alias MySQLServerCertificate -file sqlserver.cer -keystore cacerts
NOTE: The example command above assumes thatsqlserver.cer is placed in the current working directory. For example,c:\Program Files (x86)\McAfee\ePolicy Orchestrator\JRE\lib\security .
- ePO 5.3.3 and later:
CD C:\Program Files (x86)\McAfee\ePolicy Orchestrator\Server\keystore
"C:\Program Files (x86)\McAfee\ePolicy Orchestrator\JRE\bin\keytool.exe" -import -alias SOME_UNIQUE_NAME -file CA_CERTIFICATE -keystore cacerts.p12 -storetype pkcs12
- ePO 5.3.2 and earlier:
CD C:\Program Files (x86)\McAfee\ePolicy Orchestrator\JRE\lib\security
"C:\Program Files (x86)\McAfee\ePolicy Orchestrator\JRE\bin\keytool.exe" -import -alias SOME_UNIQUE_NAME -file CA_CERTIFICATE -keystore cacerts
- ePO 5.10:
- Import the CA certificate into the Windows certificate store, Trusted Root Certificate Authority. This step is needed to enforce certificate validation between the local Agent Handler and the SQL database.
- Click Apply.
- Restart the ePO services:
- Click Start, Run, type
services.msc , and click OK. - Right-click the following services and select Restart:
McAfee ePolicy Orchestrator x.x.x Application Server
McAfee ePolicy Orchestrator x.x.x Server
McAfee ePolicy Orchestrator x.x.x Event Parser
- Click Start, Run, type
- Log on to the ePO console, navigate
to https://<ePO_server_name>:port/core/config , and test the database connection.
The database test is successful.
(B) Enforce certificate validation from the Remote Agent Handler to the database:
- If the Remote Agent Handler isn't already installed:
- Import the CA certificate into the Windows certificate store, Trusted Root Certificate Authority of the Agent Handler system.
- Install the Agent Handler by directing it to the ePO server. The Agent Handler services are installed with the certificate validation option set. The Agent Handler uses the CA certificate in the Windows certificate store to connect to the database and validate the SQL Server certificate.
- If the Remote Agent Handler is already installed:
- Import the CA certificate into the Windows certificate store, Trusted Root Certificate Authority of the Remote Agent Handler system.
- Edit
C:\Program Files (x86)\McAfee\Agent Handler\DB\db.properties and set thedb.param.ssl=authenticate . - Restart all Agent Handler services.
- Import the CA certificate used to sign the certificate issued to the rollup ePO SQL database into the default Java trust store. To import, navigate to the following directory and use the keytool to import the certificate and trust the certificate:
- ePO 5.10:
CD C:\Program Files (x86)\McAfee\ePolicy Orchestrator\JRE\lib\security
"C:\Program Files (x86)\McAfee\ePolicy Orchestrator\JRE\bin\keytool.exe" -import -alias SOME_UNIQUE_NAME -file CA_CERTIFICATE -keystore cacerts -storetype jks
'SOME_UNIQUE_NAME ' is the alias name used to identify the imported certificate in the keystore.' CA_CERTIFICATE 'is the local path to the CA certificate that is used to sign the certificate configured on the SQL Server.
NOTE: The keystore password ischangeit .
- ePO 5.3.3 and later:
CD C:\Program Files (x86)\McAfee\ePolicy Orchestrator\Server\keystore
"C:\Program Files (x86)\McAfee\ePolicy Orchestrator\JRE\bin\keytool.exe" -import -alias SOME_UNIQUE_NAME -file CA_CERTIFICATE -keystore cacerts.p12 -storetype pkcs12
- ePO 5.3.2 and earlier:
CD C:\Program Files (x86)\McAfee\ePolicy Orchestrator\JRE\lib\security
"C:\Program Files (x86)\McAfee\ePolicy Orchestrator\JRE\bin\keytool.exe" -import -alias SOME_UNIQUE_NAME -file CA_CERTIFICATE -keystore cacerts
- ePO 5.10:
- Open the Registered Server UI and configure the Registered Server of server type ePO:
- Click Menu, Configuration, Registered Servers.
- Select a server type of ePO.
- Configure all details of the remote ePO database, and for SSL communication with the database server. Select Always use SSL and require a CA-signed server certificate.
- Click Save.
- Restart the ePO services:
- Click Start, Run, type
services.msc , and click OK. - Right-click the following services and select Restart:
McAfee ePolicy Orchestrator x.x.x Application Server
McAfee ePolicy Orchestrator x.x.x Server
McAfee ePolicy Orchestrator x.x.x Event Parser
- After a successful restart of all ePO services, log on to the ePO console, edit the above configured ePO Registered Server, and test the connection.
The database connection is successful.
- Click Start, Run, type