Secure the SEAL Operator Services¶
For security reasons, SEAL Systems strongly recommends configuring the TLS encryption. This is also one step to get rid off the annoying certificate warnings in the browser.
Configure the TLS Encryption¶
-
Get a TLS certificate in PEM format, see the Requirement.
-
Replace the following file containing the private key:
C:\ProgramData\SEAL Systems\config\tls\key.pem
-
Replace the following file containing the public certificate:
C:\ProgramData\SEAL Systems\config\tls\cert.pem
-
Configure the path to the directory containing the certificate files.
env: service: any: tag: any: TLS_DIR: 'C:\ProgramData\SEAL Systems\config\tls'
-
If the self-signed certificates are used, the following key has to be set to
0
:env: service: any: tag: any: NODE_TLS_REJECT_UNAUTHORIZED: '0'
Caution - security gap
Setting
NODE_TLS_REJECT_UNAUTHORIZED
to0
in a productive system is a serious security gap! Only use it for test purposes!Hint - certificate
Unless
NODE_TLS_REJECT_UNAUTHORIZED
is set to0
or specified at all, the certificate has to contain the correct IP address or hostname since this is used for the authorization check.
Specify a CA Certificate (Unnecessary in Most Cases)¶
If a CA certificate has been specified, the SEAL Operator services require a client certificate from each client, that means from all other SEAL Operator services and the Web browser. This would require corresponding properties of the certificate and would be a high effort. A complete explanation of how to use client certificates is beyond the scope of this documentation.
For the rare other cases, this is how you configure a CA certificate with the SEAL Operator Services:
-
Save the CA certificate to the following file:
C:\ProgramData\SEAL Systems\config\tls\ca.pem
Next Step¶
Continue with: Secure Consul