Using MS SQL Cluster as the Backend Database10 minutes to read
PAM360 allows you to use MS SQL cluster as backend database. The steps to configure PAM360 to use MS SQL cluster as backend are significantly different from using a standalone SQL server as the backend database because PAM360 has been configured to connect to SQL server cluster only through SSL to ensure high level of security. To use a standalone SQL server as the backend database, the SSL certificate is created with the fully qualified DNS name of the SQL server and it imported in the LOCAL COMPUTER PERSONAL certificate store. In the SQL server configuration manager, the certificates matching the DNS name of the SQL server get listed in the certificate configuration screen. But, this procedure will not work in the case of SQL server cluster setup. In the case of SQL server cluster, you need to obtain the server certificate with the fully qualified DNS name of the failover clustered instance and install it on all the nodes in the failover cluster. For example, assume that you have a two-node cluster with nodes named test1.yourcompany.com and test2.yourcompany.com and a failover clustered instance of SQL Server named pam360cluster. To use the cluster with PAM360, you need to obtain a certificate for pam360cluster.yourcompany.com and install the certificate on both nodes.
To use MSSQL Always-On failover cluster, you need to add an entry in the pam360_key.key as instructed below:
You can find the master encryption key in masterkey.key file which is placed under <PAM360-Home>\conf directory. Using MS SQL Cluster as backend database involves the following topics:
1. Enable SSL Encryption in SQL Server1.1 Create an SSL Certificate and Install it in Windows Certificate Store (in the machine where SQL server is running)Prior to trying to connect PAM360 with SQL server, you need to enable SSL encryption in SQL Server. You may create an SSL Certificate and get it signed by a Certificate Authority (CA) OR it could be self-signed.
1.2 Generate the Certificate and get it Signed by a third-party CAYou can create the certificate using openssl and it involves two steps:
Use the following commands to create the certificate: Generating a private key: openssl genrsa -des3 -out server.key 2048 Use the server private key to create a certificate request. Enter the passphrase for the key, Common Name, hostname or IP address when prompted: openssl req -new -key server.key -out server.csr Here, in the place of Common Name, specify the FQDN of the SQL Server cluster instance.
1.3 Create a Self-Signed CertificateTo create a self-signed certificate and use it, carry out the following steps in one of the nodes where SQL server is installed: 1.3.1 Create a self-signed certificate using Powershell:
1.3.2 Exporting self-signed .pfx file:
1.3.3 Importing self signed .pfx file in all the nodes where SQL server is running:
1.3.4 Install the server certificate in PAM360:
2. Install the Server Certificate in all the Nodes where SQL Server is Running
3. Install the CA's Root Certificate in PAM360
4. Enable SSL Encryption in all the Nodes where SQL Server is Running
For copying the thumbprint, follow the steps detailed below to copy it properly:
5. Execute ChangeDB.batAfter completing the above steps, you need to execute ChangeDB.bat in PAM360. Refer to Step 1.1.4 in the section Using MS SQL Server as Backend of the help documentation for details. | |