As we reach the end of September 2024, ThreadFix version 3.x on-premises has officially reached its End-of-Life. Therefore, there is no longer support or updates for this version of the product. We have fully transitioned our product and development teams to focus ThreadFix SaaS and migrating all customers over from the on-premises versions. Our Customer Success and Support teams are here to help you in migrating to ThreadFix SaaS and maximizing the value you see from this improved offering from Coalfire. This is the next phase of ThreadFix and our team is looking forward to continuing to support you on this journey.
Adding Custom Root Certificates for Authorization
You will learn
How to add custom root certificates to the Authorization service.
Prerequisites
Audience: IT Professional
Difficulty: Intermediate
Time needed: Approximately 10 minutes
Tools required: kubectl, Helm
If ThreadFix is set up to authenticate to an external service over TLS, users may need to import the server's certificate into the ThreadFix Authorization’s Java Keystore. Otherwise the following error may be received:
...SunCertPathBuilderException: unable to find valid certification path to requested target
Obtain Certificate
There are multiple ways to obtain the certificate, the following covers using Chrome, OpenSSL, and Root Certificate Authorities:
Using Chrome
Navigate to the site via the Chrome browser.
Right-click within the page and select "Inspect".
Navigate to the Security tab and click the View certificate button.
From the Details tab click the Copy to File button. Note: Mac users may not see a Copy to File button and instead should drag-and-drop the certificate to a desired directory.
Select Base64 and save the .cer file to the desired directory.
More information can be found in the Exporting Certificate Authorities (CAs) from a Website guide.
Using OpenSSL
Use the following command on a headless server:
openssl s_client -connect ${HOST}:${PORT} > certfile
Root Certificate Authorities (CAs)
For some root or intermediate Certificate Authorities (CAs) the steps may vary. For example, on an Active Directory Certificate Services server, the root CA may be found at http://<host-name>/certsrv/certcarc.asp, and users can download the .cer file with the text "Download CA certificate".
Root CAs allow ThreadFix to talk to all sites with certificates pointing to the root CA. If the user’s company has a root CA that all of its internal servers use, that root CA should be imported to the Java Keystore with the steps below. With this ThreadFix shouldn't have a certificate trust issue for any of the user’s servers.
Import Certificate
In the following instructions replace <certificate> with the name of the desired root certificate file.
Enter the following commands on a command line to perform the described action.
Copy the root certificate to the server with kubectl access.
Add the Denim Group Helm repository if not present:
helm repo add denimgroup https://threadfix-downloads.s3-us-west-2.amazonaws.com/helm/
Get the Helm release name for the ThreadFix instance:
TF_RELEASE=$(helm ls | grep threadfix | awk '{print $1}')
Get the current installed version of ThreadFix:
TF_VERSION=$(helm ls --filter "$TF_RELEASE" | grep -o 'threadfix-[Az0-9\.\-]*' | sed 's|threadfix-||g')
Set AppSec pod and deployment env vars for later use:
Set the certfile name:
Validate that the generated parameters are set:
Copy the certificate to the appsec pod:
Create a copy of the default cacerts file:
Add the certificate to the Java truststore:
Copy the generated cacerts file to the user machine:
Create a configmap with the copied cacerts file:
Create myValues dir if not present:
Create a file named 'auth-ca.yaml':
Export current Helm values:
Run helm upgrade to apply the new configuration:
The appsec pod will automatically restart. The progress can be viewed with:
Note: If the appsec and appsecimporter pods do not automatically restart, they can be manually restarted with the following:
Table of Contents
www.threadfix.it | www.coalfire.com
Copyright © 2024 Coalfire. All rights reserved.
This Information Security Policy is CoalFire - Public: Distribution of this material is not limited.