Intel Security Libraries Configuration Settings
Note
All the answer file options would remain common for containerized K8s deployments with the except of URLS where Kubernetes DNS would be used. The respective configMap.yml
for each service and agent would carry the defaults for the same when built under <working directory>/k8s/manifests/<service/agent/db names>
SGX Host Verification Service
Installation Answer File Options
Key | Sample Value | Description |
---|---|---|
CMS_BASE_URL | https://< IP address or hostname for CMS >:8445/cms/v1/ | Base URL of the CMS |
AAS_API_URL | https://< IP address or hostname for AAS >:8444/aas/v1 | Base URL of the AAS |
SCS_BASE_URL | https://< IP or hostname of SCS >:9000/scs/sgx/ | Base URL of SCS |
SHVS_DB_PORT | 5432 | Defines the port number for communication with the database server. By default, with a local database server installation, this port will be set to 5432. |
SHVS_DB_NAME | pgshvsdb | Defines the schema name of the database. If a remote database connection will be used, this schema must be created in the remote database before installing the SGX Host Verification Service |
SHVS_DB_USERNAME | aasdbuser | Username for accessing the database. If a remote database connection will be used, this user/password must be created and granted all permissions for the database schema before installing the SGX Host Verification Service. |
SHVS_DB_PASSWORD | aasdbpassword | Password for accessing the database. If a remote database connection will be used, this user/password must be created and granted all permissions for the database schema before installing the SGX Host Verification Service. |
SHVS_DB_HOSTNAME | localhost | Defines the database server IP address or hostname. This should be the loopback address for local database server installations but should be the IP address or hostname of the database server if a remote database will be used. |
SAN_LIST | 127.0.0.1,localhost | Comma-separated list of IP addresses and hostnames that will be valid connection points for the service. Requests sent to the service using an IP or hostname not in this list will be denied, even if it resolves to this service |
SHVS_ADMIN_USERNAME | shvsuser@shvs | Username for a new user to be created during installation. |
SHVS_ADMIN_PASSWORD | shvspassword | Password for the user to be created during installation. |
CMS_TLS_CERT_SHA384 | < Certificate Management Service TLS digest> | SHA384 hash of the CMS TLS certificate |
BEARER_TOKEN | Installation token from AAS | |
SHVS_PORT | 13000 | SGX Host Verification Service HTTP Port |
SHVS_SCHEDULER_TIMER | 10 | SHVS Scheduler timeout |
SHVS_HOST_PLATFORM_EXPIRY_TIME | 240 | SHVS Host Info Expiry time |
SHVS_AUTO_REFRESH_TIMER | 120 | SHVS Auto-refresh timeout |
Configuration Options
The SGX Host Verification Service configuration is in path /etc/shvs/config.yml.
Command-Line Options
The SGX Host Verification Service supports several command-line options that can be executed only as the Root user:
Syntax:
shvs \<command\>
Available Commands
Help
shvs help
Start
shvs start
Stop
shvs stop
Status
shvs status
Uninstall
shvs uninstall \[\--purge\]
Version
shvs version
Shows the version of the service.
Setup [task]
Runs a specific setup task.
Syntax:
shvs setup [task]
Setup tasks and its Configuration Options for SGX Host Verification Service
Available Tasks for setup:
all Runs all setup tasks
Required env variables:
- get required env variables from all the setup tasks
Optional env variables:
- get optional env variables from all the setup tasks
shvs setup database
- Available arguments are:
SHVS_DB_HOSTNAME
SHVS_DB_PORT
SHVS_DB_USERNAME
SHVS_DB_PASSWORD
SHVS_DB_NAME
SHVS_DB_SSLMODE <disable|allow|prefer|require|verify-ca|verify-full>
SHVS_DB_SSLCERT path to where the certificate file of database. Only applicable
for db-sslmode=<verify-ca|verify-full. If left empty, the cert
will be copied to /etc/shvs/shvs-dbcert.pem
alternatively, set environment variable
- SHVS_DB_SSLCERTSRC <path to where the database ssl/tls certificate file>
mandatory if db-sslcert does not already exist
alternatively, set environment variable
update_service_config Updates Service Configuration
Required env variables:
- SHVS_PORT : SGX Host Verification Service port
- SHVS_SERVER_READ_TIMEOUT : SGX Host Verification Service Read Timeout
- SHVS_SERVER_READ_HEADER_TIMEOUT : SGX Host Verification Service Read Header Timeout Duration
- SHVS_SERVER_WRITE_TIMEOUT : SGX Host Verification Service Request Write Timeout Duration
- SHVS_SERVER_IDLE_TIMEOUT : SGX Host Verification Service Request Idle Timeout
- SHVS_SERVER_MAX_HEADER_BYTES : SGX Host Verification Service Max Length Of Request Header Bytes
- SHVS_LOG_LEVEL : SGX Host Verification Service Log Level
- SHVS_LOG_MAX_LENGTH : SGX Host Verification Service Log maximum length
- SHVS_ENABLE_CONSOLE_LOG : SGX Host Verification Service Enable standard output
- SHVS_ADMIN_USERNAME : SHVS Service Username
- SHVS_ADMIN_PASSWORD : SHVS Service Password
- SHVS_SCHEDULER_TIMER : SHVS Scheduler Timeout Seconds
- SHVS_AUTO_REFRESH_TIMER : SHVS autoRefresh Timeout Seconds
- SHVS_HOST_PLATFORM_EXPIRY_TIME : SHVS Host Platform Expiry Time in seconds
- SCS_BASE_URL : SGX Caching Service URL
- AAS_API_URL : AAS API URL
download_ca_cert Download CMS root CA certificate
Required env variables specific to setup task are:
- CMS_BASE_URL=<url> : for CMS API url
- CMS_TLS_CERT_SHA384=<CMS TLS cert sha384 hash> : to ensure that SHVS is talking to the right CMS instance
download_cert TLS Generates Key pair and CSR, gets it signed from CMS
Required env variable if SHVS_NOSETUP=true or variable not set in config.yml:
- CMS_TLS_CERT_SHA384=<CMS TLS cert sha384 hash> : to ensure that SHVS is talking to the right CMS instance
Required env variables specific to setup task are:
- CMS_BASE_URL=<url> : for CMS API url
- BEARER_TOKEN=<token> : for authenticating with CMS
- SAN_LIST=<san> : list of hosts which needs access to service
Optional env variables specific to setup task are:
- KEY_PATH=<key_path> : Path of file where TLS key needs to be stored
- CERT_PATH=<cert_path> : Path of file/directory where TLS certificate needs to be stored
Directory Layout
The SGX Host Verification Service installs by default to /opt/shvs with the following folders.
Bin
This folder contains executable scripts.
Configuration
This folder /etc/shvs contains certificates, keys, and configuration files.
Logs
This folder contains log files: /var/log/shvs/
SGX Agent
Installation Answer File Options
Key | Sample Value | Description |
---|---|---|
SCS_BASE_URL | https://< AAS IP or Hostname>:9000/scs/sgx/ | The url used during setup to request information from SCS. |
CMS_BASE_URL | https://< CMS IP or hostname>:8445/cms/v1/ | API URL for Certificate Management Service (CMS). |
SHVS_BASE_URL | https://< SHVS IP or hostname>:13000/sgx-hvs/v2/ | The url used during setup to request information from SHVS. |
BEARER_TOKEN | Long Lived JWT from AAS that contains "install" permissions needed to access ISecL services during provisioning and registration | |
CMS_TLS_CERT_SHA384 | < Certificate Management Service TLS digest> | SHA384 Hash for verifying the CMS TLS certificate. |
SHVS_UPDATE_INTERVAL | 120 | Interval for SHVS updates in minutes. Values should be in the range of 1 minutes to 120 minutues. |
SGX_AGENT_NOSETUP | false | Skips setup during installation if set to true |
Configuration Options
The SGX Agent configuration is in path /etc/sgx_agent/config.yml.
Command-Line Options
The SGX Agent supports several command-line options that can be executed only as the Root user:
Syntax:
sgx_agent \<command>
Available Commands
Help
Show the help message.
Start
sgx_agent start
Start the SGX Agent service.
Stop
sgx_agent stop
Stop the SGX Agent service.
Status
sgx_agent status
Get the status of the SGX Agent Service.
Uninstall
sgx_agent uninstall --purge
Removes the service. Use --purge option to remove configuration directory(/etc/sgx_agent/)
Version
sgx_agent version
Reports the version of the service.
Setup [task]
Runs a specific setup task.
Syntax:
sgx_agent setup [task]
Setup Tasks and its Configuration Options for SGX Agent
Available Tasks for setup:
all Runs all setup tasks
Required env variables:
- get required env variables from all the setup tasks
Optional env variables:
- get optional env variables from all the setup tasks
update_service_config Updates Service Configuration
Required env variables:
- SCS_BASE_URL : SCS Base URL
- SGX_AGENT_LOGLEVEL : SGX_AGENT Log Level
- SGX_AGENT_LOG_MAX_LENGTH : SGX Agent Log maximum length
- SGX_AGENT_ENABLE_CONSOLE_LOG : SGX Agent Enable standard output
- SHVS_UPDATE_INTERVAL : SHVS update interval in minutes
- WAIT_TIME : Time between each retries to PCS
- RETRY_COUNT : Push Data Retry Count to SCS
- SHVS_BASE_URL : HVS Base URL
- BEARER_TOKEN : BEARER TOKEN
download_ca_cert Download CMS root CA certificate
Required env variables specific to setup task are:
- CMS_BASE_URL=<url> : for CMS API url
- CMS_TLS_CERT_SHA384=<CMS TLS cert sha384 hash> : to ensure that SGX-Agent is talking to the right CMS instance
Directory Layout
Linux
The Linux SGX Agent installs by default to /opt/sgx_agent, with the following subfolders:
Bin
Contains executables and scripts.
Configuration
Contains the config.yml configuration file.
Logs
This folder contains log files: /var/log/sgx_agent
Integration Hub
Installation Answer File Options
Key | sample Value | Description |
---|---|---|
AAS_API_URL | https://< Authentication and Authorization Service IP or Hostname>:8444/aas/v1 | Base URL for the AAS |
CMS_BASE_URL | https://< Certificate Management Service IP or Hostname>:8445/cms/v1 | Base URL for the CMS |
SHVS_BASE_URL | https://< SGX Host Verification Service IP or hostname>:13000/sgx-hvs/v2/ | Base URL of SHVS |
IHUB_SERVICE_USERNAME | ihubuser@ihub | Database username |
IHUB_SERVICE_PASSWORD | ihubpassword | Database password |
CMS_TLS_CERT_SHA384 | < Certificate Management Service TLS digest> | SHA384 digest of the CMS TLS certificate |
BEARER_TOKEN | Installation token | |
TENANT | KUBERNETES | Tenant Orchaestrator |
KUBERNETES_URL | https://< Kubernetes Master Node IP or Hostname> :6443 | Kubernetes Master node URL |
KUBERNETES_CRD | custom-isecl-sgx | CRD Name to be used |
TLS_SAN_LIST | 127.0.0.1, localhost | Comma-separated list of IP addresses and hostnames that will be valid connection points for the service. Requests sent to the service using an IP or hostname not in this list will be denied, even if it resolves to this service. |
KUBERNETES_TOKEN | Token from Kubernetes Master Node | |
KUBERNETES_CERT_FILE | /root/apiserver.crt | Kubernetes server certificate path |
POLL_INTERVAL_MINUTES | 2 | IHUB Polling Interval in Minutes |
INSTANCE_NAME | ihub | IHUB default instance name |
Configuration Options
The Integration Hub configuration can be found in /etc/ihub/config.yml.
Command-Line Options
The Integrtion HUB supports several command-line options that can be executed only as the Root user:
Syntax:
ihub
Available Commands
Help
ihub help
Displays the list of available CLI commands
Start
ihub start
Start the service
Stop
ihub stop
stops the service
Status
ihub status
Reports whether the service is currently running.
Uninstall
ihub uninstall [--purge] [--exec]
Removes the service. Use --purge option to remove configuration directory(/etc/ihub/). Use --exec option to remove ihub instance specific directories
Version
ihub version
Reports the version of the service.
Setup [task]
Runs a specific setup task.
Syntax:
ihub setup [task]
Setup Tasks and its Configuration Options for Integration Hub
Available Tasks for setup:
all Runs all setup tasks
download-ca-cert Download CMS root CA certificate
download-cert-tls Download CA certificate from CMS for tls
attestation-service-connection Establish Attestation service connection
tenant-service-connection Establish Tenant service connection
create-signing-key Create signing key for IHUB
update-service-config Sets or Updates the Service configuration
Following environment variables are required for "download-ca-cert"
CMS_BASE_URL CMS base URL in the format https://{{cms}}:{{cms_port}}/cms/v1/
CMS_TLS_CERT_SHA384 SHA384 hash value of CMS TLS certificate
Following environment variables are required in "download-cert-tls"
CMS_BASE_URL CMS base URL in the format https://{{cms}}:{{cms_port}}/cms/v1/
BEARER_TOKEN Bearer token for accessing CMS api
Following environment variables are optionally used in download-cert-tls
TLS_CERT_FILE The file to which certificate is saved
TLS_KEY_FILE The file to which private key is saved
TLS_COMMON_NAME The common name of signed certificate
TLS_SAN_LIST Comma separated list of hostnames to add to Certificate, including IP addresses and DNS names
Following environment variables are required for 'attestation-service-connection' setup:
SHVS_BASE_URL Base URL for the SGX Host Verification Service
Following environment variables are required for 'tenant-service-connection' setup:
TENANT Type of Tenant Service (OpenStack or Kubernetes)
Following environment variables are required for Kubernetes tenant:
KUBERNETES_TOKEN Token for Kubernetes deployment
KUBERNETES_CERT_FILE Certificate path for Kubernetes deployment
KUBERNETES_URL URL for Kubernetes deployment
KUBERNETES_CRD CRD Name for Kubernetes deployment
Following environment variables are required for OpenStack tenant:
OPENSTACK_PLACEMENT_URL Placement API endpoint for OpenStack deployment
OPENSTACK_USERNAME UserName for OpenStack deployment
OPENSTACK_PASSWORD Password for OpenStack deployment
OPENSTACK_AUTH_URL Keystone API endpoint for OpenStack deployment
Following environment variables are required for update-service-config setup:
LOG_LEVEL Log level
LOG_MAX_LENGTH Max length of log statement
LOG_ENABLE_STDOUT Enable console log
AAS_BASE_URL AAS Base URL
SERVICE_USERNAME The service username as configured in AAS
SERVICE_PASSWORD The service password as configured in AAS
Directory Layout
The Integration HUB installs by default to /opt/ihub with the following folders.
Bin
This folder contains executable scripts.
Configuration
This folder /etc/ihub/ contains certificates, keys, and configuration files.
Logs
This folder contains log files: /var/log/ihub/
Certificate Management Service
Installation Answer File Options
Key | Sample Value | Description |
---|---|---|
CMS_PORT | 8445 | Default Port where Certificate Management Service Runs |
CMS_NOSETUP | false | Determines whether “setup” will be executed after installation. Typically this is set to “false” to install and perform setup in one action. The “true” option is intended for building the service as a container, where the installation would be part of the image build, and setup would be performed when the container starts for the first time to generate any persistent data. |
AAS_API_URL | https://< AAS Hostname or IP address>:8444/aas/v1 | URL to connect to the AAS, used during setup for authentication. |
AAS_TLS_SAN | < Comma-separated list of IPs/hostnames for the AAS> | SAN list populated in special JWT token; this token is used by AAS to get TLS certificate signed from CMS. SAN list in this token and CSR generated by AAS must match. |
Configuration Options
The CMS configuration can be found in /etc/cms/config.yml.
Command-Line Options
The Certificate Management Service supports several command-line options that can be executed only as the Root user:
Syntax:
cms
Available Commands
Help
cms help
Displays the list of available CLI commands.
Start
cms start
Starts the services.
Stop
cms stop
Stops the service.
Status
cms status
Reports whether the service is currently running.
Uninstall
cms uninstall [--purge]
Uninstalls the service, including the deletion of all files and folders.
Version
cms version
Reports the version of the service.
Tlscertsha384
cms tlscertsha384
Shows the SHA384 digest of the TLS certificate.
Setup [task]
Runs a specific setup task.
Syntax:
cms setup [task]
Available Tasks for setup:
cms setup server [--port=]
-
Setup http server on
-
Environment variable CMS_PORT=
can be set alternatively
cms setup root_ca [--force]
-
Create its own self signed Root CA keypair in /etc/cms for quality of life
-
Option [--force] overwrites any existing files, and always generate new Root CA keypair
cms setup tls [--force] [--host_names=]
-
Create its own root_ca signed TLS keypair in /etc/cms for quality of life
-
Option [--force] overwrites any existing files, and always generate root_ca signed TLS keypair
-
Argument
is a list of host names used by local machine, seperated by comma -
Environment variable CMS_HOST_NAMES=
can be set alternatively
cms setup cms-auth-token [--force]
-
Create its own self signed JWT keypair in /etc/cms/jwt for quality of life
-
Option [--force] overwrites any existing files, and always generate new
JWT keypair and token
Setup Tasks and its Configuration Options for Certificate Management Service
Available Tasks for setup:
all Runs all setup tasks
root-ca Creates a self signed Root CA key pair in /etc/cms/root-ca/ for quality of life
intermediate-ca Creates a Root CA signed intermediate CA key pair(signing, tls-server and tls-client) in /etc/cms/intermediate-ca/ for quality of life
tls Creates an intermediate-ca signed TLS key pair in /etc/cms for quality of life
cms-auth-token Create its own self signed JWT key pair in /etc/cms/jwt for quality of life
update-service-config Sets or Updates the Service configuration
Following environment variables are required for 'tls' setup:
SAN_LIST TLS SAN list
Following environment variables are required for 'authToken' setup:
AAS_JWT_CN Common Name for JWT Signing Certificate used in Authentication and Authorization Service
AAS_TLS_CN Common Name for TLS Signing Certificate used in Authentication and Authorization Service
AAS_TLS_SAN TLS SAN list for Authentication and Authorization Service
Following environment variables are required for 'update-service-config' setup:
AAS_BASE_URL AAS Base URL
SERVER_PORT The Port on which Server Listens to
SERVER_READ_TIMEOUT Request Read Timeout Duration in Seconds
SERVER_READ_HEADER_TIMEOUT Request Read Header Timeout Duration in Seconds
SERVER_IDLE_TIMEOUT Request Idle Timeout in Seconds
LOG_LEVEL Log level
LOG_MAX_LENGTH Max length of log statement
SERVER_WRITE_TIMEOUT Request Write Timeout Duration in Seconds
SERVER_MAX_HEADER_BYTES Max Length Of Request Header in Bytes
LOG_ENABLE_STDOUT Enable console log
TOKEN_DURATION_MINS Validity of token duration
Following environment variables are required for 'root-ca' setup:
CMS_CA_PROVINCE CA Certificate Province
CMS_CA_COUNTRY CA Certificate Country
CMS_CA_CERT_VALIDITY CA Certificate Validity
CMS_CA_ORGANIZATION CA Certificate Organization
CMS_CA_LOCALITY CA Certificate Locality
Following environment variables are required for 'intermediate-ca' setup:
CMS_CA_PROVINCE CA Certificate Province
CMS_CA_COUNTRY CA Certificate Country
CMS_CA_CERT_VALIDITY CA Certificate Validity
CMS_CA_ORGANIZATION CA Certificate Organization
CMS_CA_LOCALITY CA Certificate Locality
Directory Layout
The Certificate Management Service installs by default to /opt/cms with the following folders.
Bin
This folder contains executable scripts.
Configuration
This folder /etc/cms contains certificates, keys, and configuration files.
Logs
This folder contains log files: /var/log/cms/
Cacerts
This folder contains the CMS root CA certificate.
Authentication and Authorization Service
Installation Answer File Options
Key | Sample Value | Description |
---|---|---|
CMS_BASE_URL | https://< cms IP or hostname>/cms/v1/ | Provides the URL for the CMS. |
AAS_NOSETUP | false | Determines whether “setup” will be executed after installation. Typically this is set to “false” to install and perform setup in one action. The “true” option is intended for building the service as a container, where the installation would be part of the image build, and setup would be performed when the container starts for the first time to generate any persistent data. |
AAS_DB_HOSTNAME | localhost | Hostname or IP address of the AAS database |
AAS_DB_PORT | 5432 | Database port number |
AAS_DB_NAME | pgdb | Database name |
AAS_DB_USERNAME | aasdbuser | Database username |
AAS_DB_PASSWORD | aasdbpassd | Database password |
AAS_DB_SSLMODE | verify-full | |
AAS_DB_SSLCERTSRC | /usr/local/pgsql/data/server.crt | Required if the “AAS_DB_SSLMODE” is set to “verify-ca.” Defines the location of the database SSL certificate. |
AAS_DB_SSLCERT | < path_to_cert_file_on_system > | The AAS_DB_SSLCERTSRC variable defines the source location of the database SSL certificate; this variable determines the local location. If the former option is used without specifying this option, the service will copy the SSL certificate to the default configuration directory. |
AAS_ADMIN_USERNAME | admin@aas | Defines a new AAS administrative user. This user will be able to create new users, new roles, and new role-user mappings. This user will have the AAS:Administrator role. |
AAS_ADMIN_PASSWORD | aasAdminPass | Password for the new AAS admin user |
AAS_JWT_CERT_SUBJECT | "AAS JWT Signing Certificate" | Defines the subject of the JWT signing certificate. |
AAS_JWT_TOKEN_DURATION | 5 | Defines the amount of time in minutes that an issued token will be valid. |
SAN_LIST | 127.0.0.1,localhost | Comma-separated list of IP addresses and hostnames that will be valid connection points for the service. Requests sent to the service using an IP or hostname not in this list will be denied, even if it resolves to this service. |
BEARER_TOKEN | Installation Token from AAS. |
Configuration Options
The AAS configuration can be found in /etc/authservice/config.yml.
Command-Line Options
The AAS supports several command-line options that can be executed only as the Root user:
Syntax:
authservice \<command>
Available Commands
Help
authservice help
Displays the list of available CLI commands.
Start
authservice start
Starts the service.
Stop
authservice stop
Stops the service.
Status
authservice status
Displays the current status of the service.
Uninstall
authservice uninstall [--purge]
Removes the service. Use the "--purge" flag to also delete all data.
Version
authservice version
Shows the version of the service.
Setup [task]
Executes a specific setup task. Can be used to change the current configuration.
Syntax:
authservice setup [task]
Available Tasks for setup:
authservice setup all
Runs all setup tasks
authservice setup database [-force] [-arguments=]
-
Available arguments are:
-
db-host alternatively, set environment variable AAS_DB_HOSTNAME
-
db-port alternatively, set environment variable AAS_DB_PORT
-
db-user alternatively, set environment variable AAS_DB_USERNAME
-
db-pass alternatively, set environment variable AAS_DB_PASSWORD
-
db-name alternatively, set environment variable AAS_DB_NAME
-
db-sslmode
alternatively, set environment variable AAS_DB_SSLMODE -
db-sslcert path to where the certificate file of database. Only applicable for db-sslmode=\<verify-ca|verify-full. If left empty, the cert will be copied to /etc/authservice/tdcertdb.pem alternatively, set environment variable AAS_DB_SSLCERT
-
db-sslcertsrc
mandatory if db-sslcert does not already exist alternatively, set environment variable AAS_DB_SSLCERTSRC
- Run this command with environment variable AAS_DB_REPORT_MAX_ROWS and AAS_DB_REPORT_NUM_ROTATIONS can update db rotation arguments
authservice setup server [--port=]
-
Setup http server on
-
Environment variable AAS_PORT=
can be set alternatively authservice setup tls [--force] [--host_names= ] -
Use the key and certificate provided in /etc/threat-detection if files exist
-
Otherwise create its own self-signed TLS keypair in /etc/authservice for quality of life
-
Option [--force] overwrites any existing files, and always generate self-signed keypair
-
Argument
is a list of host names used by local machine, seperated by comma -
Environment variable AAS_TLS_HOST_NAMES=
can be set alternatively
authservice setup admin [--user=] [-pass=]
-
Environment variable AAS_ADMIN_USERNAME=
can be set alternatively -
Environment variable AAS_ADMIN_PASSWORD=
can be set alternatively
authservice setup jwt
-
Create jwt signing key and jwt certificate signed by CMS
-
Environment variable CMS_BASE_URL=
for CMS API url -
Environment variable AAS_JWT_CERT_CN=
AAS JWT
Certificate Subject
-
Environment variable AAS_JWT_INCLUDE_KEYID=
AAS include key id in JWT Token -
Environment variable AAS_JWT_TOKEN_DURATION_MINS=
JWT Token validation minutes -
Environment variable BEARER_TOKEN=
for authenticating with CMS
Setup Tasks and its Configuration Options for Authentication and Authorization Service
Available Tasks for setup:
all Runs all setup tasks
download-ca-cert Download CMS root CA certificate
download-cert-tls Download CA certificate from CMS for tls
database Setup authservice database
admin Add authservice admin username and password to database and assign respective
roles to the user
jwt Create jwt signing key and jwt certificate signed by CMS
update-service-config Sets or Updates the Service configuration
Following environment variables are required for 'download-ca-cert'
CMS_BASE_URL CMS base URL in the format https://{{cms}}:{{cms_port}}/cms/v1/
CMS_TLS_CERT_SHA384 SHA384 hash value of CMS TLS certificate
Following environment variables are required in 'download-cert-tls'
CMS_BASE_URL CMS base URL in the format https://{{cms}}:{{cms_port}}/cms/v1/
BEARER_TOKEN Bearer token for accessing CMS api
Following environment variables are optionally used in download-cert-tls
TLS_CERT_FILE The file to which certificate is saved
TLS_KEY_FILE The file to which private key is saved
TLS_COMMON_NAME The common name of signed certificate
TLS_SAN_LIST Comma separated list of hostnames to add to Certificate, including IP addresses and DNS names
Following environment variables are required for 'Database' related setups:
DB_VENDOR Vendor of database, or use AAS_DB_VENDOR alternatively
DB_HOST Database host name, or use AAS_DB_HOSTNAME alternatively
DB_USERNAME Database username, or use AAS_DB_USERNAME alternatively
DB_PASSWORD Database password, or use AAS_DB_PASSWORD alternatively
DB_SSL_MODE Database SSL mode, or use AAS_DB_SSL_MODE alternatively
DB_SSL_CERT Database SSL certificate, or use AAS_DB_SSLCERT alternatively
DB_PORT Database port, or use AAS_DB_PORT alternatively
DB_NAME Database name, or use AAS_DB_NAME alternatively
DB_SSL_CERT_SOURCE Database SSL certificate to be copied from, or use AAS_DB_SSLCERTSRC alternatively
DB_CONN_RETRY_ATTEMPTS Database connection retry attempts
DB_CONN_RETRY_TIME Database connection retry time
Following environment variables are required for 'admin' setup:
AAS_ADMIN_USERNAME Authentication and Authorization Service Admin Username
AAS_ADMIN_PASSWORD Authentication and Authorization Service Admin Password
Following environment variables are required in 'jwt'
CMS_BASE_URL CMS base URL in the format https://{{cms}}:{{cms_port}}/cms/v1/
BEARER_TOKEN Bearer token for accessing CMS api
Following environment variables are optionally used in jwt
CERT_FILE The file to which certificate is saved
KEY_FILE The file to which private key is saved
COMMON_NAME The common name of signed certificate
Following environment variables are required for 'update-service-config' setup:
AUTH_DEFENDER_LOCKOUT_DURATION_MINS Auth defender lockout duration in minutes
SERVER_MAX_HEADER_BYTES Max Length Of Request Header in Bytes
JWT_INCLUDE_KID Includes JWT Key Id for token validation
SERVER_READ_HEADER_TIMEOUT Request Read Header Timeout Duration in Seconds
AUTH_DEFENDER_MAX_ATTEMPTS Auth defender maximum attempts
SERVER_PORT The Port on which Server Listens to
SERVER_READ_TIMEOUT Request Read Timeout Duration in Seconds
LOG_MAX_LENGTH Max length of log statement
LOG_ENABLE_STDOUT Enable console log
JWT_CERT_COMMON_NAME Common Name for JWT Certificate
SERVER_WRITE_TIMEOUT Request Write Timeout Duration in Seconds
SERVER_IDLE_TIMEOUT Request Idle Timeout in Seconds
LOG_LEVEL Log level
JWT_TOKEN_DURATION_MINS Validity of token duration
AUTH_DEFENDER_INTERVAL_MINS Auth defender interval in minutes
Directory Layout
The Authentication and Authorization Service installs by default to /opt/authservice with the following folders.
Bin
Contains executable scripts and binaries.
Configuration
This folder /etc/authservice contains certificates, keys, and configuration files.
Logs
This folder contains log files: /var/log/authservice
Dbscripts
This folder /opt/authservice/dbscripts Contains database scripts
Key Broker Service
Installation Answer File Options
Variable Name | Default Value | Notes |
---|---|---|
CMS_BASE_URL | https://< CMS IP or hostname >:8445/cms/v1/ | Required for generating TLS certificate |
AAS_API_URL | https://< AAS IP or hostname >:8444/aas/v1 | AAS service url |
SQVS_URL | https://< SQVS IP or hostname >:12000/svs/v1/ | Required to get the SGX Quote verified |
CMS_TLS_CERT_SHA384 | < Certificate Management Service TLS digest > | SHA384 digest of CMS TLS certificate |
BEARER_TOKEN | JWT token for installation user | |
KBS_SERVICE_USERNAME | admin@kms | KBS Service Username |
KBS_SERVICE_PASSWORD | kmsAdminPass | KBS Service User Password |
ENDPOINT_URL | https://< KBS Hostname >:9443/v1 | KBS Endpoint URL |
TLS_COMMON_NAME | KBS TLS Certificate | KBS TLS Certificate common-name |
SERVER_PORT | 9443 | KBS Secure Port |
SKC_CHALLENGE_TYPE | SGX | Challenge Type |
TLS_SAN_LIST | < KBS IP/Hostname > | IP addresses/hostnames to be included in SAN list. |
KEY_MANAGER | KMIP | Key Manager Backend to store keys |
Configuration Options
The Key Broker Service configuration is in path /etc/kbs/config.yml.
Command-Line Options
The Key Broker Service supports several command-line options that can be executed only as the Root user:
Syntax:
kbs \<command>
Available Commands
Help
kbs help
Displays the list of available CLI commands.
Start
kbs start
Starts the service
Stop
kbs stop
Stops the service
Status
kbs status
Displays the current status of the service.
Uninstall
kbs uninstall [--purge]
Removes the service
Version
kbs version
Displays the version of the service
Setup [task]
Runs a specific setup task.
Syntax:
kbs setup [task]
Setup Tasks and its Configuration Options for Key Broker Service
Available Tasks for setup:
all Runs all setup tasks
download-ca-cert Download CMS root CA certificate
download-cert-tls Download CA certificate from CMS for tls
create-default-key-transfer-policy Create default key transfer policy for KBS
update-service-config Sets or Updates the Service configuration
Following environment variables are required for 'update-service-config' setup:
SERVICE_USERNAME The service username as configured in AAS
AAS_BASE_URL AAS Base URL
KMIP_ROOT_CERT_PATH KMIP Root Certificate path
KMIP_SERVER_IP IP of KMIP server
KMIP_CLIENT_KEY_PATH KMIP Client key path
SERVER_READ_TIMEOUT Request Read Timeout Duration in Seconds
SERVER_READ_HEADER_TIMEOUT Request Read Header Timeout Duration in Seconds
SERVER_IDLE_TIMEOUT Request Idle Timeout in Seconds
SQVS_URL SQVS URL
SESSION_EXPIRY_TIME Session Expiry Time
SERVER_PORT The Port on which Server Listens to
LOG_LEVEL Log level
LOG_MAX_LENGTH Max length of log statement
LOG_ENABLE_STDOUT Enable console log
KMIP_SERVER_PORT PORT of KMIP server
KMIP_CLIENT_CERT_PATH KMIP Client certificate path
SERVER_WRITE_TIMEOUT Request Write Timeout Duration in Seconds
SERVER_MAX_HEADER_BYTES Max Length Of Request Header in Bytes
SERVICE_PASSWORD The service password as configured in AAS
SKC_CHALLENGE_TYPE SKC challenge type
Following environment variables are required for 'download-ca-cert'
CMS_BASE_URL CMS base URL in the format https://{{cms}}:{{cms_port}}/cms/v1/
CMS_TLS_CERT_SHA384 SHA384 hash value of CMS TLS certificate
Following environment variables are required in 'download-cert-tls'
CMS_BASE_URL CMS base URL in the format https://{{cms}}:{{cms_port}}/cms/v1/
BEARER_TOKEN Bearer token for accessing CMS api
Following environment variables are optionally used in download-cert-tls
TLS_KEY_FILE The file to which private key is saved
TLS_COMMON_NAME The common name of signed certificate
TLS_CERT_FILE The file to which certificate is saved
TLS_SAN_LIST Comma separated list of hostnames to add to Certificate, including IP addresses and DNS names
Directory Layout
The Key Broker Service installs by default to /opt/kbs with the following folders.
Bin
Contains executable scripts and binaries.
Configuration
This folder /etc/kbs contains certificates, keys, and configuration files.
Logs
This folder contains log files: /var/log/kbs
SGX Caching Service
Installation Answer File Options
Key | Sample Value | Description |
---|---|---|
CMS_BASE_URL | https://< CMS IP or hostname >:8445/cms/v1/ | CMS URL for Certificate Management Service |
AAS_API_URL | https://< AAS IP or hostname >:8444/aas/v1 | API URL for Authentication Authorization Service |
SCS_ADMIN_USERNAME | scsuser@scs | SCS Service username |
SCS_ADMIN_PASSWORD | scspassword | SCS Service password |
BEARER_TOKEN | Installation Token from AAS | |
CMS_TLS_CERT_SHA384 | < Certificate Management Service TLS digest > | SHA384 Hash sum for verifying the CMS TLS certificate. |
INTEL_PROVISIONING_SERVER | https://sbx.api.trustedservices.intel.com/sgx/certification/v3 | Intel pcs server url |
INTEL_PROVISIONING_SERVER_API_KEY | < Add your API subscription key > | Intel PCS Server API subscription key |
SCS_REFRESH_HOURS | 1 hour | Time after which the SGX collaterals in SCS db get refreshed from Intel PCS server |
RETRY_COUNT | 3 | Number Of times to connect to PCS if PCS service is not accessible |
WAIT_TIME | 1 | Number Of Seconds between retries to connect to PCS |
SCS_DB_HOSTNAME | localhost | SCS Databse hostname |
SCS_DB_PORT | 5432 | SCS Database port |
SCS_DB_NAME | pgscsdb | SCS Database name |
SCS_DB_USERNAME | aasdbuser | SCS Database username |
SCS_DB_PASSWORD | aasdbpassword | SCS Database password |
SCS_DB_SSLCERTSRC | /usr/local/pgsql/data/server.crt | |
SAN_LIST | 127.0.0.1,localhost | Comma-separated list of IP addresses and hostnames that will be valid connection points for the service. Requests sent to the service using an IP or hostname not in this list will be denied, even if it resolves to this service. |
Configuration Options
The SGX Caching Service configuration can be found in /etc/scs/config.yml.
Command-Line Options
The SGX Caching Service supports several command-line options that can be executed only as the Root user:
Syntax:
scs \<command>
Available Commands
Help
scs help
Displays the list of available CLI commands.
Start
scs start
Starts the SGX Caching Service
Stop
scs stop
Stops the SGX Caching Service
Status
scs status
Reports whether the SGX Caching Service is currently running
Uninstall
scs uninstall [--purge]
uninstall the SGX Caching Service. --purge option needs to be applied to remove configuration files
Version
scs version
Reports the version of the scs
Setup [task]
Runs a specific setup task.
Syntax:
scs setup [task]
Setup Tasks and its Configuration Options for SGX Caching Service
Avaliable Tasks for setup:
all Runs all setup tasks
Required env variables:
- get required env variables from all the setup tasks
Optional env variables:
- get optional env variables from all the setup tasks
scs setup database
- Avaliable arguments are:
- SCS_DB_HOSTNAME
- SCS_DB_PORT
- SCS_DB_USERNAME
- SCS_DB_PASSWORD
- SCS_DB_NAME
- SCS_DB_SSLMODE <disable|allow|prefer|require|verify-ca|verify-full>
- SCS_DB_SSLCERT path to where the certificate file of database. Only applicable
for db-sslmode=<verify-ca|verify-full. If left empty, the cert
will be copied to /etc/scs/tdcertdb.pem
- SCS_DB_SSLCERTSRC <path to where the database ssl/tls certificate file>
mandatory if db-sslcert does not already exist
update_service_config Updates Service Configuration
Required env variables:
- SCS_PORT : SGX Caching Service port
- SCS_SERVER_READ_TIMEOUT : SGX Caching Service Read Timeout
- SCS_SERVER_READ_HEADER_TIMEOUT : SGX Caching Service Read Header Timeout Duration
- SCS_SERVER_WRITE_TIMEOUT : SGX Caching Service Request Write Timeout Duration
- SCS_SERVER_IDLE_TIMEOUT : SGX Caching Service Request Idle Timeout
- SCS_SERVER_MAX_HEADER_BYTES : SGX Caching Service Max Length Of Request Header Bytes
- INTEL_PROVISIONING_SERVER : Intel ECDSA Provisioning Server URL
- INTEL_PROVISIONING_SERVER_API_KEY : Intel ECDSA Provisioning Server API Subscription key
- SCS_LOGLEVEL : SGX Caching Service Log Level
- SCS_LOG_MAX_LENGTH : SGX Caching Service Log maximum length
- SCS_ENABLE_CONSOLE_LOG : SGX Caching Service Enable standard output
- SCS_REFRESH_HOURS : SCS Automatic Refresh of SGX Data
- RETRY_COUNT : Number of retry to PCS server
- WAIT_TIME : Duration Time between each retries to PCS
- AAS_API_URL : AAS API URL
download_ca_cert Download CMS root CA certificate
Required env variables specific to setup task are:
- CMS_BASE_URL=<url> : for CMS API url
- CMS_TLS_CERT_SHA384=<CMS TLS cert sha384 hash> : to ensure that AAS is talking to the right CMS instance
download_cert TLS Generates Key pair and CSR, gets it signed from CMS
Required env variable if SCS_NOSETUP=true or variable not set in config.yml:
- CMS_TLS_CERT_SHA384=<CMS TLS cert sha384 hash> : to ensure that AAS is talking to the right CMS instance
Required env variables specific to setup task are:
- CMS_BASE_URL=<url> : for CMS API url
- BEARER_TOKEN=<token> : for authenticating with CMS
- SAN_LIST=<san> : list of hosts which needs access to service
Optional env variables specific to setup task are:
- KEY_PATH=<key_path> : Path of file where TLS key needs to be stored
- CERT_PATH=<cert_path> : Path of file/directory where TLS certificate needs to be stored
Directory Layout
The SGX Caching Service installs by default to /opt/scs with the following folders.
Bin
Contains SGX Caching Service executable binary.
Configuration
This folder /etc/scs contains certificates, keys, and configuration files.
Logs
This folder contains log files: /var/log/scs
SGX Quote Verification Service
Installation Answer File Options
Key | Sample Value | Description |
---|---|---|
CMS_BASE_URL | https://< CMS IP address or hostname >:8445/cms/v1/ | Defines the base URL for the CMS owned by the image owner. Note that this CMS may be different from the CMS used for other components. |
AAS_API_URL | https://< AAS IP address or hostname >:8444/aas/v1 | Defines the baseurl for the AAS owned by the image owner. Note that this AAS may be different from the AAS used for other components. |
SCS_BASE_URL | https://< SCS IP address or hostname >:9000/scs/sgx/certification/v1/ | The SCS url is needed. |
SGX_TRUSTED_ROOT_CA_PATH | /tmp/trusted_rootca.pem | The path to SGX root ca used to verify quote |
CMS_TLS_CERT_SHA384 | < Certificate Management Service TLS digest > | SHA384 hash of the CMS TLS certificate |
BEARER_TOKEN | Token from CMS with permissions used for installation. | |
SQVS_LOG_LEVEL | INFO (default), DEBUG | Defines the log level for the SQVS. Defaults to INFO. |
SQVS_PORT | 12000 | SQVS Secure Port |
SQVS_NOSETUP | false | Skips setup during installation if set to true |
SIGN_QUOTE_RESPONSE | false | If set to false, the SQVS response is not signed, signed if set to true |
RESPONSE_SIGNING_KEY_LENGTH | 3072 | if SIGN_QUOTE_RESPONSE is set to true, then create RSA signing key of length defined by RESPONSE_SIGNING_KEY_LENGTH |
| SAN_LIST | 127.0.0.1,localhost | Comma-separated list of IP addresses and hostnames that will be valid connection points for the service. Requests sent to the service using an IP or hostname not in this list will be denied, even if it resolves to this service. | | SQVS_INCLUDE_TOKEN | true | If true, SQVS will authenticate KBS before Quote Verifiation |
Configuration Options
The SGX Quote Verification Service configuration can be found in /etc/sqvs/config.yml.
Command-Line Options
The SGX Quote Verifiction Service supports several command-line options that can be executed only as the Root user:
Syntax:
sqvs \<command>
Available Commands
Help
sqvs help
Displays the list of available CLI commands.
Start
sqvs start
Starts the SGX Quote Verification Service
Stop
sqvs stop
Stops the SGX Quote Verification Service
Status
sqvs status
Reports whether the SGX Quote Verification Service is currently running.
Uninstall
sqvs uninstall [--purge]
uninstalls the SGX Quote Verification Service. --purge option needs to be applied to remove configuration files
Version
sqvs version
Reports the version of the sqvs
Setup [task]
Runs a specific setup task.
Syntax:
sqvs setup [task]
Setup Tasks and its Configuration Options for SGX Quote Verification Service
Available Tasks for setup:
Required env variables:
- get required env variables from all the setup tasks
Optional env variables:
- get optional env variables from all the setup tasks
update_service_config Updates Service Configuration
Required env variables:
- SQVS_PORT : SGX Verification Service port
- SQVS_SERVER_READ_TIMEOUT : SGX Verification Service Read Timeout
- SQVS_SERVER_READ_HEADER_TIMEOUT : SGX Verification Service Read Header Timeout Duration
- SQVS_SERVER_WRITE_TIMEOUT : SGX Verification Service Request Write Timeout Duration
- SQVS_SERVER_IDLE_TIMEOUT : SGX Verification Service Request Idle Timeout
- SQVS_SERVER_MAX_HEADER_BYTES : SGX Verification Service Max Length Of Request Header Bytes
- SQVS_LOGLEVEL : SGX Verification Service Log Level
- SQVS_LOG_MAX_LENGTH : SGX Verification Service Log maximum length
- SQVS_ENABLE_CONSOLE_LOG : SGX Verification Service Enable standard output
- SQVS_INCLUDE_TOKEN : Boolean value to decide whether to use token based auth or no auth for quote verifier API
- SGX_TRUSTED_ROOT_CA_PATH : SQVS Trusted Root CA
- SCS_BASE_URL : SGX Caching Service URL
- AAS_API_URL : AAS API URL
download_ca_cert Download CMS root CA certificate
Required env variables specific to setup task are:
- CMS_BASE_URL=<url> : for CMS API url
- CMS_TLS_CERT_SHA384=<CMS TLS cert sha384 hash> : to ensure that AAS is talking to the right CMS instance
download_cert TLS Generates Key pair and CSR, gets it signed from CMS
- CMS_TLS_CERT_SHA384=<CMS TLS cert sha384 hash> : to ensure that AAS is talking to the right CMS instance
Required env variables specific to setup task are:
- CMS_BASE_URL=<url> : for CMS API url
- BEARER_TOKEN=<token> : for authenticating with CMS
- SAN_LIST=<san> : list of hosts which needs access to service
Optional env variables specific to setup task are:
- KEY_PATH=<key_path> : Path of file where TLS key needs to be stored
- CERT_PATH=<cert_path> : Path of file/directory where TLS certificate needs to be stored
create_signing_key_pair Generates Key pair and CSR and downloads Signing certificate from CMS
- Option [--force] overwrites any existing files and always downloads new Signing cert
Required env variable if SQVS_NOSETUP=true or variable not set in config.yml:
- CMS_TLS_CERT_SHA384=<CMS TLS cert sha384 hash> : to ensure that AAS is talking to the right CMS instance
Required env variables specific to setup task are:
- CMS_BASE_URL=<url> : for CMS API url
- BEARER_TOKEN=<token> : for authenticating with CMS
Directory Layout
The SGX Quote Verification Service installs by default to /opt/sqvs with the following folders.
Bin
This folder contains executable scripts.
Configuration
This folder /etc/sqvs contains certificates, keys, and configuration files.
Logs
This folder contains log files: /var/log/sqvs