Enabling or disabling FIPS at upgrade time
Quick and easy steps to enable FIPS when upgrading from an environment where FIPS was not enabled.
About this task
If you are upgrading from an environment where FIPS was not enabled, and want to enable it while upgrading, perform the steps listed below on each component in the HCL Workload Automation environment.
To ensure FIPS compliance, all HCL Workload Automation components must be at
version 10.2.5 or later, certificates must employ at least a robust 2K RSA key and use
encryption algorithms different from MD5-RSA and
SHA1-RSA. FIPS is supported on all supported
operating systems with the exception of IBM i operating systems.
Perform the following steps in the specified order:
Procedure
- If your current certificates do not meet FIPS standards, replace them with CA-signed certificates, as explained in Replacing Default SSL Certificates with CA signed Customer Certificates.
- On the master domain manager, start the upgrade as described in Upgrading from the CLI, setting the enablefips parameter to true.
- The upgrade completes, enabling FIPS in weak mode. When in weak mode, the upgraded master domain manager can communicate with back-level components, ensuring business continuity.
-
Check the version of the OpenSSL libraries present in your environment:
- If the system provides OpenSSL version 3.0 or higher, those libraries are automatically used by the product.
- If the system libraries do not meet the version requirement, the product defaults to using the OpenSSL libraries included with HCL Workload Automation.
If you are using the OpenSSL libraries provided with the operating system, set the machine in FIPS mode. Note that the specific command to enable this mode may differ depending on your operating system. -
On the master domain manager, run
the following command to set the environment variables:
. ./tws_env.sh -
On the master domain manager, run
the following command to verify the security status:
A message similar to the following is displayed:secure -checksecurity
As stated in the message, before you set up FIPS in full mode on the master domain manager, it is necessary to upgrade all components in your environment to version 10.2.5 or later.FIPS configuration updated in weak mode. To enable full FIPS mode, update the master domain manager and all backup master domain managers to the current release. Then, run the secure -updatesecurity command on master domain manager. - Upgrade the remaining server components (backup master domain manager, dynamic domain manager, backup dynamic domain manager) if any, as described in Upgrading from the CLI, setting the enablefips parameter to true.
- Upgrade the Dynamic Workload Console, setting the enablefips parameter to true.
- Upgrade the agents, setting the enablefips parameter to true.
-
On the master domain manager, run
the following command to check the encryption level of user passwords in the
database and change it from 3DES to AES, if necessary:
This command also sets the useAESEncryptionAlgorithm optman option to yes For more information about global options, see Global options - detailed description.secure -updatesecurity -
On the master domain manager, run the
following command to update the encryption of user passwords on the Symphony
file deployed in your environment:
JnextPlan -for 0000 -noremove -
On the master domain manager and
backup master domain manager, run
the following command to set FIPS in full mode:
The master domain manager switches to full FIPS mode after HCL Workload Automation processes are restarted. For more information about the secure command, see Optional password encryption - secure script.secure -fips on -
Restart the master domain manager
and backup master domain manager to make
the switch to full FIPS mode effective. To avoid service
interruptions, use the following command:
For more information, see Switching a domain manager.switchmgr domain;newmgr -
On the Dynamic Workload Console, run
the following command to set the environment variables:
. ./dwc_env.sh -
On the Dynamic Workload Console, run
the following command to set FIPS in full mode:
secure -fips on -
On each agent, run the following command to set the environment
variables:
. ./tws_env.sh -
On each agent, run the following command to set FIPS in full mode:
secure -fips on -
Optionally run the following command to check FIPS status:
A message similar to the following is displayed:secure -securitystatusFIPS is enabled on the agent - Restart all HCL Workload Automation processes on the Dynamic Workload Console and agents to make changes to FIPS configuration effective. To prevent communication problems after switching to full FIPS mode, ensure you perform a coordinated restart of the various components.
Results
Disabling FIPS at upgrade time
About this task
To ensure FIPS compliance, all HCL Workload Automation components must be at
version 10.2.5 or later, certificates must employ at least a robust 2K RSA key and use
encryption algorithms different from MD5-RSA and
SHA1-RSA. FIPS is supported on all supported
operating systems with the exception of IBM i operating systems.
However, certificates in the source environment may not meet the security standards of FIPS 140-3, even if FIPS mode is currently enabled in the source environment.
If certificates are not secure by FIPS standard, the upgrade stops. To proceed with the upgrade, you can either obtain secure certificates, as described in Upgrading from a FIPS-enabled environment, or, if FIPS compliance is not required, you can restart the upgrade setting the enablefips parameter to false when upgrading each component.