This site will be decommissioned on January 30th 2025. After that date content will be available at techdocs.broadcom.com.

This topic gives you an overview of how to prepare for using Transport Layer Security (TLS) with VMware SQL with MySQL for Tanzu Application Service to secure communication between apps and service instances.

CautionThis procedure involves restarting all of the VMs in your deployment to apply a CA certificate. The operation can take a long time to complete.

ImportantTLS-enabled client connections to MySQL require TLS v1.2.

When you use TLS, you are provisioned a VMware SQL with MySQL for TAS server with a certificate. With this certificate, apps and clients can establish an encrypted connection with the service.

Using BOSH CredHub, Tanzu Operations Manager generates a server certificate using a Certificate Authority (CA) certificate.

If you do not want to use the CA certificate generated, you can provide your own CA certificate and add it through the CredHub CLI. For an overview of the purpose and capabilities of the CredHub component, see CredHub.

Apps and clients use this CA certificate to verify that the server certificate is trustworthy. A trustworthy server certificate allows apps and clients to securely communicate with the VMware SQL with MySQL for TAS server.

VMware Tanzu Application Service for VMs (TAS for VMs) shares the CA certificate public component:

  • TAS for VMs provisions a copy of the CA certificate in the trusted store of each container’s operating system. Apps written in Java and Spring automatically discover the CA certificate in the trusted store. Apps not written in Java and Spring can retrieve the public component of the CA certificate from VCAP_SERVICES and use it to establish an encrypted connection with the data service.

Generated or Provided CA Certificate

Tanzu Operations Manager can generate a CA certificate for TLS to use.

Alternatively, you can choose to provide your own CA certificate for TLS to use.

Important If you are using Tanzu Operations Manager v2.5 or earlier, then Tanzu Operations Manager does not generate a certificate. You must generate one with CredHub. To use TLS with Tanzu Operations Manager v2.5 or earlier, see Preparing for TLS in MySQL for PCF v2.6.

Workflow

The workflow you follow to prepare for TLS depends on whether you use the CA certificate generated by Tanzu Operations Manager or if you bring your own CA certificate.

Using the Generated CA Certificate

To use the CA certificate that Tanzu Operations Manager generates through CredHub, follow this workflow to enable TLS for VMware SQL with MySQL for Tanzu Application Service:

  1. An operator adds the CredHub-generated certificate to Tanzu Operations Manager by performing the procedures:

    1. Find the CredHub Credentials in Tanzu Operations Manager
    2. Add the CA Certificate
  2. An operator enables TLS in the tile configuration while installing VMware SQL with MySQL for TAS. See Configure TLS in VMware SQL with MySQL for TAS.

  3. A developer edits their app to communicate securely with the VMware SQL with MySQL for TAS server:

Providing Your Own CA Certificate

To provide your own CA certificate instead of using the one that Tanzu Operations Manager generates, follow this workflow to enable TLS for VMware SQL with MySQL for Tanzu Application Service:

  1. An operator provides a CA certificate to CredHub by performing the procedures:

    1. Find the CredHub Credentials in Tanzu Operations Manager.
    2. Set a Custom CA Certificate.
    3. Add the CA Certificate.
  2. An operator enables TLS in the tile configuration while installing VMware SQL with MySQL for TAS. See Configure TLS in VMware SQL with MySQL for TAS.

  3. A developer edits their app to communicate securely with the VMware SQL with MySQL for TAS server:

Find the CredHub Credentials in Tanzu Operations Manager

To find the BOSH CredHub client name and client secret:

  1. In the Tanzu Operations Manager Installation Dashboard, click the BOSH Director tile.
  2. Click the Credentials tab.
  3. In the BOSH Director section, click the link to the BOSH Commandline Credentials. The BOSH Director section of the credentials tab in the BOSH Director tile is shown.
Each row in the BOSH Commandline has a Link to credentials.
  4. Record the values for BOSH_CLIENT and BOSH_CLIENT_SECRET.

    Here is an example of the credentials page:

    {"credential":"BOSH_CLIENT=ops_manager
    BOSH_CLIENT_SECRET=abCdE1FgHIjkL2m3n-3PqrsT4EUVwXy5
    BOSH_CA_CERT=/var/tempest/workspaces/default/root_ca_certificate
    BOSH_ENVIRONMENT=10.0.0.5 bosh "}
    

    The BOSH_CLIENT is the BOSH CredHub client name and the BOSH_CLIENT_SECRET is the BOSH CredHub client secret.

Set a Custom CA Certificate

Prerequisite: To complete this procedure, you must have the CredHub CLI. For installation instructions, see credhub-cli on GitHub.

Do this procedure if you are providing your own custom CA certificate instead of using the one generated by Tanzu Operations Manager or CredHub.

To add a custom CA Certificate to CredHub:

  1. Record the information needed to log in to the BOSH Director VM by following the procedure in Gather Credential and IP Address Information.

  2. Log in to the Tanzu Operations Manager VM by following the procedure in Log in to the Tanzu Operations Manager VM with SSH.

  3. Set the API target of the CredHub CLI as your CredHub server by running:

    credhub api  \
    https://BOSH-DIRECTOR-IP:8844 \
    --ca-cert=/var/tempest/workspaces/default/root_ca_certificate
    

    Where BOSH-DIRECTOR-IP is the IP address of the BOSH Director VM.

    For example:

    $ credhub api \ 
    https://10.0.0.5:8844 \
    --ca-cert=/var/tempest/workspaces/default/root\_ca\_certificate
  4. Log in to CredHub by running:

    credhub login \
    --client-name=CREDHUB-CLIENT-NAME \
    --client-secret=CREDHUB-CLIENT-SECRET
    

    Where:

    For example:

    $ credhub login \ 
    --client-name=credhub \
    --client-secret=abcdefghijklm123456789
  5. Use the CredHub CLI to provide a CA certificate. Your deployment can have multiple CA certificates. recommends a dedicated CA certificate for services. Create a new file called root.pem with the contents of the certificate. Then, run the following command, specifying the path to root.pem and the private key for the certificate. For example:

    $ credhub set \ 
    --name="/services/tls_ca" \
    --type="certificate" \
    --certificate=./root.pem \
    --private=ERKSOSMFF...

Add the CA Certificate

Prerequisite: To complete this procedure, you must have the CredHub CLI. For installation instructions, see credhub-cli on GitHub.

To add the CA Certificate to Tanzu Operations Manager:

  1. Record the CA certificate by running:

    credhub get \
      --name=/services/tls_ca \
      -k ca
    
  2. Go to Tanzu Operations Manager Installation Dashboard > BOSH Director > Security.

  3. Append the contents of the CA certificate you recorded in an earlier step into Trusted Certificates.

  4. Click Save.

Configure TLS in VMware SQL with MySQL for TAS

To configure TLS in the VMware SQL with MySQL for TAS tile:

  1. Follow the procedure in Configure Security.
  2. Navigate to Tanzu Operations Manager Installation Dashboard > Review Pending Changes.
  3. Ensure that the CA certificate is deployed to all VMs by selecting:
    • VMware Tanzu Application Service for VMs
    • VMware SQL with MySQL for Tanzu Application Service
    • The Upgrade All On-Demand Service Instances errand
  4. Click Apply Changes. This restarts all the VMs in your deployment and applies your CA certificate.
check-circle-line exclamation-circle-line close-line
Scroll to top icon