It is vital to secure the communication path through which GroupWise data synchronizes from GroupWise mailboxes through your Synchronizer system out to mobile devices and back again.
If your GroupWise system is configured to use LDAP authentication when users access their GroupWise mailboxes, your LDAP server is already set up for a secure SSL LDAP connection with your Synchronizer system. If you are not yet using LDAP authentication in your GroupWise system, but you want to use secure LDAP for communication with your Synchronizer system, the GroupWise documentation provides information to help you set this up. See Trusted Root Certificates and LDAP Authentication
in Security Administration
in the GroupWise 2012 Administration Guide.
You can enable and disable SSL for the LDAP connection on the Global Settings page in Synchronizer Web Admin. For instructions, see Section 2.3.6, Enabling and Disabling SSL for the Synchronizer LDAP Connection.
The GroupWise Connector communicates with the GroupWise POA as a SOAP client. In order to secure communication between the GroupWise Connector and the GroupWise POA, the POA must be configured for secure SSL SOAP, as described in Supporting SOAP Clients
in Post Office Agent
in the GroupWise 2012 Administration Guide.
You can enable and disable SSL for the POA SOAP connections on the GroupWise Connector Configuration page in Synchronizer Web Admin. For instructions, see Enabling and Disabling SSL for POA SOAP Connections
in GroupWise Connector Configuration
in the GroupWise Connector Configuration Guide.
In order to provide a secure SSL connection between the Mobility Connector and mobile devices, you must provide a server certificate on the Synchronizer server.
For issues with specific types of certificates, see Data Synchronizer Mobility Connector SSL Issues.
For SSL issues with specific types of devices, see Data Synchronizer Mobility Connector Devices.
When you have the Mobility Pack Installation program create a self-signed certificate for you, two certificate files are created in the /var/lib/datasync/device directory:
mobility.pem mobility.cer
When a mobile device connects to the Mobility Connector, the Mobility Connector passes the self-signed certificate file (mobility.pem) to the mobile device. In most cases, the mobile device accepts the self-signed certificate and connects successfully.
Some mobile devices do not automatically accept self-signed certificates in PEM format. If you choose to use a self-signed certificate and if users encounter connection problems with particular mobile devices, explain the procedure in Manually Downloading a Certificate to a Mobile Device to the users who are encountering connection problems. This procedure enables users to use the mobility.cer file instead of the mobility.pem file on their mobile devices.
The self-signed certificate generated by the Installation program is issued to “DataSync Web Admin” rather than to a specific hostname. Some mobile devices require that a self-signed certificate be associated with a specific hostname. You can use YaST to generate a self-signed certificate with a specific hostname. If you need assistance with this task, refer to Using YaST on Linux
in Security Administration
in the GroupWise 2012 Administration Guide. Complete Step 1 through Step 4. Do not complete Step 5. By default, YaST generates a single self-signed certificate file as required for use with your Synchronizer system.
IMPORTANT:You should obtain a commercially signed certificate for use with your Synchronizer system as quickly as possible.
For more detailed instructions, see TID 7006904, How to Configure Certificates from a Trusted CA for the Mobility Connector
in the Novell Support Knowledgebase.
Choose a certificate authority (CA) from the many available on the Web. If you do not want to immediately purchase a certificate, free temporary certificates are available from several Web sites, including:
When you have selected a certificate authority, request a certificate in PEM format. If necessary, you can use a chained certificate or a wildcard certificate with your Synchronizer system, although these more complex types of certificates are not recommended.
In order to obtain a certificate, you need to send the certificate authority a certificate signing request (CSR).
For assistance generating a CSR, see Generating a Certificate Signing Request
in Security Administration
in the GroupWise 2012 Administration Guide.
NOTE:Depending on the method that you use to generate the CSR, you might be prompted for the type of Web server where you plan to install the certificate. Synchronizer uses the CherryPy Web server.
The certificate authority returns one or more files to you. These files might require modification for use in your Synchronizer system. Save the files to a convenient location. If the certificate authority included a password, remove the password, as described in Removing a Password from a Key File. If the certificate authority provided multiple files, combine them into a single file, as described in Combining Files Received from a Certificate Authority.
If the key file provided by the certificate authority includes a password, you need to remove the password in order to use the key file in your Synchronizer system.
Check to see if the key file includes a password.
A password-protected key file includes the following line:
Proc-Type: 4,ENCRYPTED
Use the following command to remove the password:
openssl rsa -in original_file_name.key -out passwordless_file_name.key
If you receive more than one file from the certificate authority, such as a certificate file and a key file, you must combine the contents into a single file with the following format:
-----BEGIN RSA PRIVATE KEY----- several_lines_of_private_key_text -----END RSA PRIVATE KEY----- -----BEGIN CERTIFICATE----- several_lines_of_server_certificate_text -----END CERTIFICATE-----
If the certificate authority provided an intermediate certificate, place it at the end of the file after the private key and the actual certificate.
(Conditional) If you have been using a self-signed certificate, rename the existing /var/lib/datasync/device/mobility.pem file.
Copy the certificate file received the certificate authority to /var/lib/datasync/device.
Rename it to mobility.pem.
Restart the Mobility Connector.
(Conditional) If your particular mobile device does not automatically accept the commercially signed certificate in PEM format, follow the instructions in Manually Converting a Certificate to DER Format for Use on Mobile Devices.
IMPORTANT:If you uninstall the Synchronizer software, the certificate files associated with your Synchronizer system are also deleted. Back up commercially signed certificates in a location outside of /var/lib/datasync.
Some mobile devices do not automatically accept certificates in PEM format. If users encounter connection problems with particular mobile devices, you can convert the PEM file that you received from the certificate authority into DER format to resolve these connection problems.
Change to the /var/lib/datasync/device directory.
Execute the following command:
openssl x509 -in mobility.pem -inform PEM -out mobility.cer -outform DER
IMPORTANT:The output file name with the .cer extension must be in DER (Distinguished Encoding Rules) format.
Have users with connection problems follow the instructions in Manually Downloading a Certificate to a Mobile Device to use the mobility.cer file instead of the mobility.pem file.
Access the Data Synchronizer User Options page on your mobile device at the following URL:
https://data_synchronizer_server:8120
Replace data_synchronizer_server with the IP address or DNS hostname of the server where you installed the Mobility Pack.
Log in using your network user name and password.
Click the Mobility Connector.
(Conditional) If you are the Synchronizer administrator and have associated your mobile device with the Synchronizer administrator account, click
, then click to display the field.In the
field, click .Save the mobility.cer file to a convenient location on your mobile device.
Import the certificate file into the certificate store on your mobile device.
For device-specific instructions, see the Data Synchronizer Mobility Connector Devices Wiki.
(Conditional) If you are not able to access the Data Synchronizer User Options page from your particular mobile device:
Access the Data Synchronizer User Options page in a Web browser on your Linux or Windows desktop, then click the Mobility Connector.
Click
.Save the mobility.cer file on your Linux or Windows workstation.
Set up an IMAP email account on your mobile device, then email the mobility.cer file from your workstation to your mobile device.
or
Physically connect your mobile device to your workstation so that it appears as a drive on your workstation, then copy the mobility.cer file from your workstation to your device.
Import the certificate file into the certificate store on your mobile device.
For instructions, see Enabling and Disabling SSL for Device Connections
in Mobility Connector Configuration
in the Mobility Connector Configuration Guide.
For instructions, see Enabling a Device Password Security Policy
in Mobility Connector Configuration
in the Mobility Connector Configuration Guide.
By default, the Mobility Connector accepts connections from mobile devices that use SSLv3 and TLSv1, but rejects connections from mobile devices that use SSLv2. If a user’s mobile device tries to connect using SSLv2, the user receives an error and cannot connect.
You can enable and disable different versions of SSL protocols and also specify the cipher to use with the desired protocol.
In Synchronizer Web Admin, click the Mobility Connector to display the Mobility Connector Configuration page, then click to display the Connector XML Source window.
Add the following tags between the <custom> and </custom> tags:
<sslMethod>value</sslMethod> <sslCiphers>list</sslCiphers>
In the <sslMethod> tag, replace value with any of the following values:
SSL Version |
Value |
---|---|
SSLv2 |
1 (not recommended) |
SSLv3 |
2 |
TLSv1 |
4 |
All of the above |
3 (not recommended) |
SSLv3 and TLSv1 |
5 (default) |
In a terminal window, use the following command to determine the ciphers that are available on your system:
openssl ciphers -ssl3
In the <sslCiphers> tag in the Connector XML Source window, replace list with the desired values as provided by the openssl command.
Click
to save your changes, then click to return to the main Synchronizer Web Admin page.Restart the Mobility Connector to put the desired SSL protocol and ciphers into effect.