This Venafi Trust Protection Platform lab environment contains the following virtual machines that have been pre-configured with the proper networking and settings. The environment includes:
- 1x Trust Protection Platform Server (TPP 20.2)
- Microsoft Certification Authority (venafidemo-TPP-CA)
- Active Directory Domain Services (venafidemo.com)
- DNS (venafidemo.com)
- IIS Server (for Venafi GUIs)
- MS SQL Express 2016
- 1x Ubuntu Server (Apache)
- Minimal Install
- Apache Web Server
- 1x F5 BIG-IP Server (BIG-IP)
- 1x F5 BIG-IQ Server (BIG-IQ)
VM | Internal IP | Internal DNS | CLI Username | CLI Password | GUI Username | GUI Password |
---|---|---|---|---|---|---|
BIG-IQ | 192.168.1.200 | bigiq.venafidemo.com | root | VenP@ss123! | admin | VenP@ss123! |
BIG-IP | 192.168.1.201 | bigip1.venafidemo.com | root | VenP@ss | admin | VenP@ss |
TPP Server | 192.168.1.100 | tpp.venafidemo.com | N/A | N/A | VENAFIDEMO\venafi_svc | 5&Njgx8IGyHQ |
Venafi Platform | 192.168.1.100 | tpp.venafidemo.com | N/A | N/A | tppadmin | Password123! |
- Section 1 - Automating Machine Identities with BIG-IP
- Section 2 - Transitioning from BIG-IP to BIG-IQ
- Section 3 - Deploying a new application using BIG-IQ & Venafi
The BIG-IQ virtual machine sometimes has issues when resuming from a suspended state. The following steps will ensure all devices and services are working as expected, verify all settings are correct and demonstrate the current configuration of the environment.
-
Click View VM on BIG-IQ.
-
Click inside the black window and press
Enter
on the keyboard to wake up the CLI. -
Restart BIG-IQ by typing the following command and waiting for services to come back (about 5 minutes). If you are required to login, please use the following credentials:
login: root password: VenP@ss123! ----------- reboot now
-
Click View VM on “Venafi TPP Server” and log into Windows using the following credentials, if prompted:
UN: VENAFIDEMO/Administrator PW: Password123!
-
Next, validate the current BIG-IP configuration by opening the “BIG-IP #1” bookmark and logging in with the following credentials:
UN: admin PW: VenP@ss
NOTE: The management certificate for BIG-IP is also being managed by TPP. The management certificate for BIG-IQ will be self-signed.
An Apache web server has already been configured in the environment and is hosting a static, example application. This section will walk through the configuration of an F5 BIG-IP device providing SSL termination to that application while using a machine identity from Venafi Trust Protection Platform.
-
Login to the Trust Protection Platform server, open a browser and navigate to http://ubuntu-web to verify the application is up and running. The Venafi Ecosystem background should be visible.
-
Next, navigate to https://bigip1.venafidemo.com from within the TPP VM to start the configuration of BIG-IP. Login with the following credentials:
UN: admin PW: VenP@ss
-
Click on
Local Traffic > Nodes
and then theCreate
button to create a new Node. -
Fill in the node information as follows:
"Name": "ecosystemapp" "Address": 192.168.2.101
-
Navigate to
Local Traffic > Pools
and click theCreate
button to create a new Pool -
Use the following values to create the new pool:
"Name": "ecosystemapp_pool" "Service Port": 80
NOTE: Make sure to click the
Add
button after specifying the port: -
Click
Finished
to create the new pool -
Navigate to
Local Traffic > Virtual Servers
and click theCreate
button to create a new Virtual Server -
Use the following values to create the virtual server:
"Name": "vs_ecosystem" "Source Address": 0.0.0.0/0 "Destination Address": 192.168.2.10 "Service Port": "https" "SSL Profile (Client)": "clientssl" "Source Address Translation": "Auto Map" "Default Pool": "ecosystemapp_pool"
-
At this point, BIG-IP is hosting the ecosystemapp application at the virtual IP https://192.168.2.10, but the application is not using a valid certificate yet.
NOTE: A BIG-IP Credential Object has already been created in TPP using the BIG-IP credentials from earlier in the lab:
-
Log into Web Admin using the Venafi TPP bookmark in the Chrome bookmark toolbar:
-
Navigate to
Policy > Certificates > F5 > BIG-IP > bigip1.venafidemo.com
. A BIG-IP Device Object has already been created in TPP using the FQDN and specifying a Credential Object that can be used for authentication to the BIG-IP device.NOTE: An F5 Application Object has already been created and is currently managing the BIG-IP device certificate. A new Application Object will be created to manage the machine identity associated with the ecosystemapp application.
-
Right-click the
bigip1.venafidemo.com
Device Object and then clickAdd > Certificates > Server Certificate
and enter the following information:"Certificate Name": "ecosystemapp.venafidemo.com" "Common Name": "ecosystemapp.venafidemo.com" "Organization": "Venafi" "Organization Unit": "Ecosystem" "City": "Salt Lake City" "State/Province": "UT" "Country" : "US"
-
Click
Save
at the bottom of the page -
The Certificate Object has been created, but it hasn't been issued by the CA yet. Click
Renew Now
to issue the certificate. -
Venafi Trust Protection Platform will submit the CSR to the configured Certificate Authority and retrieve it when it becomes available. This process can be seen by clicking on the
Refresh
icon in the top-right corner. Keep clicking onRefresh
until the Certificate Status saysOK
. -
Right-click the
bigip1.venafidemo.com
Device Object and then clickAdd > Application > F5 LTM Advanced
and configure the Application Object with the following information:"Processing Disabled": □ "Associated Certificate": "ecosystemapp.venafidemo.com" "Application Name": "ecosystemapp" "Force Profile Update": "Yes" "Bundle Certificate": "Yes" "Overwrite Certificate and Key": "Yes" "SSL Profile": "client_tpp" "Parent SSL Profile": "clientssl" "Virtual Server": "vs_ecosystem" "Virtual Server Partition": "Common"
NOTE: This example will create a new
client_tpp
SSL Profile if it doesn't already exist, using the Parent SSL Profile information. -
Click
Save
at the bottom of the page. -
Click
Push
to automatically provision the associated certificate to BIG-IP, create the new "client_tpp" SSL Profile and assign it to the "vs_ecosystem" Virtual Server. This process can be seen by clicking on theRefresh
icon in the top-right corner. Keep clicking onRefresh
until the Certificate Status saysOK
. -
Verify the certificate is in use by the virtual server by navigating to the Virtual Server IP address at https://192.168.2.10 or https://ecosystemapp.venafidemo.com and using the browser to inspect the certificate. The issue date should be today's date.
The steps in this section will bring the BIG-IP server under the management of BIG-IQ. All future lifecycle operations involving the machine identity will be initiated from BIG-IQ. The BIG-IQ virtual machine sometimes has issues when resuming from a suspended state.
If the VM wasn't reset in the previous section, or if the environment has suspended and resumed since then, the following steps will ensure all devices and services are working as expected.
-
Click View VM on BIG-IQ.
-
Click inside the black window and press
Enter
on the keyboard to wake up the CLI. -
Restart BIG-IQ by typing the following command and waiting for services to come back (about 5 minutes):
reboot now
NOTE: You should see the BIG-IQ Login Screen when the device has finished starting up:
-
Navigate to the “BIG-IQ” bookmark and login with the following credentials:
UN: admin PW: VenP@ss123!
-
Click on the Devices tab and then click Add Device and enter the following information, then click Add.
"IP Address": 192.168.1.201 "Port": 443 "User Name": "admin" "Password": "VenP@ss"
-
Leave the default “Local Traffic (LTM)” selected and click Continue. When complete, bigip1.venafidemo.com should be listed in the device list.
-
Click on Complete Import Tasks in the “Services” column and then the Import button to import the current configuration of the BIG-IP device added in the previous step.
-
Click the Configuration tab, then
Local Traffic > Certificate Management > Certificates & Keys
. The certificate created in Section 1, "ecosystemapp.venafidemo.com" is present and listed as "Unmanaged." -
Next, click Third Party CA Management, then Create to configure TPP as a CA provider using the following values, and then click Test Connection to validate.
"CA Providers": "Venafi" "Name": "TPP" "WebSDK Endpoint": "https://tpp.venafidemo.com/vedsdk" "User Name": "tppadmin" "Password": "Password123!" "Key Passphrase": "VenafiPassword123!"
NOTE: In order for the above step to complete successfully in production environments, the Venafi Operational Certificate must be publicly trusted, OR the root certificate of the internal CA must be added to the Java trust store on BIG-IQ.
-
Before continuing with the BIG-IQ configuration, users will want to configure TPP with a logical BIG-IQ policy folder structure. Navigate back to Web Admin and create the following two new Policy folders under the existing BIG-IQ folder. These newly created folders will be used in steps later in the lab. For this example, the
Ecosystem App
folder will be used for our existing application. TheInternal App
folder will be used to demonstrate additional policy options that can be enforced by Venafi Trust Protection Platform. -
Right-click the
BIG-IQ
folder, selectAdd > Policy
, name it "Ecosystem App," and configure the policy with the following settings, ensuring to lock the policy values. Be sure to click Save at the bottom of the page to save the configuration settings."Organization": "Venafi" "Organization Unit": "Ecosystem" "City": "Salt Lake City" "State/Province": "UT" "Country": "US"
-
Right-click the
BIG-IQ
folder, selectAdd > Policy
, name it "Internal App," and configure the policy with the following settings, ensuring to lock the Orgnazation and Country fields. Be sure to click Save at the bottom of the page to save the configuration settings."Organization": "Venafi" "Organization Unit": "City": "State/Province": "Country": "US"
-
Since BIG-IP will be handling the provisioning process, the Management Type of the BIG-IQ parent folder needs to be set to Enrollment, and child folders should be set to inherit this policy value.
-
Next, navigate back to the BIG-IQ interface and complete the configuration of the Third-Party CA Management Provider, TPP, created earlier. From the Third-Party CA Management page, click Edit Policy.
-
Enter
\VED\Policy\Certificates\F5\BIG-IQ\
to specify the top-level folder that should be connected to BIG-IQ and then click Get. TheDevice Folder Path
can be left with the default value.NOTE: The two policy folders created earlier should populate under the Policy Folder List
-
Click Save & Close at the bottom of the page.
This use case outlines the steps necessary to introduce BIG-IQ to an existing environment that includes Venafi and BIG-IP. Because BIG-IQ is going to be handling the provisioning process from this point forward, the easiest thing to do is use BIG-IQ to issue a new machine identity for the application, directly from BIG-IQ. Exactly when will depend on your particular use case - the transition can take place anytime before the original certificate expires.
-
Navigate to
Configuration > Local Traffic > Certificates & Keys
and click Create and fill in the details for the new certificate:"Name": "ecosystemapp.venafidemo.com" "Issuer": "TPP" "Policy Folder": "Ecosystem App" "Common Name": "ecosystemapp.venafidemo.com" "Password": "VenafiPassword123!" "Confirm Password": "VenafiPassword123!"
-
Click Save & Close to instruct BIG-IQ to create the CSR and request the certificate through Venafi Trust Protection Platform. Once the certificate has been retrieved from the Venafi platform, it should be listed on the
Certificate Management > Certificates & Keys
page, with a state of "Managed." -
Next, we must update the SSL Profile with the new password for the private key. Navigate to
Configuration > Local Traffic > Profiles
and click on the clientssl_tpp profile to edit it. -
Scroll down the page, select a the newly created certificate and key, and enter the private key password (
Password123!
) used in Step 1 of this exercise and then click Save & Close -
Finally, the changes must be pushed down to the BIG-IP device – this is done using a “Deployment” from the BIG-IQ interface. Navigate to
Configuration > Local Traffic > Virtual Servers
-
Select the “vs_ecosystem” Virtual Server and click Deploy
-
Give the deployment job a descriptive name, like “ecosystemapp-deployment”
-
Scroll down and ensure “vs_ecosystem” is selected as the Source Object:
-
Next, click Find Relevant Devices, in the bottom-left corner, to search for any BIG-IP devices that this can be deployed to – bigip1.venafidemo.com should be the only device listed. Select it and then click the arrow to move it into the “Selected” column. The final configuration should look like this:
-
When the target device has been selected, the Create button will become available. Click Create to create an “Evaluation.” Once the evaluation has been created, users are able to click View in the “Differences” column to see exactly what will change when the new deployment is pushed down to the BIG-IP device.
-
Finally, scroll to the bottom and click Deploy Now.
-
Navigate back to https://ecocsystemapp.venafidemo.com and inspect the certificate. The virtual server should now be using the latest certificate that was requested via BIG-IQ.
This use case outlines the steps necessary to request a new certificate from BIG-IQ, and create a new SSL Profile. There are a lot fewer steps in this section because this demonstrates a net new application. There is nothing to migrate. In this example, like the last, BIG-IQ is authoritative over the certificate lifecycle and all provisioning tasks originate from BIG-IQ, rather than Trust Protection Platform.
-
From the BIG-IQ management interface, click the Configuration tab and then navigate to
Local Traffic > Certificate Management > Certificates & Keys
-
Click Create and fill in the details for the new certificate. You'll notice that the certificate policy for this folder is a little more relaxed due to the configurations we made in Section 2. You can choose to enter your city & state, or simply leave the fields blank.
"Name": "internalapp.venafidemo.com" "Issuer": "TPP" "Policy Folder": "Internal App" "Common Name": "internalapp.venafidemo.com" "Password": "VenafiPassword123!" "Confirm Password": "VenafiPassword123!"
-
Click Save & Close to begin the issuance process. The page that follows should show a new “Managed” certificate and values will continue to populate as that certificate goes through the lifecycle. When processing is complete, the status should turn to green:
-
Finally, navigate back to TPP and verify that the certificate object has been created and it is located in the proper folder, and with the correct settings.
-
At this point, users should be ready to associate the newly created certificate with a new SSL Profile using BIG-IQ.
This concludes the guided lab, but please feel free to continue exploring the environment, requesting certificates and attaching them to SSL Profiles, creating virtual servers, or anything else you may want to try.
If you have any questions or feedback, please reach out to [email protected]