The following tools are required to be installed on hosts configured to run ZTS server.
ZTS Server is written in Java and using embedded Jetty. It requires JDK 11.
Build the latest ZTS binary release by following the
development instructions. The binary release
packages will be created automatically in the assembly
subdirectory.
Copy the athenz-zts-X.Y-bin.tar.gz
to your desired setup directory.
$ tar xvfz athenz-zts-X.Y-bin.tar.gz
$ cd athenz-zts-X.Y
To run ZTS Server, the system administrator must generate the keys,
certificates and make necessary changes to the configuration settings.
Since ZMS Server is running with a self-signed certificate, we need to
generate a truststore for the java http client to use when communicating
with the ZMS Server. For our configuration script we need the ZMS server
hostname and a copy of the server certificate file. From your ZMS Server
installation, copy the zms_cert.pem
file from the
athenz-zms-X.Y/var/zms_server/certs
directory to a local directory on the
host that will be running the ZTS Server. For the zms-public-cert-path
argument below pass the full path of the zms_cert.pem.
$ cd athenz-zts-X.Y
$ bin/setup_dev_zts.sh <zms-hostname> <zms-public-cert-path>
Running this setup script completes the following tasks:
- Generate a unique private key that ZTS Server will use to sign any ZTokens it issues
- Generate a self-signed X509 certificate for ZTS Server HTTPS support
- Generate a truststore for secure communication with the ZMS Server
- Registers the zts service in Athenz sys.auth domain
- Generates an Athenz configuration file
For authenticating services using X509 certificates, ZTS Servers expect
the configured cert signer factory class names in its athenz.zts.cert_signer_factory_class
system property.
Self Cert Signer com.yahoo.athenz.zts.cert.impl.SelfCertSignerFactory
is a sample implementation of cert Signer we have for development environment.
You can use SelfCertSigner or have your implementation of Cert Signer.
Refer Certificate Signer for full details how to implement your cert signer.
Generate a unique private/public key pair that ZTS Server will use
to sign any ZTokens it issues. From the athenz-zts-X.Y
directory
execute the following commands:
$ cd var/zts_server/keys
$ openssl genrsa -out zts_private.pem 2048
$ openssl rsa -in zts_private.pem -pubout > zts_public.pem
While it is still possible to generate and use a self-signed X509 certificate for ZTS Servers, it is recommended to purchase one for your production server from a well known certificate authority. Having such a certificate installed on your ZTS Servers will no longer require to distribute the server's public certificate to other hosts (e.g. Hosts running ZPU).
Follow the instructions provided by the Certificate Authority to
generate your private key and then the Certificate Request (CSR).
Once you have received your X509 certificate, we just need to add
that certificate along with its private key to a keystore for Jetty
use. From the athenz-zts-X.Y
directory execute the following
command:
$ openssl pkcs12 -export -out zts_keystore.pkcs12 -in zts_cert.pem -inkey zts_key.pem
In order for ZTS to access ZMS domain data, it must identify itself
as a registered service in ZMS. Using the zms-cli
utility, we will
register a new service in sys.auth
domain. Since ZMS Servers should
be running with a X509 certificate from a well know certificate
authority (not a self-signed one) we don't need to reference the CA
cert like we did for the local/development environment setup.
$ cd athenz-zts-X.Y
$ bin/<platform>/zms-cli -z https://<zms-server>:4443/zms/v1 -d sys.auth add-service zts 0 var/zts_server/keys zts_public.pem
For authenticating services using X509 certificates, ZTS Servers expect
the configured cert signer factory class names in its athenz.zts.cert_signer_factory_class
system property.
We already have below implementation of cert Signer:
- Self Cert Signer com.yahoo.athenz.zts.cert.impl.SelfCertSignerFactory for the dev environment.
- Crypki Cert Signer com.yahoo.athenz.zts.cert.impl.crypki.HttpCertSignerFactory for the production environment. Crypki is simple service for interacting with an HSM or other PKCS#11 device.
You can use HttpCert Signer or have your implementation of Cert Signer.
Refer Certificate Signer for full details how to implement your own certificate signer.
Generate an Athenz configuration file athenz.conf
in athenz-zts-X.Y/conf/zts_server
directory to include the ZMS Server URL and the registered public keys that the
athenz client libraries and utilities will use to establish connection and validate any
data signed by the ZMS Server:
$ cd athenz-zts-X.Y
$ bin/<platform>/athenz-conf -o conf/zts_server/athenz.conf -z https://<zms-server>:4443/ -t https://<zts-server>:8443/
Start the ZTS Server by executing:
$ cd athenz-zts-X.Y
$ bin/zts start
Based on the sample configuration file provided, ZTS Server will be listening on port 8443.
Stop the ZTS Server by executing:
$ cd athenz-zts-X.Y
$ bin/zts stop