How to enable strong TLS/SSL cipher algorithms in RSA Identity Governance & Lifecycle
Originally Published: 2021-02-22
Article Number
Applies To
RSA Version/Condition: 7.2.1, 7.2.0, 7.1.1
Platform: WildFly/JBoss
Issue
Resolution
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
A) Standalone WildFly deployments:
- Login to the RSA Identity Governance & Lifecycle application server host as an oracle user.
- Run the following two JBOSS CLI commands exactly as shown:
"${AVEKSA_HOME}"/wildfly/bin/jboss-cli.sh -c --command="/core-service=management/security-realm=AveksaAgentRealm/server-identity=ssl/:write-attribute(name=enabled-cipher-suites,value=["TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384","TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384","TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256","TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"])""${AVEKSA_HOME}"/wildfly/bin/jboss-cli.sh -c --command="/core-service=management/security-realm=AveksaRealm/server-identity=ssl/:write-attribute(name=enabled-cipher-suites,value=["TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384","TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384","TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256","TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"])" - Copied below is an example of the above commands that are run in a test environment and their output:
oracle@acm:~> "${AVEKSA_HOME}"/wildfly/bin/jboss-cli.sh -c --command="/core-service=management/security-realm=AveksaAgentRealm/server-identity=ssl/:write-attribute(name=enabled-cipher-suites,value=["TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384","TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384","TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256","TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"])" { "outcome" => "success", "response-headers" => { "operation-requires-reload" => true, "process-state" => "reload-required" } } oracle@acm:~> "${AVEKSA_HOME}"/wildfly/bin/jboss-cli.sh -c --command="/core-service=management/security-realm=AveksaRealm/server-identity=ssl/:write-attribute(name=enabled-cipher-suites,value=["TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384","TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384","TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256","TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"])" { "outcome" => "success", "response-headers" => { "operation-requires-reload" => true, "process-state" => "reload-required" } } - Restart the application server for the changes to take effect:
service aveksa_server stop service aveksa_server start
B) Clustered WildFly deployments:
- Login to the RSA Identity Governance & Lifecycle Domain Controller host as an oracle user.
Note that the JBOSS CLI commands provided below only need to be run on the Domain Controller host. - Change the current working directory to <AVEKSA_HOME>/wildfly/bin, for example:
cd /home/oracle/wildfly/bin
- Connect to the JBOSS CLI using the following command (replace <domain-controller-ip-address> with the actual IP address):
./jboss-cli.sh -c --controller=<domain-controller-ip-address>
- At the JBOSS CLI command prompt, issue the following two commands:
/profile=full-ha/subsystem=undertow/server=default-server/https-listener=https:write-attribute(name=enabled-cipher-suites,value="TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256")
/profile=full-ha/subsystem=undertow/server=default-server/https-listener=agent-ssl:write-attribute(name=enabled-cipher-suites,value="TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256")
- For each of the commands that are run above, you should receive a response that starts with “outcome” => “success”.
- Type the following command at the JBOSS CLI prompt to exit the CLI:
exit
- Copied below is an example of the above commands that are run in a test environment and their output:
vm-adbp-69:/home/oracle/wildfly/bin # ./jboss-cli.sh -c --controller=10.101.249.169 [domain@10.101.249.169:9990 /] /profile=full-ha/subsystem=undertow/server=default-server/https-listener=https:write-attribute(name=enabled-cipher-suites,value="TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256") { "outcome" => "success", "result" => undefined, "server-groups" => {"img-server-group" => {"host" => {"master" => {"img-server-1" => {"response" => { "outcome" => "success", "response-headers" => { "operation-requires-reload" => true, "process-state" => "reload-required" } }}}}}} } [domain@10.101.249.169:9990 /] /profile=full-ha/subsystem=undertow/server=default-server/https-listener=agent-ssl:write-attribute(name=enabled-cipher-suites,value="TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256") { "outcome" => "success", "result" => undefined, "server-groups" => {"img-server-group" => {"host" => {"master" => {"img-server-1" => {"response" => { "outcome" => "success", "response-headers" => {"process-state" => "reload-required"} }}}}}} } [domain@10.101.249.169:9990 /] exit - Restart the RSA Identity Governance and Lifecycle application on all nodes of the cluster.
Related Articles
How to disable weaker DHE cipher modes (Logjam) in RSA DLP? 121Number of Views Entitlement Relationships are getting rejected in MAEDCs in RSA Governance & Lifecycle 3Number of Views Apache vulnerability 'Apache HTTP Server mod_rewrite' from scan 45Number of Views Security scan shows a possible denial of service vulnerability 20Number of Views Back-up failing after running network vulnerability scanner against Authentication Manager 38Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) How to install the jTDS JDBC driver on WildFly for use with Data Collections in RSA Identity Governance & Lifecycle RSA Authentication Manager 8.8 Setup and Configuration Guide Artifacts to gather in RSA Identity Governance & Lifecycle
Don't see what you're looking for?