This is a known issue in the following versions when using an AFX Connector to an Oracle database that uses encryption:
- RSA Identity Governance & Lifecycle - 7.2.1 P06
- RSA Identity Governance & Lifecycle - 7.5.0 P03
- SecurID Governance & Lifecycle - 7.5.2 GA
Failed connector settings test Connection error: java.security.InvalidAlgorithmParameterException: DH Parameters without subprime Q are not FIPS 140 approved, specify using DSAParameterSpec or X942DHParameterSpec (java.lang.RuntimeException)
The error is generated when the target Oracle Database using Oracle Database Native Network Encryption (NNE) requests (ENCRYPTION=required) but does not enforce FIP 140 encryption level.
Current versions of AFX support and enforce FIPS 140 encryption if encryption is requested. Lower levels of encryption are considered insecure and are not allowed.
- RSA Governance & Lifecycle 8.0
1. This may be resolved by using FIPS 140 mode for the Oracle encryption. For most customers this is not practicable.
2. Another option is to disable Encryption between AFX and the Oracle Database server.
If you encountered the error described in this article, Oracle NNE encryption is enabled on the Oracle server but the Oracle listener may be configured to support encryption at three levels (accepted | requested | required).
If the Oracle listener is configured with SQLNET.ENCRYPTION_SERVER = REQUIRED, there is no solution.
If the Oracle listener is configured with ALLOWED or ACCEPTED, and the Oracle database is 21c (Note1) or later, it is possible to configure the AFX server to negotiate an unencrypted session.
a. Modify the AFX startup configuration by editing /home/oracle/AFX/esb/conf/wrapper.conf
b. Add the following line (the ordinal number 10 represents the latest line in the file, increment this number if required when there already is an item number 10 in the configuration file):
wrapper.java.additional.10=-Doracle.net.encryption_client=rejected
c. Restart AFX for this to take effect.
This setting will be overwritten if AFX is redeployed.
Ensure you remove this line to reenable encryption once you upgrade to a version where encryption is supported.
Note1. Oracle intends to back port the feature that allows for client negotiation of the encryption to Oracle 19c but it is unclear what patch level this will be done in. At the time of writing this improvement had not been back ported to Oracle 19.14.0.0.0. This feature may work on later patches of Oracle 19c. Contact Oracle Customer Support for more specific information.
Related Articles
To generate FIPS compliant pkcs12 file using Openssl 39Number of Views FIM - Encryption Algorithms Q&A 28Number of Views User Access Review incorrect value for Rows/Page in RSA Identity Governance & Lifecycle 20Number of Views RSA Announces the Availability of RSA Identity Governance and Lifecycle Appliance Updater - Q2 2016 4Number of Views RSA Announces the Availability of 2017 Q1 RSA Identity Governance and Lifecycle Appliance Updater Release 4Number of Views
Trending Articles
RSA Authentication Manager Upgrade Process RSA Release Notes for RSA Authentication Manager 8.8 RSA RADIUS Server service failed to start in the RSA Authentication Manager 8.1 Operations Console Microsoft Entra ID External MFA - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide RSA Release Notes: Cloud Access Service and RSA Authenticators