On Secure Bridge Setup, you can find operational concepts for a secure BRIDGE setup. Find here some additional security recommendations to consider for BRIDGE hardening.
Disabling TLS 1.0
If you do not have any clients that need TLS 1.0, we recommend to disable this protocol for the BRIDGE from the security point of view. To be downwards compatible with MagicDraw 17 (see note), we did not implement this to the standard BRIDGE installation.
To do disable TLS 1.0, you have to edit the Tomcat and Apache configuration files of the BRIDGE as shown in the table below.
Location | Attribute/Property | Example | Notes | |
---|---|---|---|---|
Tomcat |
| sslEnabledProtocols | sslEnabledProtocols="TLSv1.2,TLSv1.1,TLSv1,SSLv2Hello" sslEnabledProtocols="TLSv1.2,TLSv1.1,SSLv2Hello" | This file will get overwritten on BRIDGE updates! The old configuration file is copied to server.xml.old. |
Apache |
| SSLProtocol |
SSLProtocol All -SSLv2 -SSLv3 | Copy the Apache templates that have been provided with your BRIDGE installation from folder <your BRIDGE data directory>/proxies/conf/httpd.conf is generated from this template file on BRIDGE start-up. The BRIDGE will generate the configuration from the file in folder templates if available. If not, the BRIDGE will use the system templates. |
Steps
- Apply changes to the files as described above. Consider the notes!
- Restart the BRIDGE to apply the changed Apache configuration.