When deployed, Validation Authority adds the following database requirements.
Database management system
Validation Authority supports the following Database Management Systems (DBMS).
DBMS | Version |
|---|---|
Oracle | 21.3.0 |
PostgreSQL | 15+ |
Microsoft SQL Server | 2019 CU15 |
2022 CU13 |
Database storage
Calculate the required database storage based on the expected data.
Database platform
Check the DBMS documentation for the DBMS requirements on each platform. In the case of PostgreSQL, we recommend downloading the official Docker image:
https://hub.docker.com/_/postgres
If you are not using this Docker image, make sure to install the pg_trgm extension by running this command.
sudo dnf install postgresql15-contribDatabase user permissions
The database user must have permissions on the public schema.
For example, to create a PostgreSQL database user with sufficient permissions, connect to PSQL using the default PostgreSQL user and execute the following commands.
CREATE USER ${POSTGRES_USER} WITH NOSUPERUSER CREATEDB ENCRYPTED PASSWORD '${POSTGRES_PWD}';\c postgres ${POSTGRES_USER}CREATE DATABASE mydb;\c mydb ${POSTGRES_USER}CREATE EXTENSION IF NOT EXISTS pg_trgm;Where:
${POSTGRES_USER}is the database user name.${POSTGRES_PWD}is the database user password.
Database allowed connections
Restrict database incoming connections to those originating from the Cryptographic Security Platform host.
To restrict incoming connections on a PostgreSQL database
Edit the following PostgreSQL configuration file.
pg_hba.confAdd the following line.
hostssl cm ${POSTGRES_USER} <host> scram-sha-256Where
<host>is the IP address of the Cryptographic Security Platform host.
Database supported number of connections
The Validation Authority database must support 192 connections per cluster.
As explained in Database, this value must be at least three times the value assigned to the Max connections configuration parameter.
Database TLS certificate
In TLS-protected connections with the database, the TLS certificate of the database must include the IP address or hostname Cryptographic Security Platform will use to connect with the database. You can alternatively:
- Set the hostname or IP address in the CN attribute of the certificate subject.
- Set the hostname in a SAN attribute of the
dNSNametype. - Set the IP address in a SAN attribute of the
iPAddresstype.
Entrust solutions in production mode should always be configured to enforce SSL-protected connections with the database.