CipherTrust Manager - Hands-On - CTE - Linux
CipherTrust Manager - Hands-On - CTE - Linux
Contents
Part 1: Overview
Prerequisites
For this exercise, you will need:
Access to the training portals
Duration
This training course will take approximately 2 hours.
Objectives
In this exercise, you will:
Install and configure the CTE Client for Linux
Configure CipherTrust to encrypt a directory in Linux
In part two, you will use the same domain that was created in the following hands-on document:
CipherTrust - Hands-On CTE - Windows.docx
User domainadmin
Password Thales123!
User domainadmin
Password Thales123!
1. Navigate to Keys & Access Management and then click on Registration Tokens on the left panel.
6. Click Done.
7. Select the ASCII option, click Copy on the created token and paste it in Notepad, save the file to the
Desktop.
1. From the training platform, log in to the Linux CentOS 7 virtual machine:
Enter the following:
User root
Password Thales123!
8. When the message: Do you want to continue with agent registration? appears, type y and press
Enter.
9. When the message: Please enter the primary key manager host name appears, type CipherTrust and
press Enter.
10. When the message: Is this host name correct? appears, type y and press Enter.
11. When the message: Please enter the host name of this machine, or select from the following list
appears, select number 2 (IP 10.160.10.20) and then press Enter.
12. Paste the token that was created in Section 2 above and press Enter.
16. Approve the above settings - type y and then press Enter.
17. When asked if it is possible to associate this installation with the hardware of this machine, type N and
press Enter.
19. When the following message appears: Please enter the LDT Communication Group name, Press
Enter .
20. In the support for Cloud Object Store option type n and press Enter.
User domainadmin
Password Thales123!
3. Click the CTE application, and on the left pane, click Clients.
4. Verify that the Linux client is created.
5. Click Next.
Note:
Data Transformation
Add data transformation rules to specify the Resources to be protected and the
encryption keys that are to be used for rekeying.
When selecting Data Transformation, the encryption is performed manually using the
dataxform tool to encrypt/decrypt the data
6. Click .
8. In the Select Action(s) window, select the all_ops check box, and then click .
10. In the Select Effect window, verify that the Permit and ApplyKey options are selected
and then click Select.
12. Click .
13. In the Name field, type a Name for the user set. Enter linux_set_allow.
17. Click Select, a list of users from the Active Directory Users and Computers will be presented, select
the user: training, and then click Next.
23. Click .
Under Resource Set, do not change the default settings.
24. Under Key Name click Select.
25. Click .
26. Enter a key name - type linux_cte_policy.
27. Click Create.
Note: The Deny policy is the last policy. The reason being that if a resource is accessed
and the user who tries to gain access is not permitted, the deny role will block the
access.
6. Select the previously created linux_cte_policy radio button, and then click Select.
16. Type any text and click CTRL and D to save the file.
17. Type ls –la and press Enter again (you will see that the file is created).
Note: When GurdPoint is created no user will gain access to resource by default.
User Set needs to be created in order to allow access to users.
If there are files that exist in the directory before the encryption proses the files will not
be encrypted.
In order to encrypt existent files with CTE the dataxform command need to be run.
User root
Password Thales123!
4. Open the Linux Terminal, type cd /var/log/vormetric , and then press Enter.
5. To inspect the GuardPoints that apply to Linux type: secfsd -status guard
7. To inspect the installed version of the CTE Client, type: vmsec version
9. Inspect the vmd log file, by typing the command: tail –f vmd.log
10. The secfsd log presents the tracked connections and operations of the client with the CM.
tail –f secfsd.log
11. The CTE installation directory has some tools that can help with the debugging, type:
cd /opt/vormetric/DataSecurityExpert/agent/vmd/bin
12. Type ls –la and press Enter.
13. To check the CTE agent health and status type: /agenthealth
15. To pull (update) the policy from the CipherTrust Server type: /polgen