The SQL Gateway functions support secured connections over TLS (Transport Layer Security) / SSL (Secure Socket Layer) between the SQL Gateway and MySQL databases or Microsoft SQL Server databases. If you configure these connections properly, the databases may be located outside your industrial network.
The SQL Gateway functions also support secured connections between the controllers and the SQL Gateway. If your controller does not support secured communication, you can configure unsecured communication between the controller and the SQL Gateway. In this case, communication must only be performed inside your industrial network, isolated from other networks inside your company and from the Internet.
WARNING | |
---|---|
For more information on organizational measures and rules covering access to infrastructures, refer to ISO/IEC 27000 series, Common Criteria for Information Technology Security Evaluation, ISO/IEC 15408, IEC 62351, ISA/IEC 62443, NIST Cybersecurity Framework, Information Security Forum - Standard of Good Practice for Information Security.
The SQL Gateway uses a specific TCP port for secured and another TCP port for unsecured communication through which the controllers send their SQL queries. Set up your network structure and configure your firewall so that the ports you are using are accessible to the controllers.
During initial start of the SQL Gateway, you are requested to decide whether you want to assign a password to help protect the software from unauthorized access.
WARNING | |
---|---|
If password protection is active, you must enter the password each time you open the
.After you have started the SQL Gateway, you can activate / deactivate password protection in the tab by selecting the node:
Select the
option to activate / deactivate the password for the .Click the
button to modify the password for the .With each SSL encrypted connection, SSL certificates are verified. This helps to ensure that the SSL client is connected to the intended SSL server and vice versa.
For SSL encryption, two different types of certificates are available:
Server certificates:
Certificates for the SSL servers. They serve two purposes:
Providing public and private keys to be used for encrypting data that is sent from the SSL client to the SSL server.
Providing information that allows the client to verify that it is connected to the correct SSL server.
Client certificates:
Certificates for the SSL clients. They are not needed for encrypting data but only for client authentication. The usage of client certificates is optional, but may be required by the server to verify whether the SSL client is allowed to connect to the SSL server.
You can create self-signed certificates or you can use certificates signed by a certificate authority (CA). A short description on how to create self-signed certificates is provided in the Configuring SSL Encrypted Connections chapter for each SQL database type.
It is a good practice that the SSL client validates the server certificate in order to make sure that it is connected to the intended server when a connection is established.
There are two different validation procedures that can be executed by the client:
: This procedure verifies whether the subject name in the server certificate matches the name of the server in the TCP connection.
The certificate store is a Windows component for managing certificates.
To open the certificate store, proceed as follows:
Step |
Action |
Comment |
---|---|---|
1 |
On a Windows PC, execute the command |
Result: The Microsoft management opens. |
2 |
Execute the command . |
– |
3 |
In the dialog box, select , and click the button. |
– |
4 |
In the dialog box, select the option and click , then click . |
– |
5 |
Close the dialog box by clicking . |
Result: The Microsoft management contains two relevant folders: |
To import a certificate, right-click the
or folder, and execute the command . Follow the instructions provided by the . Select the option .To assign access rights for a server account to a certificate, proceed as follows:
Step |
Action |
---|---|
1 |
Right-click the certificate in the certificate store, and execute the command . |
2 |
In the next dialog box, click the button. |
3 |
Select the option . |
4 |
Click the button , select the entry of your local PC, and click . |
5 |
Copy the name to the text box. |
To copy the thumbprint information of a certificate, proceed as follows:
Step |
Action |
---|---|
1 |
Double-click a certificate. |
2 |
In the tab, select the entry, and copy its . |