Along with auth code flow, Platform 6 Integration Models also support Mutual TLS (mTLS), a variation on transport layer security (TLS) certificates, that extends secure communications provided by TLS by adding additional authentication between client and server. In mTLS, both the client and server have a certificate, and both sides authenticate using their public/private key pair.
mTLS security schema
From the securitySchemes object of an example imported integration model, the securityKey sets the mutualTLS authentication type, which supports ca, certificate, and key credentials.
How to apply mutual TLS authentication
To set up mTLS, you need trusted certificates.
To configure mTLS authentication:
-
Go to Itential Platform > Admin Essentials > Integrations and select your integration from the left navigation.
-
From the Integration UI, drag and drop your files into the drag-and-drop area to upload your
certificate,key, andcafiles. Alternatively, select click to browse to navigate to the files on your system. -
After the files are uploaded to the integration, select the enabled checkbox below tls to enforce mTLS and only allow a connection when mTLS authentication is successful.
Tip: To allow a connection to proceed even if mTLS authentication fails, or a request is sent without a mutual client certificate, clear this checkbox.
-
Click Save to retain your changes.
CyberArk CCP limitation for PEM key files
CyberArk CCP cannot be used to store PEM-formatted key files. This is because CyberArk replaces newlines with spaces in password values, but the PEM file format uses newlines as part of its structure.
To work around this limitation, use one of the following approaches:
- Upload directly: Upload your
keyfile directly to your Integration in Itential Platform. - Use HashiCorp Vault: Store your
keyfile in HashiCorp Vault and reference it using a$SECRETor$KEYVault secret reference.