How to configure ESE to authenticate clients using client certificates and authorize using postgresSQL(without username/password)
This article provides a detailed guide on configuring the HiveMQ Enterprise Security Extension to authenticate clients using X.509 certificates. Specifically, client certificates containing a subject common name are used for authentication, while role-based permissions are applied for authorization. As a result, there is no need for the client to provide a username or password during the authentication process.
Pre-requisites
Created Key-store and trust-store certificates with subject common name configured. You can always refer to our documentation to know how to generate these certificates.
Running setup of database realm (here we are using PostgreSQL)
Instructions
The first step is to configure
<tls-tcp-listener>
in your hivemqconfig.xml
. Please refer following example.<hivemq> <listeners> <tls-tcp-listener> <port>8883</port> <bind-address>0.0.0.0</bind-address> <tls> <keystore> <path>/path/to/hivemq.jks</path> <password><your passsword></password> <private-key-password><your passsword></private-key-password> </keystore> <truststore> <path>/path/to/hivemq-trust-store.jks</path> <password><your passsword></password> </truststore> <client-authentication-mode>REQUIRED</client-authentication-mode> </tls> </tls-tcp-listener> </listeners>
Next step, make sure you have the database setup ready with the roles and permissions data.
Make sure you have
roles.name
matching the client’s certificate's common name in order to work authorization successfully and also have the right permissions assigned to the role.Please check our documentation for database schema and how to use a helper tool to insert data.
Now configure ESE configuration file, i.e
enterprise-security-extension.xml
First configure the realm with your database type, name, host, password, db-username and db-password. For more details about different realms please check our documentation. Please refer to the following example of Postgres
<realms> <!-- a postgresql db--> <sql-realm> <name>postgres-backend</name> <enabled>true</enabled> <configuration> <db-type>POSTGRES</db-type> <db-name>hivemq-db</db-name> <db-host>localhost</db-host> <db-port>5432</db-port> <db-username>postgres</db-username> <db-password>hivemq</db-password> </configuration> </sql-realm> </realms>
the Next step is to configure authentication managers i.e
<allow-all-authentication-manager/>
. An authentication manager is defined in a pipeline and handles the authentication processes of connecting MQTT clients by using the content of the authentication variables. )
Example: For the current scenario, authentication will be done by the certificates hence skip the authentication using SQL realm when not using username/password. We will use<allow-all-authentication-manager/>
<allow-all-authentication-manager/>
Configure
<pipelines>
to authorize the client, You can also add preprocessors to do some modifications or processing to inputs before authorization happens.In the current scenario will be using
<x509-preprocessor>
to process and extract subject-common-name and set the ESE variableauthorization-role-key
for authorization.
Note: you can use any other x509 field for extraction. For this article’s scenario, we have used the subject-common-name.you can also add a logging preprocessor to debug the state of ESE variables in <authorization-preprocessors>. Please remember to add a logger in your
logback.xml
to see these log messages.
Example to add <logging-preprocessor>:Example to add logger in logback.xml:
In the ESE, authorization is done by authorization managers. An authorization manager is defined in a pipeline and handles the authorization processes of connecting MQTT clients by using the content of the authorization variables. Configure the realm name (this was set in step 3-a.), <use-authorization-key> and <use-authorization-role-key>. Here we are using role-based permissions hence set <use-authorization-role-key> to true and use-authorization-key to false;
Example:after configuring all the above steps final
enterprise-security-extension.xml
will be asRun HiveMQ broker and look for the log messages which mention that HiveMq Broker and ESE is started successfully.
You can quickly test your configurations with MQTT CLI.
Subscribe to the authorised topic:Publish message to the authorised topic:
You can also check
access.log
andhivemq.log
to see the log entries