<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>OpenText Analytics Database 26.2.x – Connecting securely from MC to the database</title>
    <link>/en/mc/configuring-mc/connecting-securely-from-mc-to-db/</link>
    <description>Recent content in Connecting securely from MC to the database on OpenText Analytics Database 26.2.x</description>
    <generator>Hugo -- gohugo.io</generator>
    
	  <atom:link href="/en/mc/configuring-mc/connecting-securely-from-mc-to-db/index.xml" rel="self" type="application/rss+xml" />
    
    
      
        
      
    
    
    <item>
      <title>Mc: Management Console security</title>
      <link>/en/mc/configuring-mc/connecting-securely-from-mc-to-db/mc-security/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/mc/configuring-mc/connecting-securely-from-mc-to-db/mc-security/</guid>
      <description>
        
        
        &lt;p&gt;The Management Console (MC) manages multiple database clusters, all of which might have different levels and types of security, such as user names and passwords and LDAP authentication. You can also manage MC users who have varying levels of access across these components.&lt;/p&gt;
&lt;h2 id=&#34;open-authorization-and-ssl&#34;&gt;Open authorization and SSL&lt;/h2&gt;
&lt;p&gt;Management Console (MC) uses a combination of OAuth (Open Authorization), Secure Socket Layer (SSL), and locally-encrypted passwords to secure HTTPS requests between a user&#39;s browser and MC, and between MC and the &lt;a class=&#34;glosslink&#34; href=&#34;../../../../en/glossary/agent/&#34; title=&#34;A daemon process that runs on each OpenText&amp;amp;trade; Analytics Database cluster node.&#34;&gt;agents&lt;/a&gt;. Authentication occurs through MC and between agents within the cluster. Agents also authenticate and authorize jobs.&lt;/p&gt;
&lt;p&gt;The MC configuration process sets up SSL automatically, but you must have the openssl package installed on your Linux environment first.&lt;/p&gt;

&lt;p&gt;See the following topics for more information:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/security-and-authentication/tls-protocol/#&#34;&gt;TLS protocol&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/security-and-authentication/tls-protocol/tls-overview/generating-certificates-and-keys-mc/#&#34;&gt;Generating certificates and keys for MC&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/security-and-authentication/tls-protocol/tls-overview/importing-new-certificate-to-mc/#&#34;&gt;Importing a new certificate to MC&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;user-authentication-and-access&#34;&gt;User authentication and access&lt;/h2&gt;
&lt;p&gt;MC provides two user authentication methods, LDAP or MC. You can use only one method at a time. For example, if you chose LDAP, all MC users will be authenticated against your organization&#39;s LDAP server.&lt;/p&gt;
&lt;p&gt;You set up LDAP authentication up through MC Settings &amp;gt; Authentication on the MC interface.

&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

MC uses LDAP data for authentication purposes only. It does not modify user information in the LDAP repository.

&lt;/div&gt;&lt;/p&gt;
&lt;p&gt;The MC authentication method stores MC user information internally and encrypts passwords. These MC users are not system (Linux) users. They are accounts that have access to MC and, optionally, to one or more MC-managed databases through the MC interface.&lt;/p&gt;
&lt;p&gt;Management Console also has rules for what users can see when they sign in to MC from a client browser. These rules are governed by access levels, each of which is made up of a set of roles.&lt;/p&gt;
&lt;h2 id=&#34;see-also&#34;&gt;See also&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/mc/users-roles-and-privileges/#&#34;&gt;Users, roles, and privileges in MC&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/mc/users-roles-and-privileges/user-admin-mc/#&#34;&gt;User administration in MC&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/mc/users-roles-and-privileges/user-admin-mc/#&#34;&gt;User administration in MC&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    <item>
      <title>Mc: Determining the TLS mode of the database</title>
      <link>/en/mc/configuring-mc/connecting-securely-from-mc-to-db/determining-tls-mode-of-db/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/mc/configuring-mc/connecting-securely-from-mc-to-db/determining-tls-mode-of-db/</guid>
      <description>
        
        
        &lt;p&gt;When you configure OpenText™ Analytics Database for TLS through the Management Console, you must configure the security mode to match what the database is configured to require: server mode or mutual mode.&lt;/p&gt;
&lt;p&gt;To determine the TLS mode for existing sessions, query the &lt;a href=&#34;../../../../en/sql-reference/system-tables/v-monitor-schema/sessions/#&#34;&gt;SESSIONS&lt;/a&gt; system table:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; SELECT session_id, user_name, ssl_state FROM sessions;
           session_id            | user_name | ssl_state
---------------------------------+-----------+-----------
 v_vmart_node0001-333611:0x1ab   | dbadmin   | mutual
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;To determine the database&#39;s client-server TLS configuration, query the &lt;a href=&#34;../../../../en/sql-reference/system-tables/v-monitor-schema/tls-configs/#&#34;&gt;TLS_CONFIGURATIONS&lt;/a&gt; system table for the &amp;quot;server&amp;quot;:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; SELECT name, certificate, ca_certificate, mode FROM tls_configurations WHERE name = &amp;#39;server&amp;#39;;
  name  |   certificate    |   ca_certificate   |   mode
--------+------------------+---------------------+-----------
 server | server_cert      | ca_cert,ica_cert    | VERIFY_CA
(1 row)
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;The &amp;quot;mode&amp;quot; can be one of the following, in ascending security:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;DISABLE&lt;/code&gt;: Disables TLS. All other options for this parameter enable TLS.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;ENABLE&lt;/code&gt;: Enables TLS. The database does not check client certificates.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;TRY_VERIFY&lt;/code&gt;: Establishes a TLS connection if one of the following is true:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;the other host presents a valid certificate&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;the other host doesn&#39;t present a certificate&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;If the other host presents an invalid certificate, the connection will use plaintext.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;VERIFY_CA&lt;/code&gt;: Connection succeeds if the database verifies that the other host&#39;s certificate is from a trusted CA. If the other host does not present a certificate, the connection uses plaintext.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;VERIFY_FULL&lt;/code&gt;: Connection succeeds if the database verifies that the other host&#39;s certificate is from a trusted CA and the certificate&#39;s &lt;code&gt;cn&lt;/code&gt; (Common Name) or &lt;code&gt;subjectAltName&lt;/code&gt; attribute matches the hostname or IP address of the other host.&lt;/p&gt;
&lt;p&gt;Note that for client certificates, &lt;code&gt;cn&lt;/code&gt; is used for the username, so &lt;code&gt;subjectAltName&lt;/code&gt; must match the hostname or IP address of the other host.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Mutual mode corresponds to &lt;code&gt;TRY_VERIFY&lt;/code&gt; or higher, which indicates that the database is in mutual mode. In mutual mode, the database sends its server certificate to the client for verification and uses the CA certificates (in this case, &amp;quot;ca_cert&amp;quot; and &amp;quot;ica_cert&amp;quot;) to verify client certificates.&lt;/p&gt;
&lt;p&gt;In contrast, a server mode configuration (which doesn&#39;t verify client certificates) might have the following TLS configuration instead:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; SELECT name, certificate, ca_certificate, mode FROM tls_configurations WHERE name = &amp;#39;server&amp;#39;;
  name  |   certificate    |   ca_certificate   |   mode
--------+------------------+---------------------+-----------
 server | server_cert      |                     | ENABLE
(1 row)
&lt;/code&gt;&lt;/pre&gt;
      </description>
    </item>
    
    <item>
      <title>Mc: Configuring TLS while importing a database on MC</title>
      <link>/en/mc/configuring-mc/connecting-securely-from-mc-to-db/configuring-tls-while-importing-db-on-mc/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/mc/configuring-mc/connecting-securely-from-mc-to-db/configuring-tls-while-importing-db-on-mc/</guid>
      <description>
        
        
        &lt;p&gt;To configure TLS as you are importing an existing database on MC:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Follow the steps in &lt;a href=&#34;../../../../en/mc/db-management/managing-db-clusters/importing-an-existing-db-into-mc/#&#34;&gt;Importing an existing database into MC&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In the &lt;strong&gt;Import Vertica&lt;/strong&gt; window, select the database and click the &lt;strong&gt;Use TLS&lt;/strong&gt; checkbox.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;Configure TLS and Import DB&lt;/strong&gt; to launch and complete the Certificates wizard.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id=&#34;mc-certificates-wizard&#34;&gt;MC certificates wizard&lt;/h2&gt;
&lt;p&gt;The MC Certificates wizard lets you configure a CA certificate for the database server and client certificates for MC to allow secure TLS communication over the JDBC connections between MC and the database server. Each screen presents options. When you select an option, the wizard displays additional options and details.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;The first wizard screen provides helpful overview information. Read it, and click &lt;strong&gt;Configure TLS Certificates&lt;/strong&gt; to continue.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;On the &lt;strong&gt;Configure CA Certificates&lt;/strong&gt; screen, configure a CA certificate (public key) to add to MC. MC uses this trusted certificate to verify the server&#39;s identity during TLS communications over JDBC connections between MC and the database server.&lt;/p&gt;
&lt;p&gt;Complete one of these options:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Upload a new CA certificate&lt;/strong&gt; Browse and select the certificate file and enter an alias for this certificate&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;To add another CA certificate, click &lt;strong&gt;Add More CA Certificates.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Continue adding additional CA certificates until you are finished.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Choose a certificate alias from previously uploaded certificates&lt;/strong&gt; Select the alias for the previously uploaded CA certificate you wish to configure for the current database.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;When you are done adding CA certificates, click &lt;strong&gt;Next.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The &lt;strong&gt;Configure Client Certificate&lt;/strong&gt; screen displays the check box &lt;strong&gt;Add Client Certificate and Private Key for Mutual Mode TLS Connection.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;If the database is configured for &lt;a href=&#34;../../../../en/glossary/server-mode/&#34;&gt;server mode&lt;/a&gt;, you do not need a client certificate or key.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Leave the &lt;strong&gt;Add Client Certificate&lt;/strong&gt; check box &lt;em&gt;un&lt;/em&gt;checked and click &lt;strong&gt;Review.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Skip to step 10.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;If the database is configured for &lt;a href=&#34;../../../../en/glossary/mutual-mode/&#34;&gt;mutual mode&lt;/a&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Click the &lt;strong&gt;Add Client Certificate&lt;/strong&gt; check box.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select one of the options below.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Upload Client Certificate and Private Key files on MC&lt;/strong&gt; (shown above.) MC uses its https connection from the browser to MC&#39;s host to upload the files.)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;To add an additional client certificate and create a certificate chain, click &lt;strong&gt;Add Certificate to Chain.&lt;/strong&gt; MC reinitializes the Client Certificate file field so you can add another certificate. After you add the last certificate path, click &lt;strong&gt;Next.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;To upload an existing certificate chain file, click &lt;strong&gt;Browse&lt;/strong&gt; next to the Upload Client Certificate/Certificate chain file field, select the file, and click &lt;strong&gt;Open.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Manually upload client Certificate and Private Key on MC host and provide paths&lt;/strong&gt; Avoids sending the encrypted certificate and private key files over an https connection. To add an additional path for a client certificate and create a certificate chain, click &lt;strong&gt;Add More Certificate Paths.&lt;/strong&gt; MC reinitializes the path field so you can add another path. After you add the last certificate path, click &lt;strong&gt;Next.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Choose Client Certificate and Private Key alias of previously uploaded keypair to use for this database.&lt;/strong&gt; (To use existing certificate and key files.)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Complete the detail fields for the client certificate and private key option you have chosen above, then click &lt;strong&gt;Next.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The Apply TLS configuration to MC users mapped to database window allows you to configure the client certificate-key pair you have just entered, for use by multiple MC users.&lt;/p&gt;

&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

All the MC users you select must be mapped to the same user id on the database server.

&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;Review.&lt;/strong&gt; The wizard displays a review window with the TLS options you have configured.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select one of these options:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;To modify your TLS choices, click &lt;strong&gt;Back.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;To confirm your choices:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;If you are importing a database, click &lt;strong&gt;Configure TLS and Import DB&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;If you are configuring TLS for a database already imported to MC, click &lt;strong&gt;Configure TLS for DB.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;Close&lt;/strong&gt; to complete the wizard.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;To close the wizard without importing the database and without setting up TLS configuration, click &lt;strong&gt;Cancel.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;


      </description>
    </item>
    
    <item>
      <title>Mc: MC certificates wizard</title>
      <link>/en/mc/configuring-mc/connecting-securely-from-mc-to-db/mc-certificates-wizard/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/mc/configuring-mc/connecting-securely-from-mc-to-db/mc-certificates-wizard/</guid>
      <description>
        
        
        &lt;p&gt;The MC Certificates wizard lets you configure a CA certificate for the database server and client certificates for MC to allow secure TLS communication over the JDBC connections between MC and the database server. Each screen presents options. When you select an option, the wizard displays additional options and details.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;The first wizard screen provides helpful overview information. Read it, and click &lt;strong&gt;Configure TLS Certificates&lt;/strong&gt; to continue.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;On the &lt;strong&gt;Configure CA Certificates&lt;/strong&gt; screen, configure a CA certificate (public key) to add to MC. MC uses this trusted certificate to verify the server&#39;s identity during TLS communications over JDBC connections between MC and the database server.&lt;/p&gt;
&lt;p&gt;Complete one of these options:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Upload a new CA certificate&lt;/strong&gt; Browse and select the certificate file and enter an alias for this certificate&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;To add another CA certificate, click &lt;strong&gt;Add More CA Certificates.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Continue adding additional CA certificates until you are finished.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Choose a certificate alias from previously uploaded certificates&lt;/strong&gt; Select the alias for the previously uploaded CA certificate you wish to configure for the current database.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;When you are done adding CA certificates, click &lt;strong&gt;Next.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The &lt;strong&gt;Configure Client Certificate&lt;/strong&gt; screen displays the check box &lt;strong&gt;Add Client Certificate and Private Key for Mutual Mode TLS Connection.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;If the database is configured for &lt;a href=&#34;../../../../en/glossary/server-mode/&#34;&gt;server mode&lt;/a&gt;, you do not need a client certificate or key.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Leave the &lt;strong&gt;Add Client Certificate&lt;/strong&gt; check box &lt;em&gt;un&lt;/em&gt;checked and click &lt;strong&gt;Review.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Skip to step 10.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;If the database is configured for &lt;a href=&#34;../../../../en/glossary/mutual-mode/&#34;&gt;mutual mode&lt;/a&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Click the &lt;strong&gt;Add Client Certificate&lt;/strong&gt; check box.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select one of the options below.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Upload Client Certificate and Private Key files on MC&lt;/strong&gt; (shown above.) MC uses its https connection from the browser to MC&#39;s host to upload the files.)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;To add an additional client certificate and create a certificate chain, click &lt;strong&gt;Add Certificate to Chain.&lt;/strong&gt; MC reinitializes the Client Certificate file field so you can add another certificate. After you add the last certificate path, click &lt;strong&gt;Next.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;To upload an existing certificate chain file, click &lt;strong&gt;Browse&lt;/strong&gt; next to the Upload Client Certificate/Certificate chain file field, select the file, and click &lt;strong&gt;Open.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Manually upload client Certificate and Private Key on MC host and provide paths&lt;/strong&gt; Avoids sending the encrypted certificate and private key files over an https connection. To add an additional path for a client certificate and create a certificate chain, click &lt;strong&gt;Add More Certificate Paths.&lt;/strong&gt; MC reinitializes the path field so you can add another path. After you add the last certificate path, click &lt;strong&gt;Next.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Choose Client Certificate and Private Key alias of previously uploaded keypair to use for this database.&lt;/strong&gt; (To use existing certificate and key files.)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Complete the detail fields for the client certificate and private key option you have chosen above, then click &lt;strong&gt;Next.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The Apply TLS configuration to MC users mapped to database window allows you to configure the client certificate-key pair you have just entered, for use by multiple MC users.&lt;/p&gt;

&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

All the MC users you select must be mapped to the same user id on the database server.

&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;Review.&lt;/strong&gt; The wizard displays a review window with the TLS options you have configured.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select one of these options:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;To modify your TLS choices, click &lt;strong&gt;Back.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;To confirm your choices:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;If you are importing a database, click &lt;strong&gt;Configure TLS and Import DB&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;If you are configuring TLS for a database already imported to MC, click &lt;strong&gt;Configure TLS for DB.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;Close&lt;/strong&gt; to complete the wizard.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;To close the wizard without importing the database and without setting up TLS configuration, click &lt;strong&gt;Cancel.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;


      </description>
    </item>
    
    <item>
      <title>Mc: Configuring TLS for a monitored database in MC</title>
      <link>/en/mc/configuring-mc/connecting-securely-from-mc-to-db/configuring-tls-monitored-db-mc/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/mc/configuring-mc/connecting-securely-from-mc-to-db/configuring-tls-monitored-db-mc/</guid>
      <description>
        
        
        &lt;p&gt;This procedure describes how to configure TLS for all JDBC connections to a database that is already being monitored in MC. Note that the database should already be configured with the TLS certificates required for TLS connections.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;In MC, navigate to &lt;strong&gt;Databases and Clusters &amp;gt; DB-name &amp;gt; Settings&lt;/strong&gt; and click the &lt;strong&gt;Security&lt;/strong&gt; tab in the left navigation bar.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In the &lt;strong&gt;Configure TLS Connection for Database&lt;/strong&gt; section, click &lt;strong&gt;Enabled&lt;/strong&gt; in the drop-down beside &lt;strong&gt;Use TLS Connection to database&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;Configure TLS Connection&lt;/strong&gt; to launch and complete the Certificates wizard.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id=&#34;mc-certificates-wizard&#34;&gt;MC certificates wizard&lt;/h2&gt;
&lt;p&gt;The MC Certificates wizard lets you configure a CA certificate for the database server and client certificates for MC to allow secure TLS communication over the JDBC connections between MC and the database server. Each screen presents options. When you select an option, the wizard displays additional options and details.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;The first wizard screen provides helpful overview information. Read it, and click &lt;strong&gt;Configure TLS Certificates&lt;/strong&gt; to continue.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;On the &lt;strong&gt;Configure CA Certificates&lt;/strong&gt; screen, configure a CA certificate (public key) to add to MC. MC uses this trusted certificate to verify the server&#39;s identity during TLS communications over JDBC connections between MC and the database server.&lt;/p&gt;
&lt;p&gt;Complete one of these options:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Upload a new CA certificate&lt;/strong&gt; Browse and select the certificate file and enter an alias for this certificate&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;To add another CA certificate, click &lt;strong&gt;Add More CA Certificates.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Continue adding additional CA certificates until you are finished.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Choose a certificate alias from previously uploaded certificates&lt;/strong&gt; Select the alias for the previously uploaded CA certificate you wish to configure for the current database.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;When you are done adding CA certificates, click &lt;strong&gt;Next.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The &lt;strong&gt;Configure Client Certificate&lt;/strong&gt; screen displays the check box &lt;strong&gt;Add Client Certificate and Private Key for Mutual Mode TLS Connection.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;If the database is configured for &lt;a href=&#34;../../../../en/glossary/server-mode/&#34;&gt;server mode&lt;/a&gt;, you do not need a client certificate or key.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Leave the &lt;strong&gt;Add Client Certificate&lt;/strong&gt; check box &lt;em&gt;un&lt;/em&gt;checked and click &lt;strong&gt;Review.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Skip to step 10.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;If the database is configured for &lt;a href=&#34;../../../../en/glossary/mutual-mode/&#34;&gt;mutual mode&lt;/a&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Click the &lt;strong&gt;Add Client Certificate&lt;/strong&gt; check box.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select one of the options below.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Upload Client Certificate and Private Key files on MC&lt;/strong&gt; (shown above.) MC uses its https connection from the browser to MC&#39;s host to upload the files.)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;To add an additional client certificate and create a certificate chain, click &lt;strong&gt;Add Certificate to Chain.&lt;/strong&gt; MC reinitializes the Client Certificate file field so you can add another certificate. After you add the last certificate path, click &lt;strong&gt;Next.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;To upload an existing certificate chain file, click &lt;strong&gt;Browse&lt;/strong&gt; next to the Upload Client Certificate/Certificate chain file field, select the file, and click &lt;strong&gt;Open.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Manually upload client Certificate and Private Key on MC host and provide paths&lt;/strong&gt; Avoids sending the encrypted certificate and private key files over an https connection. To add an additional path for a client certificate and create a certificate chain, click &lt;strong&gt;Add More Certificate Paths.&lt;/strong&gt; MC reinitializes the path field so you can add another path. After you add the last certificate path, click &lt;strong&gt;Next.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Choose Client Certificate and Private Key alias of previously uploaded keypair to use for this database.&lt;/strong&gt; (To use existing certificate and key files.)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Complete the detail fields for the client certificate and private key option you have chosen above, then click &lt;strong&gt;Next.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The Apply TLS configuration to MC users mapped to database window allows you to configure the client certificate-key pair you have just entered, for use by multiple MC users.&lt;/p&gt;

&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

All the MC users you select must be mapped to the same user id on the database server.

&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;Review.&lt;/strong&gt; The wizard displays a review window with the TLS options you have configured.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select one of these options:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;To modify your TLS choices, click &lt;strong&gt;Back.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;To confirm your choices:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;If you are importing a database, click &lt;strong&gt;Configure TLS and Import DB&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;If you are configuring TLS for a database already imported to MC, click &lt;strong&gt;Configure TLS for DB.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;Close&lt;/strong&gt; to complete the wizard.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;To close the wizard without importing the database and without setting up TLS configuration, click &lt;strong&gt;Cancel.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;


      </description>
    </item>
    
    <item>
      <title>Mc: Configuring mutual TLS for MC users</title>
      <link>/en/mc/configuring-mc/connecting-securely-from-mc-to-db/configuring-mutual-tls-mc-users/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/mc/configuring-mc/connecting-securely-from-mc-to-db/configuring-mutual-tls-mc-users/</guid>
      <description>
        
        
        &lt;p&gt;You can configure TLS for existing MC users who are already mapped to database user ids. You would do so if you had just configured TLS in mutual mode on a previously unsecured database, and needed to configure a client certificate and private key for each MC user who accesses that database.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;In MC, navigate to &lt;strong&gt;MC Settings&lt;/strong&gt; and click the &lt;strong&gt;User Management&lt;/strong&gt; tab.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select a user from the list and click &lt;strong&gt;Edit.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In the &lt;strong&gt;Add permissions&lt;/strong&gt; window:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Choose the database for which you want to edit this MC user&#39;s security permissions.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;MC displays the database username to which this MC user is currently mapped.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In the &lt;strong&gt;Restrict Access&lt;/strong&gt; drop-down, choose &lt;strong&gt;Admin, Associate, IT,&lt;/strong&gt; or &lt;strong&gt;User&lt;/strong&gt; to specify the privilege level for this user.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In the &lt;strong&gt;Use TLS Connection&lt;/strong&gt; drop-down, choose &lt;strong&gt;Yes.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;Configure TLS for user&lt;/strong&gt; to launch and complete the Certificates wizard.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id=&#34;mc-certificates-wizard&#34;&gt;MC certificates wizard&lt;/h2&gt;
&lt;p&gt;The MC Certificates wizard lets you configure a CA certificate for the database server and client certificates for MC to allow secure TLS communication over the JDBC connections between MC and the database server. Each screen presents options. When you select an option, the wizard displays additional options and details.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;The first wizard screen provides helpful overview information. Read it, and click &lt;strong&gt;Configure TLS Certificates&lt;/strong&gt; to continue.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;On the &lt;strong&gt;Configure CA Certificates&lt;/strong&gt; screen, configure a CA certificate (public key) to add to MC. MC uses this trusted certificate to verify the server&#39;s identity during TLS communications over JDBC connections between MC and the database server.&lt;/p&gt;
&lt;p&gt;Complete one of these options:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Upload a new CA certificate&lt;/strong&gt; Browse and select the certificate file and enter an alias for this certificate&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;To add another CA certificate, click &lt;strong&gt;Add More CA Certificates.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Continue adding additional CA certificates until you are finished.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Choose a certificate alias from previously uploaded certificates&lt;/strong&gt; Select the alias for the previously uploaded CA certificate you wish to configure for the current database.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;When you are done adding CA certificates, click &lt;strong&gt;Next.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The &lt;strong&gt;Configure Client Certificate&lt;/strong&gt; screen displays the check box &lt;strong&gt;Add Client Certificate and Private Key for Mutual Mode TLS Connection.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;If the database is configured for &lt;a href=&#34;../../../../en/glossary/server-mode/&#34;&gt;server mode&lt;/a&gt;, you do not need a client certificate or key.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Leave the &lt;strong&gt;Add Client Certificate&lt;/strong&gt; check box &lt;em&gt;un&lt;/em&gt;checked and click &lt;strong&gt;Review.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Skip to step 10.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;If the database is configured for &lt;a href=&#34;../../../../en/glossary/mutual-mode/&#34;&gt;mutual mode&lt;/a&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Click the &lt;strong&gt;Add Client Certificate&lt;/strong&gt; check box.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select one of the options below.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Upload Client Certificate and Private Key files on MC&lt;/strong&gt; (shown above.) MC uses its https connection from the browser to MC&#39;s host to upload the files.)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;To add an additional client certificate and create a certificate chain, click &lt;strong&gt;Add Certificate to Chain.&lt;/strong&gt; MC reinitializes the Client Certificate file field so you can add another certificate. After you add the last certificate path, click &lt;strong&gt;Next.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;To upload an existing certificate chain file, click &lt;strong&gt;Browse&lt;/strong&gt; next to the Upload Client Certificate/Certificate chain file field, select the file, and click &lt;strong&gt;Open.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Manually upload client Certificate and Private Key on MC host and provide paths&lt;/strong&gt; Avoids sending the encrypted certificate and private key files over an https connection. To add an additional path for a client certificate and create a certificate chain, click &lt;strong&gt;Add More Certificate Paths.&lt;/strong&gt; MC reinitializes the path field so you can add another path. After you add the last certificate path, click &lt;strong&gt;Next.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Choose Client Certificate and Private Key alias of previously uploaded keypair to use for this database.&lt;/strong&gt; (To use existing certificate and key files.)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Complete the detail fields for the client certificate and private key option you have chosen above, then click &lt;strong&gt;Next.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The Apply TLS configuration to MC users mapped to database window allows you to configure the client certificate-key pair you have just entered, for use by multiple MC users.&lt;/p&gt;

&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

All the MC users you select must be mapped to the same user id on the database server.

&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;Review.&lt;/strong&gt; The wizard displays a review window with the TLS options you have configured.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select one of these options:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;To modify your TLS choices, click &lt;strong&gt;Back.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;To confirm your choices:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;If you are importing a database, click &lt;strong&gt;Configure TLS and Import DB&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;If you are configuring TLS for a database already imported to MC, click &lt;strong&gt;Configure TLS for DB.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;Close&lt;/strong&gt; to complete the wizard.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;To close the wizard without importing the database and without setting up TLS configuration, click &lt;strong&gt;Cancel.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;


      </description>
    </item>
    
    <item>
      <title>Mc: Updating TLS security for MC connections</title>
      <link>/en/mc/configuring-mc/connecting-securely-from-mc-to-db/updating-tls-security-mc-connections/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/mc/configuring-mc/connecting-securely-from-mc-to-db/updating-tls-security-mc-connections/</guid>
      <description>
        
        
        &lt;p&gt;Maintaining TLS security for MC JDBC connections to the database is an ongoing process. Initially, you as the MC administrator must configure the appropriate certificates and keys. As time passes, certificates expire or otherwise become invalid. To maintain TLS security in MC, you must configure new certificates to replace any that are about to expire.&lt;/p&gt;
&lt;p&gt;If any of the certificates that secure an MC connection to the database changes or expires, the MC administrator must update the TLS configuration for that database on MC to ensure that unexpired certificates are available so that connections can succeed.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;To update the certificates, simply configure new certificates for the connection between MC and that database.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;To configure new certificates for a database monitored in MC, see &lt;a href=&#34;../../../../en/mc/configuring-mc/connecting-securely-from-mc-to-db/configuring-tls-monitored-db-mc/#&#34;&gt;Configuring TLS for a monitored database in MC&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;To configure new client certificates for an MCC user, see &lt;a href=&#34;../../../../en/mc/configuring-mc/connecting-securely-from-mc-to-db/configuring-mutual-tls-mc-users/#&#34;&gt;Configuring mutual TLS for MC users&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;To replace an expiring or invalid certificate for a database or client, see &lt;a href=&#34;../../../../en/mc/configuring-mc/connecting-securely-from-mc-to-db/updating-tls-certificate-mc/#&#34;&gt;Updating a TLS certificate in MC&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;MC flags the current certificate for a given connection with a &amp;quot;use me&amp;quot; bit. This bit is set only for the current certificate. When you configure a new certificate for a given connection, the new certificate is marked current, and the previous certificate (although still present in the trust store or keystore) is no longer marked as the current certificate.&lt;/p&gt;

      </description>
    </item>
    
    <item>
      <title>Mc: Enabling or disabling TLS for a database in MC</title>
      <link>/en/mc/configuring-mc/connecting-securely-from-mc-to-db/enabling-or-disabling-tls-db-mc/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/mc/configuring-mc/connecting-securely-from-mc-to-db/enabling-or-disabling-tls-db-mc/</guid>
      <description>
        
        
        &lt;p&gt;To enable TLS for all JDBC connections from MC to the database, configure the certificate and key appropriate for that connection. See:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/mc/configuring-mc/connecting-securely-from-mc-to-db/configuring-tls-while-importing-db-on-mc/#&#34;&gt;Configuring TLS while importing a database on MC&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/mc/configuring-mc/connecting-securely-from-mc-to-db/configuring-tls-monitored-db-mc/#&#34;&gt;Configuring TLS for a monitored database in MC&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/mc/configuring-mc/connecting-securely-from-mc-to-db/configuring-mutual-tls-mc-users/#&#34;&gt;Configuring mutual TLS for MC users&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;disabling-a-tls-connection&#34;&gt;Disabling a TLS connection&lt;/h2&gt;
&lt;p&gt;Under some conditions, you as the system administrator might need to disable TLS for JDBC connections from MC to the database. Here are some examples:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;The TLS certificates are expired and you have not yet obtained new certificates.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The TLS certificates and keys are revoked and the user does not have new certificates and keys, but you still want to allow that user to connect from MC to the database to show monitoring information and run queries.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To disable TLS for connecting to the database:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;In MC, navigate to &lt;strong&gt;Home &amp;gt; Databases and Clusters &amp;gt; DatabaseName &amp;gt; Settings.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click the &lt;strong&gt;Security&lt;/strong&gt; tab in the left navigation bar.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In the &lt;strong&gt;Use TLS Connection to database&lt;/strong&gt; drop-down, choose &lt;strong&gt;Disabled.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

&lt;p&gt;To reenable TLS for a database connection after you disable it, you must reconfigure the necessary certificates.&lt;/p&gt;
&lt;p&gt;Disabling TLS for a database removes the configuration that tells MC to use the current certificates and keys for a given database, for all users. If it is a mutual mode TLS connection and each user had a separate client certificate and private key configured for that database, to re-enable TLS you must reconfigure the certificate and key for each user individually, for that database.&lt;/p&gt;


&lt;/div&gt;
&lt;h2 id=&#34;re-enabling-a-disabled-tls-connection&#34;&gt;Re-enabling a disabled TLS connection&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;In MC, navigate to &lt;strong&gt;Home &amp;gt; Databases and Clusters &amp;gt; DatabaseName &amp;gt; Settings.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click the &lt;strong&gt;Security&lt;/strong&gt; tab in the left navigation bar.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In the &lt;strong&gt;Use TLS Connection to database&lt;/strong&gt; drop-down, choose &lt;strong&gt;Enabled.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;MC displays &lt;strong&gt;Configure MC to use secured connection to query Vertica database or modify existing configuration.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;To finish re-enabling TLS, click &lt;strong&gt;Configure TLS Connection&lt;/strong&gt; to launch the Certificates Wizard.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Complete the &lt;a href=&#34;../../../../en/mc/configuring-mc/connecting-securely-from-mc-to-db/mc-certificates-wizard/#&#34;&gt;MC certificates wizard&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;

      </description>
    </item>
    
    <item>
      <title>Mc: Adding TLS certificates in MC</title>
      <link>/en/mc/configuring-mc/connecting-securely-from-mc-to-db/adding-tls-certificates-mc/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/mc/configuring-mc/connecting-securely-from-mc-to-db/adding-tls-certificates-mc/</guid>
      <description>
        
        
        &lt;p&gt;You can add one or more certificates to MC for later use, without immediately associating the certificates with a database. Adding certificates ahead of time makes it easier to configure security for a database or for one or more MC users, because you can just choose a CA or client certificate from a list rather than having to add it to MC during the configuration steps.&lt;/p&gt;
&lt;h2 id=&#34;adding-ca-certificates-in-mc&#34;&gt;Adding CA certificates in MC&lt;/h2&gt;
&lt;p&gt;To add one or more CA certificates in MC:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;From the MC home page, navigate to &lt;strong&gt;MC Settings &amp;gt; SSL/TLS Certificates&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Under Manage TLS Certificates for Database Connection, click &lt;strong&gt;Add New CA Certificate&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In the Add new CA certificates for TLS connection window, enter an alias for the certificate, to make it easier to refer to later.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;Browse&lt;/strong&gt; to locate the certficate file you want to add. MC opens an Explorer window.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select the file you want to upload, and click &lt;strong&gt;Open&lt;/strong&gt;.&lt;/p&gt;

&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

Make sure the certificate file is unexpired, and is not protected by a password.

&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;To add just this one certificate, click &lt;strong&gt;Add New CA&lt;/strong&gt;. MC adds the certificate to its list.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;To add additional CA certificates, click &lt;strong&gt;Add More CA Certificates&lt;/strong&gt;. MC adds the certificate to a list, and clears the fields so you can enter the next CA certificate.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Repeat the process until you have entered the last certificate you want to add.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;Add New CA&lt;/strong&gt; to add all the CA certificates in the list to the MC:&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id=&#34;adding-client-certificates-and-keys-in-mc&#34;&gt;Adding client certificates and keys in MC&lt;/h2&gt;
&lt;p&gt;You can add one or more client certificate and private key pairs to MC. In each pair, you can add either a single certificate, a preexisting certificate chain, or a series of client certificates that MC uses to create a new certificate chain.&lt;/p&gt;
&lt;p&gt;To add one or more client certificates with their private key files to MC for later use:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Navigate to &lt;strong&gt;Home &amp;gt; MC Settings &amp;gt; SSL/TLS Certificates.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Under Manage TLS Certificates for Database Connection, click &lt;strong&gt;Add New Client Certificate&lt;/strong&gt;. MC displays the Add new Client Certificate and Private Key for TLS Connection screen.&lt;/p&gt;

&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

When you add a client certificate to MC, you always add it with its private key file. The client certificate and its key are a &lt;em&gt;key pair&lt;/em&gt;.

&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click one of these file upload options:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Upload Client Certificate and Private Key for TLS Connection&lt;/strong&gt;. With this option, you paste a certificate and key into browser fields. MC posts the certificate and key from your browser to the MC server via an https connection over the network, secured with TLS/SSL.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Manually upload Client Certificate and Private Key on MC host and provide paths&lt;/strong&gt;. Sending the certificates from your browser to the MC server across an https network connection may not be not your preference. If so, you can use this option to specify the paths on the MC server host where you have manually uploaded the client certificate and private key files, instead. The URL of your MC browser shows the IP address of the MC host. Using this option, you must manually handle the transfer of the certificate and the key files to the server.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;To provide a single client certificate and private key with either input option:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Enter a recognizable alias for the key pair.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Browse and select the private key file or provide the path.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Browse and select the client certificate file or provide the path.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;Add New Client Certificate.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;MC adds the key pair to its list.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;To upload several certificates and private keys and create a certificate chain:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Enter an alias for the key pair.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Browse and select the private key file or provide the path.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Browse and select the client certificate file or provide the path.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;Add Certificate to Chain&lt;/strong&gt; (or &lt;strong&gt;Add More Certificate Paths&lt;/strong&gt;).&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Repeat the process until you have added the last certificate and key for this certificate chain.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;Add New Client Certificate.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;MC adds the resulting certificate chain to its list.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id=&#34;adding-a-new-certificate-for-the-browser-connection&#34;&gt;Adding a new certificate for the browser connection&lt;/h2&gt;
&lt;p&gt;You can view the existing TLS certificate for the browser connection to the MC server, or add a new certificate to replace it.&lt;/p&gt;
&lt;p&gt;To view or replace the current SSL/TLS certificate that MC uses for the user&#39;s browser&#39;s HTTPS connection to the MC server:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;From the MC home page, navigate to &lt;strong&gt;MC Settings &amp;gt; SSL/TLS Certificates.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The top pane displays the current certificate for the browser connection to the MC server, including the certificate&#39;s expiration date:&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;../../../../images/mc/mctlsmc-settiings-cert-for-browser-connection.png&#34; alt=&#34;&#34;&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;To replace the current certificate, click &lt;strong&gt;Browse&lt;/strong&gt; next to the &lt;strong&gt;Upload a new SSL certificate&lt;/strong&gt; field.&lt;/p&gt;
&lt;p&gt;MC opens an explorer window.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select the certificate file you wish to upload and click &lt;strong&gt;Open.&lt;/strong&gt; The certificate file must be in PEM (Privacy-enhanced Email Message) format.&lt;/p&gt;
&lt;p&gt;MC replaces the prior certificate with the new certificate.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;

      </description>
    </item>
    
    <item>
      <title>Mc: Managing TLS certificates in MC</title>
      <link>/en/mc/configuring-mc/connecting-securely-from-mc-to-db/managing-tls-certificates-mc/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/mc/configuring-mc/connecting-securely-from-mc-to-db/managing-tls-certificates-mc/</guid>
      <description>
        
        
        &lt;p&gt;MC maintains a secure list containing all the CA certificates, and the client certificates or certificate chains and their corresponding key files, that you have uploaded into MC.&lt;/p&gt;
&lt;p&gt;To manage the certificates already uploaded to MC, navigate to &lt;strong&gt;Home &amp;gt; MC Settings &amp;gt; SSL/TLS Certificates&lt;/strong&gt;. This screen controls the TLS security settings for all of MC.&lt;/p&gt;
&lt;p&gt;The top pane displays information about the current TLS certificate used to secure the user&#39;s browser connection to the MC server. You can add a new certificate to replace it. See .&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;../../../../images/mc/mctlsmc-settiings-cert-for-browser-connection.png&#34; alt=&#34;&#34;&gt;&lt;/p&gt;
&lt;p&gt;The middle and lower panes allow you to add and remove CA and client certificates in MC.&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;../../../../images/mc/mctlsmc-settings-add-remove-certificates.png&#34; alt=&#34;&#34;&gt;&lt;/p&gt;
&lt;p&gt;You can perform the following tasks to manage your TLS certificates and keys in MC.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/mc/configuring-mc/connecting-securely-from-mc-to-db/adding-tls-certificates-mc/#&#34;&gt;Adding TLS certificates in MC&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../en/mc/configuring-mc/connecting-securely-from-mc-to-db/removing-tls-certificates-from-mc/#&#34;&gt;Removing TLS certificates from MC&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For the security settings for a specific database, open the database in MC and navigate to &lt;strong&gt;Home &amp;gt; Databases and Clusters &amp;gt; DatabaseName &amp;gt; Settings&lt;/strong&gt; and click the &lt;strong&gt;Security&lt;/strong&gt; tab in the left navigation bar.&lt;/p&gt;

      </description>
    </item>
    
    <item>
      <title>Mc: Updating a TLS certificate in MC</title>
      <link>/en/mc/configuring-mc/connecting-securely-from-mc-to-db/updating-tls-certificate-mc/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/mc/configuring-mc/connecting-securely-from-mc-to-db/updating-tls-certificate-mc/</guid>
      <description>
        
        
        &lt;p&gt;When a TLS certificate is about to expire, has already expired, or otherwise becomes unusable, it needs to be updated.&lt;/p&gt;
&lt;p&gt;This is the method for updating a certificate:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;In MC, add the new certificate that will replace the expiring or invalid certificate. See &lt;a href=&#34;../../../../en/mc/configuring-mc/connecting-securely-from-mc-to-db/adding-tls-certificates-mc/#&#34;&gt;Adding TLS certificates in MC&lt;/a&gt;.&lt;/p&gt;

&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

You can add and configure the new certificate for the database or user whose existing certificate is or will soon be invalid, as a single step, or two steps. Configuring the new certificate for the database dissociates the previously configured certificate from that database. See &lt;a href=&#34;../../../../en/mc/configuring-mc/connecting-securely-from-mc-to-db/#&#34;&gt;Connecting securely from MC to the database&lt;/a&gt;.

&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;After the old certificate has been disassociated from all databases and users, you can remove it from the MC. See &lt;a href=&#34;../../../../en/mc/configuring-mc/connecting-securely-from-mc-to-db/removing-tls-certificates-from-mc/#&#34;&gt;Removing TLS certificates from MC&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;

      </description>
    </item>
    
    <item>
      <title>Mc: Removing TLS certificates from MC</title>
      <link>/en/mc/configuring-mc/connecting-securely-from-mc-to-db/removing-tls-certificates-from-mc/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/mc/configuring-mc/connecting-securely-from-mc-to-db/removing-tls-certificates-from-mc/</guid>
      <description>
        
        
        &lt;p&gt;In some cases, it may be appropriate to disable TLS for a database in MC. Disabling TLS for the database disassociates all the certificates configured for that database. For more information, see &lt;a href=&#34;../../../../en/mc/configuring-mc/connecting-securely-from-mc-to-db/enabling-or-disabling-tls-db-mc/#&#34;&gt;Enabling or disabling TLS for a database in MC&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;disassociating-a-certificate-from-a-database-in-mc&#34;&gt;Disassociating a certificate from a database in MC&lt;/h2&gt;
&lt;p&gt;Before you can remove a certificate from MC, you must be sure the certificate is not associated with (being used by) any databases. The MC administrator can disassociate a certificate from a database in MC using either of these methods:&lt;/p&gt;
&lt;h3 id=&#34;configuring-a-new-certificate-on-the-database-in-mc&#34;&gt;Configuring a new certificate on the database in MC&lt;/h3&gt;
&lt;p&gt;When you configure a new certificate to serve a specific purpose on a database in MC, the new certificate replaces the old certificate. The newly configured certificate is now associated with the database, and the old certificate is no longer associated and can be removed.&lt;/p&gt;
&lt;p&gt;Navigate to &lt;strong&gt;Databases and Clusters &amp;gt; DbName &amp;gt; Database Settings &amp;gt; Configure TLS.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;For details, see &lt;a href=&#34;../../../../en/mc/configuring-mc/connecting-securely-from-mc-to-db/configuring-tls-monitored-db-mc/#&#34;&gt;Configuring TLS for a monitored database in MC&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;removing-the-tls-configuration-on-the-database&#34;&gt;Removing the TLS configuration on the database&lt;/h2&gt;
&lt;p&gt;You can remove one or more TLS certificates from the MC, provided the certificates are not associated with a database. To remove a certificate:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;From the MC home page, navigate to &lt;strong&gt;MC Settings &amp;gt; SSL/TLS Certificates&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In the &lt;strong&gt;Manage TLS Certificates for Database Connection&lt;/strong&gt; section, locate the row or rows for one or more CA or client certificates you want to remove. This example shows only the &lt;strong&gt;CA Certificates&lt;/strong&gt; pane:&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;../../../../images/mc/mctls-remove-certificates.png&#34; alt=&#34;&#34;&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;If the &lt;strong&gt;Database associated&lt;/strong&gt; field is empty for that certificate, you can click to select the certificate for removal, and click &lt;strong&gt;Remove Selected&lt;/strong&gt;. In the illustration above, CA_cert_02 and CA_cert_01 are selected for removal.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

If you remove one client certificate that is part of a certificate chain, MC removes the entire certificate chain.

&lt;/div&gt;

      </description>
    </item>
    
    <item>
      <title>Mc: MC icons display database TLS status</title>
      <link>/en/mc/configuring-mc/connecting-securely-from-mc-to-db/mc-icons-display-db-tls-status/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/mc/configuring-mc/connecting-securely-from-mc-to-db/mc-icons-display-db-tls-status/</guid>
      <description>
        
        
        &lt;p&gt;MC displays an icon at top left of the database in the Database and Cluster/Infrastructure view, that shows the current TLS status of the database. These same icons appear in the breadcrumbs to the left of the database name, to show the current TLS security status of the database:

&lt;table class=&#34;table table-bordered&#34; &gt;



&lt;tr&gt; 

&lt;th &gt;
Icon&lt;/th&gt; 

&lt;th &gt;
Description&lt;/th&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;


&lt;img src=&#34;../../../../images/mc/mctls-status-icon-n-oicon.png&#34; alt=&#34;&#34;&gt;&lt;/td&gt; 

&lt;td &gt;
No icon. The database is not configured to use TLS, and MC is not configured to connect to the database using TLS, either. When neither side has TLS configured, all connections are open and unsecured.&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;


&lt;img src=&#34;../../../../images/mc/mctls-status-icon-gray-lock.png&#34; alt=&#34;&#34;&gt;&lt;/td&gt; 

&lt;td &gt;
Gray lock icon. TLS is configured on this database and also in MC.&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;


&lt;img src=&#34;../../../../images/mc/mctls-status-icon-gray-lock-orange-triangle.png&#34; alt=&#34;&#34;&gt;&lt;/td&gt; 

&lt;td &gt;
Gray lock icon with orange alert. Database is configured to use TLS but MC is not configured to use a TLS connection. An internal MC job checks the status of MC&#39;s connection.&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;


&lt;img src=&#34;../../../../images/mc/mctls-status-icon-red-lock-x.png&#34; alt=&#34;&#34;&gt;&lt;/td&gt; 

&lt;td &gt;
Red lock with red X. Both the database and MC are configured for TLS, but MC is not able to connect using TLS.&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
&lt;/p&gt;

      </description>
    </item>
    
    <item>
      <title>Mc: Bulk-configure a group of MC users for TLS</title>
      <link>/en/mc/configuring-mc/connecting-securely-from-mc-to-db/bulk-configure-group-of-mc-users-tls/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/mc/configuring-mc/connecting-securely-from-mc-to-db/bulk-configure-group-of-mc-users-tls/</guid>
      <description>
        
        
        &lt;p&gt;You as the MC administrator can create multiple MC users and map them all to the same database user id on the database server side. You map the users in MC when you create them. For details, see &lt;a href=&#34;../../../../en/mc/users-roles-and-privileges/user-admin-mc/#&#34;&gt;User administration in MC&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;You can then configure all the MC users that are mapped to a single database user id, to use the same client certificate or certificate chain and private key in MC, in a single bulk configuration process:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Navigate to &lt;strong&gt;MC Home &amp;gt; Databases and Clusters &amp;gt; DbName&amp;gt; Settings&lt;/strong&gt; &lt;strong&gt;&amp;gt; Security.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;Configure TLS Connection&lt;/strong&gt; to launch the MC certificates wizard.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Complete steps 1 through 3 in the wizard to configure a CA certificate and the client certificate or certificate chain and key that you want to use for multiple MC users. For details, see &lt;a href=&#34;../../../../en/mc/configuring-mc/connecting-securely-from-mc-to-db/mc-certificates-wizard/#&#34;&gt;MC certificates wizard&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;After you complete these steps, the wizard displays the &lt;strong&gt;Apply TLS configuration to MC users mapped to database&lt;/strong&gt; page as step 4 in the left wizard pane.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;To apply the same CA certificate, client certificate and key you just configured to one or more additional users, click the check boxes for those users.&lt;/p&gt;

&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

All the users you select must be mapped to the same database user id.

&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;To complete the configuration, click Review. MC displays a confirmation screen:&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;To complete the configuration of this CA certificate for the database and this client certificate/key pair for the selected MC users, click &lt;strong&gt;Configure TLS for DB.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;MC confirms that the action was a success. Click &lt;strong&gt;Close&lt;/strong&gt; to close the Certificate wizard.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;

      </description>
    </item>
    
  </channel>
</rss>
