Configure cipher suites
Regulatory compliance or other security requirements might require you to change the cipher suites your SSL-enabled PE services use to communicate with other PE components.
To add or remove cipher suites for different service types, use Hiera to modify the following parameters:
puppet_enterprise::ssl_cipher_suites
List IANA-formatted ciphers for all PE Java-based services, which includes PuppetDB, Puppet Server, console services, and the orchestrator.
Format: Array of strings
Example:
puppet_enterprise::ssl_cipher_suites: - 'TLS_AES_256_GCM_SHA384' - 'TLS_AES_128_GCM_SHA256' - 'TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256' - 'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384'
puppet_enterprise::ssl_cipher_suites_non_java
List OpenSSL-formatted ciphers for all PE non-Java services, which includes Bolt Server, ACE Server, and PostgreSQL.
Format: Array of strings
Example:
puppet_enterprise::ssl_cipher_suites_non_java: - 'ECDHE-ECDSA-AES128-GCM-SHA256' - 'ECDHE-ECDSA-AES256-GCM-SHA384' - 'ECDHE-RSA-AES128-GCM-SHA256' - 'ECDHE-RSA-AES256-GCM-SHA384'
puppet_enterprise::ssl_cipher_suites_browser
List OpenSSL-formatted ciphers for NGINX. These ciphers are accepted by the PE console in the browser.
Format: Array of strings
Example:
puppet_enterprise::ssl_cipher_suites_browser: - 'TLS_CHACHA20_POLY1305_SHA256' - 'ECDHE-ECDSA-CHACHA20-POLY1305' - 'ECDHE-RSA-CHACHA20-POLY1305' - 'ECDHE-ECDSA-AES128-GCM-SHA256'
Related information