Proxy Configuration
The CipherTrust Manager allows you to set up HTTP proxy values through the Command Line Interface (CLI). CCKM uses this proxy for its outbound traffic to communicate with the external network.
Configuring Proxies
The following operations can be performed:
Add proxies
Get/list proxies
Delete proxies
Update proxies
Test proxies
Note
If a proxy host is added using the proxy hostname, then IP mapping is required in the DNS. For details, refer to Configuring DNS Hosts.
Note
A system restart is required after adding a new proxy or changing proxy settings.
Note
For HTTPS proxy, the CipherTrust Manager allows you to add the ca-certificates to the list of trusted ca-certificates.
Note
• For CCKM, configure an HTTPS proxy.
• If your proxy server does not support HTTP CONNECT, then CCKM GCP connections from the CipherTrust Manager will not work using proxy with a certificate. Instead, add an exception (cloudkms.googleapis.com
) with no-proxy
or use proxy with username and password.
Adding Proxies
To add a proxy, run:
Syntax
Example Request 1
Example Response 1
Example Request 2
Note
If the proxy server password contains special characters, then replace these characters with encoded value. For example, if password is tmp^123# then the updated password is tmp%5E123%23.
Example Response 2
Getting List of Proxies
To get a list of proxies, run:
Syntax
Example Request
Example Response
Deleting Proxies
To delete proxy configurations, run:
Syntax
Example Request
No response is displayed if the proxy is deleted successfully. The ca-certificate of the HTTPS proxy is also deleted.
Updating Proxies
To update a proxy configuration, run:
Syntax
Example Request
Example Response
Testing Proxies
To test proxy with a given URL, run:
Syntax
Example Request 1
Example Response 1
Example Request 2
Example Response 2