We are using TDM portal version 4.11.2028.0. What are the configuration and log files, needed to verify, TDM Portal making the proper TCPS connectivity/connection profiles to Oracle server, and using the correct port, TLS 1.2 or above protocol, and approved cipher suites?
TDM Portal 4.11.x
For more information on configuring your Oracle connection profiles to use TCPS in TDM, please refer to the following documentation: Oracle TCPS Authentication. You need to work with your DBA, and maybe your security team, to first have the Oracle server configured for TCPS, then import the certificates used by the Oracle server into a truststore file, or keystore file used by the TDM Portal/FDM server.
If you know this was already done, you should check the connection profiles used by the TDM applications, to verify they have been configured to communicate across the correct listener port for your Oracle data sources.
By default, the JVM (Java Virtual Machines) used by both TDM Portal and FDM, have lower protocols disabled. You can verify this by looking inside the following files:
Starting with Line 729, we find which lower-level protocols have been disabled in Java:
Starting in TDM 4.11, the TDM Portal attempts to establish a secure connection using TLSv1.3 first, and reverts to TLSv1.2 if required. This can be confirmed by looking at the TDM Portal's Tomcat Web Service configuration, found inside the C:\Program Files|CA\CA Test Data Manager portal\tomcat\conf\server.xml file (starting with line 40):
<Connector port="8443" protocol="org.apache.coyote.http11.Http11NioProtocol" certificateVerification="none" SSLEnabled="true" scheme="https" secure="true" continueResponseTiming="onRead" compression="on" compressionMinSize="1024" noCompressionUserAgents="gozilla, traviata" compressableMimeType="application/json,application/xml,text/html,text/xml,text/plain,application/javascript,text/css,image/jpeg" connectionTimeout="60000" maxHttpHeaderSize="3000000">
<SSLHostConfig disableSessionTickets="true" protocols="TLSv1.3, TLSv1.2" honorCipherOrder="true" ciphers="TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_DHE_RSA_WITH_AES_256_GCM_SHA384,TLS_DHE_RSA_WITH_AES_128_GCM_SHA256">
<Certificate certificateKeystoreFile="${tdmweb.keystorePath}" certificateKeystorePassword="${tdmweb.keystorePassword}" certificateKeyAlias="${tdmweb.keyAlias}" type="RSA"/>
</SSLHostConfig>
</Connector>
As for logs, it depends on what you are using TDM to do.
If you are using TDM Portal/FDM for masking:
If you are using TDM portal for publishing generated data to an Oracle table, check the %ProgramData%\CA\CA Test Data Manager Portal\logs\TDMPublish.log. This should also show the URL used to establish the connection to the Oracle database.
NOTE: if you make modifications to the protocols or ciphers used by the Apache Tomcat Web Service, in the server.xml file, the CA Test Data Manager Portal service will need to be restarted. Also, with future upgrades/patching, the server.xml file will be overwritten, so it's highly recommended you back regular backups of the modified file, in case you need to compare the previously backed up file, with the new service.xml after upgrading.