Skip to content

How to Ensure That My Connections are Secure?

It is highly recommended that all network connections between MMTE components are encrypted. It is done using the SSL protocol. All procedures for enabling SSL in MMTE are fully described in this documentation.

This topic is useful if you want to ensure that your changes are in effect and that connections are indeed established over SSL.

MMC->MMS Connections

To check if the connection between MMTE Client and MMTE Server is secure, follow these steps:

  1. Close MMTE Client if opened.
  2. Start it again.
  3. Wait until it finishes initialization.
  4. Open the main MMTE Client log in any viewer or editor.
  5. Find the event message similar to the following sample:

    22.10;05:03:58.549 [AWT-EventQueue-0] DEBUG com.infolytik.ui.metaminer.Zdq - dataIntegrityUrl=http://mm.mycompany.com:49714/status/en
    

    The date/time must correspond to the time of MMTE Client initialization and dataIntegrityUrl to your MMTE Server hostname/IP address and port.

  6. Check the dataIntegrityUrl protocol prefix.

    If it is https, your connection between MMTE Client and MMTE Server is secure (encrypted with SSL).

    If it is http, it is not encrypted.

MMS->Tableau Connections

To check if the connection between MMTE Server and Tableau is secure, follow these steps:

  1. Open MMTE Administrator.
  2. Make sure your target Tableau environment(s) is/are added and connected successfully.
  3. Open the main MMTE Administrator log in any viewer or editor.
  4. Find lines for connection events of the target Tableau environment(s), as in the following example:

    21.10;04:57:10.876 [pool-17-thread-1] INFO  com.infolytik.server.tab.Zfj - Validating tableau connection: [email protected] [https]
    21.10;04:57:10.877 [pool-17-thread-1] INFO  com.infolytik.server.tab.Zfj - Getting server info: [email protected] [https]
    
  5. Check the protocol indication on these lines.

    If there are [https] lines for the environment, then its connection is secure (encrypted with SSL).

    If there are [http] lines only, its connection is not encrypted.

PostgreSQL Connections

To check if the connections to your MetaMiner Database are secure, follow these steps:

  1. Open psql, pgAdmin, or whatever PostgreSQL client software you prefer.
  2. Run the following query:

    SELECT datname, usename, ssl, client_addr 
      FROM pg_stat_ssl
      JOIN pg_stat_activity
        ON pg_stat_ssl.pid = pg_stat_activity.pid;
    
  3. Examine the result set. It might look like this:

      datname  | usename  | ssl | client_addr 
    -----------+----------+-----+-------------
               | postgres | f   | 
     metaminer | mmuser   | f   | 127.0.0.1
     metaminer | mmuser   | f   | 127.0.0.1
     metaminer | mmuser   | f   | 127.0.0.1
     metaminer | readonly | f   | ::1
     metaminer | mmuser   | t   | 172.16.1.1
     metaminer | john     | t   | 11.22.33.44
    (7 rows)
    

    t in the ssl column means true (connection is encrypted) and f means false (connection is not encrypted).

  4. Make sure all external connections are encrypted.

    This is fine if connections from localhost (127.0.0.1) are not encrypted.

Back to top