Skip to main content
Table of contents

Infrastructure

Connect to vCloud Director (Carrenza only)

vCloud Director is the interface we use to manage our infrastructure in Carrenza. This includes virtual machines, gateways, firewalls and VPNs between providers.

To access vCloud Director, you will need to connect to a Carrenza-provided VPN. You can use either Cisco AnyConnect or OpenConnect as a VPN client for this.

Please ensure VPN certificates are renewed via Carrenza service portal before expiry:

  1. Expiry date of primary Carrenza VPN certificate is May 27 16:29:58 2021 GMT
  2. Expiry date of backup Carrenza VPN certificate is Jun 4 12:14:47 2021 GMT

Setting up the Cisco AnyConnect VPN profile on a Mac

  1. Make sure you have the latest version of govuk-secrets.

  2. Install oathtool (this will be used to generate one time passwords).

    $ brew install oath-toolkit
    
  3. Get the VPN client certificate and private key from the 2nd line password store and save the decrypted contents to a file on your machine (for example ~/carrenza-vpn-cert-and-key.pem).

     $ PASSWORD_STORE_DIR=~/govuk/govuk-secrets/pass/2ndline pass carrenza/vpn-certificate > ~/carrenza-vpn-cert-and-key.pem
    
  4. Get the VPN credentials, also from the 2nd line password store.

     $ PASSWORD_STORE_DIR=~/govuk/govuk-secrets/pass/2ndline pass carrenza/vpn-credentials
     Certificate passphrase: ...
     MFA key: ................
     Password: ...
     VPN gateway: ...
    
  5. Convert the VPN client certificate from PEM format to PFX format. You will be asked for two passwords (one for decrypting the PEM and one for encrypting the PFX). The first password is the Certificate passphrase field from carrenza/vpn-credentials. The second password can be of your own choice. You will need it for the next few steps but you won't need to remember it after that.

     $ openssl pkcs12 -export -in ~/carrenza-vpn-cert-and-key.pem -out ~/carrenza-vpn-cert-and-key.pfx
     Enter pass phrase for /Users/.../carrenza-vpn-cert-and-key.pem: <Certificate passphrase from vpn-credentials>
     Enter Export Password: <Password from vpn-credentials>
     Verifying - Enter Export Password:
    
  6. Import the PFX format certificate into your macOS login keychain. You'll be asked for a password. Enter the passphrase which you used to encrypt the PFX file (Certificate passphrase field from carrenza/vpn-credentials).

    $ security import ~/carrenza-vpn-cert-and-key.pfx
    

    This allows you to use Cisco AnyConnect as VPN client.

  7. Delete the PFX file as it is no longer needed.

     $ rm ~/carrenza-vpn-cert-and-key.pfx
    

Connecting with OpenConnect

Make sure to read these instructions carefully before login on Carrenza VPN. If you enter the wrong credentials too many times, we will be locked out!

  1. Install OpenConnect: brew install openconnect
  2. Run OpenConnect. Make sure you provide the correct path to where you've saved the VPN client certificate.

    $ sudo openconnect https://secure.carrenza.com -c ~/carrenza-vpn-cert-and-key.pem
    
  3. The first password is your machine password (requested by sudo).
  4. The second password (the PEM passphrase) is the certificate passphrase from the password store.
  5. The third password is the 2FA code (use oathtool -b <MFA-key-from-password-store> --totp).
  6. The fourth password is the password from the password store.

Accessing vCloud Director

  1. Fetch the VCloud Director credentials for the environment which you want to connect to.

     $ PASSWORD_STORE_DIR=~/govuk/govuk-secrets/pass/2ndline pass carrenza/vcloud-integration
     ......... <a long string which is the VCloud Director password>
     User: <username for logging into VCloud Director>
     Org: <this string goes in the URL path for accessing VCloud Director>
    
  2. Ensure that you are connected to the Carrenza VPN (see above).

  3. Visit https://vcloud.carrenza.com/tenant/{organisation}/ (replacing {organisation} with the value of the Org field from the password store entry.

  4. Log in with the username and password from the password store entry.

Backup VPN account

There is a backup VPN account to be used primarily by reliability engineers.

The VPN certificate can be obtained from the infra pass, e.g.

PASSWORD_STORE_DIR=~/govuk/govuk-secrets/pass/infra pass carrenza/vpn-backup-certificate

The VPN credentials can be obtained from the infra pass, e.g.

PASSWORD_STORE_DIR=~/govuk/govuk-secrets/pass/infra pass carrenza/vpn-backup-credentials

You should not import the certificate into your macOS login keychain because this can cause confusion for the Cisco AnyConnect VPN client. The certificate will work with OpenConnect VPN client without importing in your macOS keychain.

The rest of the instructions remain the same as for the primary VPN account.

This page was last reviewed on 15 May 2020. It needs to be reviewed again on 15 November 2020 by the page owner #re-govuk .
This page was set to be reviewed before 15 November 2020 by the page owner #re-govuk. This might mean the content is out of date.